Process Mining: Using CPN Tools to Create Test Logs for Mining Algorithms
|
|
|
- Hugo Paul
- 10 years ago
- Views:
Transcription
1 Mining: Using CPN Tools to Create Test Logs for Mining Algorithms Ana Karla Alves de Medeiros and Christian W. Günther
2 2 Outline Introduction Mining The need for synthetic logs MXML format Using the Logging Extensions Conclusion
3 3 Mining - The general idea Information System Logs
4 4 Mining - The general idea Basic Performance Metrics Auditing, Security Logs Organizational Performance Characteristics Social Network
5 5 Mining -...what is it good for? How is a specific process really executed? Discover discrepancies process model reality Discover typical patterns in real-life operation Results can be used to: Align organization and processes in a better way Improve efficiency, effectivity and quality Redesign processes based on solid information
6 6 Mining - Practice vs. Development Mined PAIS Logs Mining Algorithm
7 7 Mining - Practice vs. Development Comparison Mined PAIS Logs Mining Algorithm
8 8 ed informally Flexible process model Not available Mining - Practice vs. Development PAIS Comparison Incomplete Corrupt Noise Logs Mined Mining Algorithm Problems during execution Logging mechanism flawed Aborted Instances Manual workarounds
9 9 ed informally Flexible process model Not available Mining - Practice vs. Development Not suitable for testing mining algorithms! PAIS Comparison Incomplete Corrupt Noise Logs Mined Mining Algorithm Problems during execution Logging mechanism flawed Aborted Instances Manual workarounds
10 10 Mining - Practice vs. Development CPN Mined Simulation in CPN Tools Logs Mining Algorithm
11 11 Mining - Practice vs. Development CPN Simulation in CPN Tools Comparison Complete Perfect Noise-free Logs Mined Mining Algorithm
12 Entirely controlled environment: Perfect testbed for Mining Algorithms! Mining - Practice vs. Development 12 CPN Simulation in CPN Tools Comparison Complete Perfect Noise-free Logs Mined Mining Algorithm
13 13 Logging a CPN Simulation Example process model: Fine handling
14 14 The MXML Format - WF-Log,, Proc. Instance <WorkflowLog> <> <Instance> <AuditTrailEntry/> <AuditTrailEntry/> <AuditTrailEntry/> </Instance> <Instance/> <Instance/> </> </WorkflowLog>
15 15 The MXML Format - The Structure of an Audit Trail Entry <AuditTrailEntry> <WorkflowElement/> Task A </Wf.M.E.> <EventType> complete </EventType> <TimeStamp> T12:37:33... </TimeStamp> <Originator> John Doe </Originator> <Data> <Attribute name= x > 1 </Attribute> <Attribute name= y > whatever </Attribute> </Data> </AuditTrailEntry>
16 16 MXML Logging Extensions for CPN Tools Define 2 global constants Import ML file containing logging functions Call function createcasefile to initialize new process instance Call function addate to create new audit trail entry
17 17 HOWTO create an MXML log from a CPN : If not already done: model the process in CPN Tools
18 18 MXML Logging Extensions - Control Variables Three declarations are necessary: FILE: path and file prefix FILE_EXTENSION: custom log file suffix import ML file containing logging functions declarations
19 19 MXML Logging Extensions - Case File Creation function createcasefile one parameter caseid of type Integer creates new file for recording a Instance File: <FILE> <caseid> <FILE_EXTENSION> Example Use: Case Generator extra transition at start of process creates a defined number of tokens (=cases) initializes log by calling createcasefile()
20 20 MXML Logging Extensions - Case File Creation Example application: Case Generator Actual process starts here!
