![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Revealing the Importance of Setting Parameters in Declarative Discovery Algorithms: An Evolutionary-Based Methodology
Through constraints, declarative process models represent the permitted behaviour associated with a business process, by limiting the potential correct traces. These models can be discovered by analysing an ev...
-
Chapter and Conference Paper
Dynamic Checks of Evidence Models for Assurance Projects in Eclipse OpenCert
The modelling of regulatory frameworks and industry standards, including their argumentation and expected evidence, are used during assurance processes to demonstrate the compliance of systems. However, this i...
-
Article
Discovering configuration workflows from existing logs using process mining
Variability models are used to build configurators, for guiding users through the configuration process to reach the desired setting that fulfils user requirements. The same variability model can be used to de...
-
Chapter
Enabling Process Mining in Airbus Manufacturing
-
Situation faced: Organizations use process mining to understand and improve their processes and to detect deviations. ...
-
-
Chapter and Conference Paper
A NLP-Oriented Methodology to Enhance Event Log Quality
The quality of event logs is a crucial cornerstone for the feasibility of the application of later process mining techniques. The wide variety of data that can be included in an event log refer to information ...
-
Article
Measuring data-centre workflows complexity through process mining: the Google cluster case
Data centres have become the backbone of large Cloud services and applications, providing virtually unlimited elastic and scalable computational and storage resources. The search for the efficiency and optimis...
-
Chapter and Conference Paper
Definition and Verification of Security Configurations of Cyber-Physical Systems
The proliferation of Cyber-Physical Systems (CPSs) is raising serious security challenges. These are complex systems, integrating physical elements into automated networked systems, often containing a variety ...
-
Chapter and Conference Paper
DMN for Data Quality Measurement and Assessment
Data Quality assessment is aimed at evaluating the suitability of a dataset for an intended task. The extensive literature on data quality describes the various methodologies for assessing data quality by mea...
-
Chapter
Model-Based Software Debugging
The complexity and size of software systems have rapidly increased in recent years, with software engineers facing ever-growing challenges in building and maintaining such systems. In particular, testing and d...
-
Chapter
Constraint-Driven Fault Diagnosis
Constraint-Driven Fault Diagnosis (CDD) is based on the concept of constraint suspension [6], which was proposed as an approach to fault detection and . In this chapter, its capabilities are demonstrated by d...
-
Chapter and Conference Paper
FABIOLA: Towards the Resolution of Constraint Optimization Problems in Big Data Environment
The optimization problems can be found in several examples within companies, such as the minimization of the production costs, the faults produced, or the maximization of customer loyalty. The resolution of th...
-
Chapter and Conference Paper
A Usage Control Model Extension for the Verification of Security Policies in Artifact-Centric Business Process Models
Artifact-centric initiatives have been used in business processes whose data management is complex, being the simple activity-centric workflow description inadequate. Several artifact-centric initiatives pursu...