2006
DOI: 10.1016/j.datak.2005.02.006
|View full text |Cite
|
Sign up to set email alerts
|

Interactive workflow mining—requirements, concepts and implementation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2006
2006
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…However, an end-user is likely to prefer process discovery algorithms that are less stringent on computational requirements. In practice, shorter run times will encourage the end-user to interactively explore the event log, applying various filters, and parameter settings [16,37]. Reporting run times is perhaps unfair.…”
Section: Run Timementioning
confidence: 97%
“…However, an end-user is likely to prefer process discovery algorithms that are less stringent on computational requirements. In practice, shorter run times will encourage the end-user to interactively explore the event log, applying various filters, and parameter settings [16,37]. Reporting run times is perhaps unfair.…”
Section: Run Timementioning
confidence: 97%
“…Many process mining algorithms have been proposed in the last years [38][39][40]32,23,48,22,15,44]. Of relevance to this paper is the distinction between precise and noisy mining algorithms.…”
Section: Process Miningmentioning
confidence: 98%
“…Noisy mining algorithms [3,11,28,23,22,[46][47][48] in their majority use the frequency of the temporal order relation between two activities to infer their dependency, and thus infrequent dependencies in the log may not be modeled in the resultant process model. An exception to the frequency based approach is the work on genetic mining [15,14] which uses a search based on genetic algorithms with an explicit representation of the ordering among models.…”
Section: Process Miningmentioning
confidence: 99%
“…The idea of interactive mining of models is previously explored in process mining applications [29]. However, our protocol refinement approach is original, and to the best of our knowledge, no support is provided for refinement of discovered models to compensate for log imperfection.…”
Section: Model Refinementmentioning
confidence: 98%