21 21 MXML Logging Extensions - Audit Trail Entries function addate Parameter list (all MXML fields): caseid (Integer): which file to append to workflowelement (String): task name EventType (String): complete, schedule, abort,... TimeStamp (String): when has the event occurred? Originator (String): executing resource Data (List of Strings): [name1, value1, name2,...] Appends audit trail entry to case file with caseid
22 22 MXML Logging Extensions - Audit Trail Entries (convenience) function calculatetimestamp Takes no parameters Creates MXML-compliant timestamp from current logical model time
23 23 MXML Logging Extensions - Audit Trail Entries Usage of addate:
24 24 Aggregating Simulation Logs Combines all case files and writes clean MXML 4) Run plugin and save MXML 1) Select CPN plugin 2) Select directory with logs 3) Provide file suffix
25 25 Heuristics Miner Multi-Phase Miner Social Network Miner Alpha algorithm
26 26 Conclusion Extending a model with Logging is straightforward Combined with the ease of modeling in CPN Tools, rapid creation of test logs Intended Usage: Synthesis of test logs for benchmarking mining algorithms Creation of a test log repository Testing mining algorithms on advanced models...could we mine your models?
ProM Framework Tutorial
ProM Framework Tutorial Authors: Ana Karla Alves de Medeiros ([email protected]) A.J.M.M. (Ton) Weijters ([email protected]) Technische Universiteit Eindhoven Eindhoven, The Netherlands February
BUsiness process mining, or process mining in a short
, July 2-4, 2014, London, U.K. A Process Mining Approach in Software Development and Testing Process: A Case Study Rabia Saylam, Ozgur Koray Sahingoz Abstract Process mining is a relatively new and emerging
Life-Cycle Support for Staff Assignment Rules in Process-Aware Information Systems
Life-Cycle Support for Staff Assignment Rules in Process-Aware Information Systems Stefanie Rinderle-Ma 1,2 and Wil M.P. van der Aalst 2 1 Department Databases and Information Systems, Faculty of Engineering
A Generic Import Framework For Process Event Logs
A Generic Import Framework For Process Event Logs Industrial Paper Christian W. Günther and Wil M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513,
Lluis Belanche + Alfredo Vellido. Intelligent Data Analysis and Data Mining. Data Analysis and Knowledge Discovery
Lluis Belanche + Alfredo Vellido Intelligent Data Analysis and Data Mining or Data Analysis and Knowledge Discovery a.k.a. Data Mining II An insider s view Geoff Holmes: WEKA founder Process Mining
Master Thesis September 2010 ALGORITHMS FOR PROCESS CONFORMANCE AND PROCESS REFINEMENT
Master in Computing Llenguatges i Sistemes Informàtics Master Thesis September 2010 ALGORITHMS FOR PROCESS CONFORMANCE AND PROCESS REFINEMENT Student: Advisor/Director: Jorge Muñoz-Gama Josep Carmona Vargas
Process Mining Framework for Software Processes
Process Mining Framework for Software Processes Vladimir Rubin 1,2, Christian W. Günther 1, Wil M.P. van der Aalst 1, Ekkart Kindler 2, Boudewijn F. van Dongen 1, and Wilhelm Schäfer 2 1 Eindhoven University
Generation of a Set of Event Logs with Noise
Generation of a Set of Event Logs with Noise Ivan Shugurov International Laboratory of Process-Aware Information Systems National Research University Higher School of Economics 33 Kirpichnaya Str., Moscow,
Process Mining. Luigi Pontieri Istituto di Calcolo e Reti ad Alte Prestazioni ICAR-CNR Via Bucci 41c, Rende (CS) [email protected].
