2006
DOI: 10.1504/ijbidm.2006.009137
|View full text |Cite
|
Sign up to set email alerts
|

Web process and workflow path mining using the Multimethod approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2007
2007
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 26 publications
0
7
0
Order By: Relevance
“…This information enables the analyst to obtain more insight into the process execution and its environment and react if an adaptation or exceptional interference becomes necessary, reallocation of resources. Examples of these analyses are what-if analysis [12], performance monitoring [16], performance prediction [38], path prediction [6], sensitivity analysis [11], and bottleneck detection [41]. Traditionally, in the BPM domain two basic types of analysis techniques are utilised to extract additional information from low-level data, i.e.…”
Section: Analysis Types For Reasoning On Bpm@rtmentioning
confidence: 99%
“…This information enables the analyst to obtain more insight into the process execution and its environment and react if an adaptation or exceptional interference becomes necessary, reallocation of resources. Examples of these analyses are what-if analysis [12], performance monitoring [16], performance prediction [38], path prediction [6], sensitivity analysis [11], and bottleneck detection [41]. Traditionally, in the BPM domain two basic types of analysis techniques are utilised to extract additional information from low-level data, i.e.…”
Section: Analysis Types For Reasoning On Bpm@rtmentioning
confidence: 99%
“…It is worth mentioning further methods that in some cases can extract relevant knowledge from much less specific data. For example there is the analysis of electronic trails (e.g., Web server log files or exchanges of e-mail) (Cardoso and Lenic 2006) as well as the analysis of social networks.…”
Section: Knowledge Acquisitionmentioning
confidence: 99%
“…In recent years some of the major processes of the process management life cycle such as process analysis (Biazzo, 2000), process design (Cousins and Stewart, 2002), and process measurement (Cardoso et al, 2006) are reaching, from the companies' point of view, a satisfying level of maturity, on the other hand deficiencies become apparent when processes are actually implemented (BPM Study, 2006). In other words, in spite of all business process approaches, methodologies, models, standards, which in specific contexts and different focuses address BPM and improvement of business processes, there is still a large gap between "theory" -how an organization wants to function, and working practice -what actually happens in business process execution.…”
Section: Introductionmentioning
confidence: 99%
“…In this regard, the web usage recommender mechanisms deploy the web server logs as input, and effectively exploit the data mining approaches like the association rules and clustering to extort the navigational models, which can be subsequently employed to offer the promotions. The web server logs document the user browsing history, consisting of the extremely concealed data on the users and their navigation (Simon, 2002;Cardoso and Lenic, 2006). With the result, they effectively highlight themselves as the excellent candidates for the purpose of unambiguous user rating or as Feedback in developing user models.…”
Section: Introductionmentioning
confidence: 99%