Process Mining Luigi Pontieri Istituto di Calcolo e Reti ad Alte Prestazioni ICAR-CNR Via Bucci 41c, Rende (CS) [email protected] Argomenti Caratteristiche generali delle tecniche di Process Mining
A Generic Import Framework For Process Event Logs
A Generic Import Framework For Process Event Logs Christian W. Günther and Wil M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600 MB, Eindhoven,
Mercy Health System. St. Louis, MO. Process Mining of Clinical Workflows for Quality and Process Improvement
Mercy Health System St. Louis, MO Process Mining of Clinical Workflows for Quality and Process Improvement Paul Helmering, Executive Director, Enterprise Architecture Pete Harrison, Data Analyst, Mercy
Process Aware Host-based Intrusion Detection Model
Process Aware Host-based Intrusion Detection Model Hanieh Jalali 1, Ahmad Baraani 1 1 University of Isfahan, Computer Department, Isfahan, Iran {jalali, ahmadb}@eng.ui.ac.ir 117 Abstract: Nowadays, many
The ProM framework: A new era in process mining tool support
The ProM framework: A new era in process mining tool support B.F. van Dongen, A.K.A. de Medeiros, H.M.W. Verbeek, A.J.M.M. Weijters, and W.M.P. van der Aalst Department of Technology Management, Eindhoven
Process Mining. ^J Springer. Discovery, Conformance and Enhancement of Business Processes. Wil M.R van der Aalst Q UNIVERS1TAT.
Wil M.R van der Aalst Process Mining Discovery, Conformance and Enhancement of Business Processes Q UNIVERS1TAT m LIECHTENSTEIN Bibliothek ^J Springer Contents 1 Introduction I 1.1 Data Explosion I 1.2
Decision Mining in Business Processes
Decision Mining in Business Processes A. Rozinat and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands {a.rozinat,w.m.p.v.d.aalst}@tm.tue.nl
Towards a Software Framework for Automatic Business Process Redesign Marwa M.Essam 1, Selma Limam Mansar 2 1
ACEEE Int. J. on Communication, Vol. 02, No. 03, Nov 2011 Towards a Software Framework for Automatic Business Process Redesign Marwa M.Essam 1, Selma Limam Mansar 2 1 Faculty of Information and Computer
Business Process Mining: An Industrial Application
Business Process Mining: An Industrial Application W.M.P. van der Aalst 1, H.A. Reijers 1, A.J.M.M. Weijters 1, B.F. van Dongen 1, A.K. Alves de Medeiros 1, M. Song 2,1, and H.M.W. Verbeek 1 1 Department
ProM 6 Tutorial. H.M.W. (Eric) Verbeek mailto:[email protected] R. P. Jagadeesh Chandra Bose mailto:j.c.b.rantham.prabhakara@tue.
ProM 6 Tutorial H.M.W. (Eric) Verbeek mailto:[email protected] R. P. Jagadeesh Chandra Bose mailto:[email protected] August 2010 1 Introduction This document shows how to use ProM 6 to
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Research Motivation In today s modern digital environment with or without our notice we are leaving our digital footprints in various data repositories through our daily activities,
SQL Server Instance-Level Benchmarks with DVDStore
SQL Server Instance-Level Benchmarks with DVDStore Dell developed a synthetic benchmark tool back that can run benchmark tests against SQL Server, Oracle, MySQL, and PostgreSQL installations. It is open-sourced
Relational XES: Data Management for Process Mining
Relational XES: Data Management for Process Mining B.F. van Dongen and Sh. Shabani Department of Mathematics and Computer Science, Eindhoven University of Technology, The Netherlands. B.F.v.Dongen, [email protected]
Analysis of Service Level Agreements using Process Mining techniques
Analysis of Service Level Agreements using Process Mining techniques CHRISTIAN MAGER University of Applied Sciences Wuerzburg-Schweinfurt Process Mining offers powerful methods to extract knowledge from
Trace Clustering in Process Mining
Trace Clustering in Process Mining M. Song, C.W. Günther, and W.M.P. van der Aalst Eindhoven University of Technology P.O.Box 513, NL-5600 MB, Eindhoven, The Netherlands. {m.s.song,c.w.gunther,w.m.p.v.d.aalst}@tue.nl
Towards an Evaluation Framework for Process Mining Algorithms
Towards an Evaluation Framework for Process Mining Algorithms A. Rozinat, A.K. Alves de Medeiros, C.W. Günther, A.J.M.M. Weijters, and W.M.P. van der Aalst Eindhoven University of Technology P.O. Box 513,
SOFTWARE PROCESS MINING
SOFTWARE PROCESS MINING DR. VLADIMIR RUBIN LEAD IT ARCHITECT & CONSULTANT @ DR. RUBIN IT CONSULTING LEAD RESEARCH FELLOW @ PAIS LAB / HSE ANNOTATION Nowadays, in the era of social, mobile and cloud computing,
Process Mining Tools: A Comparative Analysis
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Process Mining Tools: A Comparative Analysis Irina-Maria Ailenei in partial fulfillment of the requirements for the degree
Beyond the Simple SAS Merge. Vanessa L. Cox, MS 1,2, and Kimberly A. Wildes, DrPH, MA, LPC, NCC 3. Cancer Center, Houston, TX. vlcox@mdanderson.
Beyond the Simple SAS Merge Vanessa L. Cox, MS 1,2, and Kimberly A. Wildes, DrPH, MA, LPC, NCC 3 1 General Internal Medicine and Ambulatory Treatment, The University of Texas MD Anderson Cancer Center,
ProM 6 Exercises. J.C.A.M. (Joos) Buijs and J.J.C.L. (Jan) Vogelaar {j.c.a.m.buijs,j.j.c.l.vogelaar}@tue.nl. August 2010
ProM 6 Exercises J.C.A.M. (Joos) Buijs and J.J.C.L. (Jan) Vogelaar {j.c.a.m.buijs,j.j.c.l.vogelaar}@tue.nl August 2010 The exercises provided in this section are meant to become more familiar with ProM
Process Mining A Comparative Study
International Journal of Advanced Research in Computer Communication Engineering Process Mining A Comparative Study Asst. Prof. Esmita.P. Gupta M.E. Student, Department of Information Technology, VIT,
Oracle Role Manager. An Oracle White Paper Updated June 2009
Oracle Role Manager An Oracle White Paper Updated June 2009 Oracle Role Manager Introduction... 3 Key Benefits... 3 Features... 5 Enterprise Role Lifecycle Management... 5 Organization and Relationship
Data Science. Research Theme: Process Mining
Data Science Research Theme: Process Mining Process mining is a relatively young research discipline that sits between computational intelligence and data mining on the one hand and process modeling and
Combination of Process Mining and Simulation Techniques for Business Process Redesign: A Methodological Approach
Combination of Process Mining and Simulation Techniques for Business Process Redesign: A Methodological Approach Santiago Aguirre, Carlos Parra, and Jorge Alvarado Industrial Engineering Department, Pontificia
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia [email protected] Eugene Kalishenko Saint Petersburg
SecSy: A Security-oriented Tool for Synthesizing Process Event Logs
SecSy: A Security-oriented Tool for Synthesizing Process Event Logs Thomas Stocker and Rafael Accorsi University of Freiburg, Germany {stocker,accorsi}@iig.uni-freiburg.de Abstract. SecSy is a highly flexible
Capacity Management PinkVERIFY
CAP-11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? CAP-11-G-002 Does the tool have security controls in place
Authentication Levels. White Paper April 23, 2014
Summary White Paper April 23, 2014 This document describes levels of authentication that can be utilized for users known and unknown to gain access to applications and solutions. Summary... 1 Description...
Implementing Heuristic Miner for Different Types of Event Logs
Implementing Heuristic Miner for Different Types of Event Logs Angelina Prima Kurniati 1, GunturPrabawa Kusuma 2, GedeAgungAry Wisudiawan 3 1,3 School of Compuing, Telkom University, Indonesia. 2 School
Feature. Applications of Business Process Analytics and Mining for Internal Control. World
Feature Filip Caron is a doctoral researcher in the Department of Decision Sciences and Information Management, Information Systems Group, at the Katholieke Universiteit Leuven (Flanders, Belgium). Jan
Checklist For Business Recovery
Checklist For Business Recovery Completed By: Name: Company: Room: Street: City, State, Zip: Phone #: Business Recovery Plan for: Business Recovery Plan (BRP)--LEVEL 1 (Executive Awareness/Authority) 1.
Process Mining. Data science in action
Process Mining. Data science in action Julia Rudnitckaia Brno, University of Technology, Faculty of Information Technology, [email protected] 1 Abstract. At last decades people have to accumulate
Using Process Mining to Bridge the Gap between BI and BPM
Using Process Mining to Bridge the Gap between BI and BPM Wil van der alst Eindhoven University of Technology, The Netherlands Process mining techniques enable process-centric analytics through automated
Canonical. Plugin for Joomla! This manual documents version 3.11.x of the Joomla! extension. http://www.aimy-extensions.com/joomla/canonical.
Canonical Plugin for Joomla! This manual documents version 3.11.x of the Joomla! extension. http://www.aimy-extensions.com/joomla/canonical.html 1 Introduction The Joomla! plugin Aimy Canonical allows
CMDB Essential to Service Management Strategy. All rights reserved 2007
CMDB: Essential to the Service Management strategy Business Proposition: This white paper describes how the CMDB is an essential component of the IT Service Management Strategy, and why the FrontRange
Analyzing a TCP/IP-Protocol with Process Mining Techniques
Analyzing a TCP/IP-Protocol with Process Mining Techniques Christian Wakup 1 and Jörg Desel 2 1 rubecon information technologies GmbH, Germany 2 Fakultät für Mathematik und Informatik, FernUniversität
An Ontology-based Framework for Enriching Event-log Data
An Ontology-based Framework for Enriching Event-log Data Thanh Tran Thi Kim, Hannes Werthner e-commerce group Institute of Software Technology and Interactive Systems, Vienna, Austria Email: [email protected],
Application of Process Mining in Healthcare A Case Study in a Dutch Hospital
Application of Process Mining in Healthcare A Case Study in a Dutch Hospital R.S. Mans 1, M.H. Schonenberg 1, M. Song 1, W.M.P. van der Aalst 1, and P.J.M. Bakker 2 1 Department of Information Systems
Linux Kernel. Security Report
Linux Kernel Security Report September 25 Authors: Andy Chou, Bryan Fulton and Seth Hallem Coverity has combined two years of analysis work carried out in a commercial setting at Coverity with four years
Chapter 6 Basics of Data Integration. Fundamentals of Business Analytics RN Prasad and Seema Acharya
Chapter 6 Basics of Data Integration Fundamentals of Business Analytics Learning Objectives and Learning Outcomes Learning Objectives 1. Concepts of data integration 2. Needs and advantages of using data
The Art of Workload Selection
The Art of Workload Selection 5-1 Overview Services Exercised Example: Timesharing Systems Example: Networks Example: Magnetic Tape Backup System Level of Detail Representativeness Timeliness Other Considerations
New Features... 1 Installation... 3 Upgrade Changes... 3 Fixed Limitations... 4 Known Limitations... 5 Informatica Global Customer Support...
Informatica Corporation B2B Data Exchange Version 9.5.0 Release Notes June 2012 Copyright (c) 2006-2012 Informatica Corporation. All rights reserved. Contents New Features... 1 Installation... 3 Upgrade
Improving Cognos Upgrades Methodology to Lower Costs & Improve Upgrade Management
White Paper Improving Cognos Upgrades Methodology to Lower Costs & Improve Upgrade Management by Edwin van Megesen Motio, Inc. Executive Summary BI platforms are continuously changing. New requirements
Nirikshan: Process Mining Software Repositories to Identify Inefficiencies, Imperfections, and Enhance Existing Process Capabilities
Nirikshan: Process Mining Software Repositories to Identify Inefficiencies, Imperfections, and Enhance Existing Process Capabilities Monika Gupta [email protected] PhD Advisor: Dr. Ashish Sureka Industry
Monitoring MSDynamix CRM 2011
Monitoring MSDynamix CRM 2011 eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be
Managing Custom Data Standards in SAS Clinical Data Integration
PharmaSUG 2015 - Paper DS19-SAS Managing Custom Data Standards in SAS Clinical Data Integration ABSTRACT Melissa R. Martinez, SAS Institute, Inc., Round Rock, Texas, United States SAS Clinical Data Integration
TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support
Vol. 3 Issue 1, January-2014, pp: (32-36), Impact Factor: 1.252, Available online at: www.erpublications.com TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence
Translating Message Sequence Charts to other Process Languages using Process Mining
Translating Message Sequence Charts to other Process Languages using Process Mining Kristian Bisgaard Lassen 1, Boudewijn F. van Dongen 2, and Wil M.P. van der Aalst 2 1 Department of Computer Science,
RECORDS MANAGEMENT & RETENTION. Convercent 2015. All Rights Reserved.
RECORDS MANAGEMENT & RETENTION 1 WHAT YOU RE UP AGAINST Between end of year reporting, regular audits, program benchmarking and potential enforcement action, it s imperative that compliance professionals
Using Event Logs to Derive Role Engineering Artifacts
Using Logs to Derive Role Engineering Artifacts Abstract Process-aware information systems are used to execute business processes to reach the operational goals of an organization. In this context, access
This alignment chart was designed specifically for the use of Red River College. These alignments have not been verified or endorsed by the IIBA.
Red River College Course Learning Outcome Alignment with BABOK Version 2 This alignment chart was designed specifically for the use of Red River College. These alignments have not been verified or endorsed
Process Mining and the ProM Framework: An Exploratory Survey - Extended report
Process Mining and the ProM Framework: An Exploratory Survey - Extended report Jan Claes and Geert Poels Department of Management Information Science and Operations Management, Faculty of Economics and
2.2 INFORMATION SERVICES Documentation of computer services, computer system management, and computer network management.
3 Audit Trail Files Data generated during the creation of a master file or database, used to validate a master file or database during a processing cycle. GS 14020 Retain for 3 backup cycles Computer Run
Data mining analysis of defect data in Software Development Process
Technische Universiteit Eindhoven Department of Technology Management Division of Information Systems Master of Science Thesis Data mining analysis of defect data in Software Development Process by Joan
Social Network Analysis for Business Process Discovery
Social Network Analysis for Business Process Discovery Cláudia Sofia da Costa Alves Dissertation for the degree of Master in Information Systems and Computer Engineering Supervisor: President: Vogal: Prof.
WhatsUp Gold vs. Orion
Gold vs. Building the network management solution that will work for you is very easy with the Gold family just mix-and-match the Gold plug-ins that you need (WhatsVirtual, WhatsConnected, Flow Monitor,
Computer programs (both source and executable) Documentation (both technical and user) Data (contained within the program or external to it)
CHAPTER 27 CHANGE MANAGEMENT Overview Changes are inevitable when software is built. A primary goal of software engineering is to improve the ease with which changes can be made to software. Configuration
Load Testing Basics: These are the basic ideas in setting up a load test By: Bob Wescott
: These are the basic ideas in setting up a load test By: Bob Wescott Summary Load testing requires you to select transactions that are important to you and then synthetically generate them at a rate that
Mining Process Models with Non-Free-Choice Constructs
Mining Process Models with Non-Free-hoice onstructs Lijie Wen 1, Wil M.P. van der alst 2, Jianmin Wang 1, and Jiaguang Sun 1 1 School of Software, Tsinghua University, 100084, eijing, hina [email protected],{jimwang,sunjg}@tsinghua.edu.cn
What s New in BridgeTrak 8.0?
BridgeTrak 8.0 What s New Page 1 What s New in BridgeTrak 8.0? BridgeTrak Help Desk Software BridgeTrak Suite 8.0 is a trouble ticket and help desk application suitable for use in both internal and external
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1. Introduction 1.1 Data Warehouse In the 1990's as organizations of scale began to need more timely data for their business, they found that traditional information systems technology
Running a Workflow on a PowerCenter Grid
Running a Workflow on a PowerCenter Grid 2010-2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise)
Verona: On-Time, On-Scope, On-Quality
Verona: On-Time, On-Scope, On-Quality All project teams struggle to meet the potentially conflicting objectives of delivering ontime, with all committed features and with the highest levels quality. And
Effective and Efficient SAM execution to manage software Spend and Compliance
WHITEPAPER March 2014 www.beroeinc.com Effective and Efficient SAM execution to manage software Spend and Compliance Abstract Yes, Software is a critical asset for any type of industries which plays a
Dept. of IT in Vel Tech Dr. RR & Dr. SR Technical University, INDIA. Dept. of Computer Science, Rashtriya Sanskrit Vidyapeetha, INDIA
ISSN : 2229-4333(Print) ISSN : 0976-8491(Online) Analysis of Workflow and Process Mining in Dyeing Processing System 1 Saravanan. M.S, 2 Dr Rama Sree.R.J 1 Dept. of IT in Vel Tech Dr. RR & Dr. SR Technical
A Test Suite for Basic CWE Effectiveness. Paul E. Black. [email protected]. http://samate.nist.gov/
A Test Suite for Basic CWE Effectiveness Paul E. Black [email protected] http://samate.nist.gov/ Static Analysis Tool Exposition (SATE V) News l We choose test cases by end of May l Tool output uploaded
Service Portfolio Management PinkVERIFY
-11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to
Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study
Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study Mieke Jans, Nadine Lybaert, and Koen Vanhoof Hasselt University, Agoralaan Building D, 3590 Diepenbeek, Belgium http://www.uhasselt.be/
AllPackages. 6/20/2011 H.M.W. Verbeek
6/20/2011 The AllPackages package is a meta -package that depends on all other packages that are contained in the ProM 6.1 release. As a result, after having installed the AllPackages package, all packages
Business Process Discovery
Sandeep Jadhav Introduction Well defined, organized, implemented, and managed Business Processes are very critical to the success of any organization that wants to operate efficiently. Business Process
PayLess: A Low Cost Network Monitoring Framework for Software Defined Networks
PayLess: A Low Cost Network Monitoring Framework for Software Defined Networks Shihabur R. Chowdhury, Md. Faizul Bari, Reaz Ahmed and Raouf Boutaba David R. Cheriton School of Computer Science, University
Process Modelling from Insurance Event Log
Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R
Windows Password Change Scenarios
Windows Password Change Scenarios Summary This document captures various Windows environment password change scenarios and the underlying event data. It covers NetVision s ability to capture the events,
This document contains important information about installation, fixed limitations, and known limitations for B2B Data Exchange.
Informatica Corporation B2B Data Exchange Version 10.0 Release Notes November 2015 Copyright (c) 1993-2015 Informatica LLC. All rights reserved. Contents Installation and Upgrade... 1 New Features... 3
MS SQL Express installation and usage with PHMI projects
MS SQL Express installation and usage with PHMI projects Introduction This note describes the use of the Microsoft SQL Express 2008 database server in combination with Premium HMI projects running on Win31/64
How To Manage It Asset Management On Peoplesoft.Com
PEOPLESOFT IT ASSET MANAGEMENT KEY BENEFITS Streamline the IT Asset Lifecycle Ensure IT and Corporate Compliance Enterprise-Wide Integration Oracle s PeopleSoft IT Asset Management streamlines and automates
Activity Mining for Discovering Software Process Models
Activity Mining for Discovering Software Process Models Ekkart Kindler, Vladimir Rubin, Wilhelm Schäfer Software Engineering Group, University of Paderborn, Germany [kindler, vroubine, wilhelm]@uni-paderborn.de
CMTRAC. Application Overview APPLICATION DATASHEET
Application Overview CMTRAC APPLICATION DATASHEET CMtrac is an innovative web-based tool for controlling and tracking change processes. This tool provides businesses with a simple mechanism to define and
