Skip to main content

previous disabled Page of 2
and
  1. Article

    Open Access

    Case notion discovery and recommendation: automated event log building on databases

    Process mining techniques use event logs as input. When analyzing complex databases, these event logs can be built in many ways. Events need to be grouped into traces corresponding to a case. Different groupin...

    E. González López de Murillas, H. A. Reijers in Knowledge and Information Systems (2020)

  2. Article

    Open Access

    Discovering workflow nets using integer linear programming

    Process mining is concerned with the analysis, understanding and improvement of business processes. Process discovery, i.e. discovering a process model based on an event log, is considered the most challenging...

    S. J. van Zelst, B. F. van Dongen, W. M. P. van der Aalst, H. M. W. Verbeek in Computing (2018)

  3. No Access

    Article

    Using Event Logs for Local Correction of Process Models

    During the life-cycle of an Information System (IS) its actual behavior may not correspond to the original system model. However, to the IS support it is very important to have the latest model that reflects t...

    A. A. Mitsyuk, I. A. Lomazova in Automatic Control and Computer Sciences (2017)

  4. No Access

    Article

    Revising history for cost-informed process improvement

    Organisations are constantly seeking new ways to improve operational efficiencies. This study investigates a novel way to identify potential efficiency gains in business operations by observing how they were c...

    W. Z. Low, S. K. L. M. vanden Broucke, M. T. Wynn, A. H. M. ter Hofstede in Computing (2016)

  5. No Access

    Article

    Business process management as the “Killer App” for Petri nets

    Since their inception in 1962, Petri nets have been used in a wide variety of application domains. Although Petri nets are graphical and easy to understand, they have formal semantics and allow for analysis te...

    W. M. P. van der Aalst in Software & Systems Modeling (2015)

  6. No Access

    Article

    Measuring precision of modeled behavior

    Conformance checking techniques compare observed behavior (i.e., event logs) with modeled behavior for a variety of reasons. For example, discrepancies between a normative process model and recorded behavior m...

    A. Adriansyah, J. Munoz-Gama, J. Carmona in Information Systems and e-Business Managem… (2015)

  7. No Access

    Article

    Geschäftsprozessmodellierung: Die ,,Killer-Applikation“ für Petrinetze

    Seit ihrem Entwurf im Jahr 1962 sind Petrinetze in ganz unterschiedlichen Bereichen eingesetzt worden. Obwohl sie graphisch dargestellt werden und intuitiv einfach verständlich sind, haben Petrinetze eine form...

    W.M.P. van der Aalst in Informatik-Spektrum (2014)

  8. No Access

    Article

    What makes a good process model?

    There seems to be a never ending stream of new process modeling notations. Some of these notations are foundational and have been around for decades (e.g., Petri nets). Other notations are vendor specific, inc...

    W. M. P. van der Aalst in Software & Systems Modeling (2012)

  9. Article

    Open Access

    Workflow patterns put into context

    In his paper “Approaches to Modeling Business Processes. A Critical Analysis of BPMN, Workflow Patterns and YAWL”, Egon Börger criticizes the work of the Workflow Patterns Initiative in a rather provocative ma...

    W. M. P. van der Aalst, A. H. M. ter Hofstede in Software & Systems Modeling (2012)

  10. Article

    Open Access

    Soundness of workflow nets: classification, decidability, and analysis

    Workflow nets, a particular class of Petri nets, have become one of the standard ways to model and analyze workflows. Typically, they are used as an abstraction of the workflow that is used to check the so-called...

    W. M. P. van der Aalst, K. M. van Hee, A. H. M. ter Hofstede in Formal Aspects of Computing (2011)

  11. Article

    Open Access

    Process mining: a two-step approach to balance between underfitting and overfitting

    Process mining includes the automated discovery of processes from event logs. Based on observed events (e.g., activities being executed or messages being exchanged) a process model is constructed. One of the e...

    W. M. P. van der Aalst, V. Rubin, H. M. W. Verbeek in Software & Systems Modeling (2010)

  12. No Access

    Article

    Radiology information system: a workflow-based approach

    Introducing workflow management technology in healthcare seems to be prospective in dealing with the problem that the current healthcare Information Systems cannot provide sufficient support for the process ma...

    **yan Zhang, Xudong Lu, Hongchao Nie in International Journal of Computer Assisted… (2009)

  13. Article

    Open Access

    Declarative workflows: Balancing between flexibility and support

    Today’s process-aware information systems tend to either support business processes or provide flexibility. Classical workflow management systems offer good process support as long as the processes are struc...

    W. M. P. van der Aalst, M. Pesic in Computer Science - Research and Development (2009)

  14. Article

    Open Access

    Discovering colored Petri nets from event logs

    Process-aware information systems typically log events (e.g., in transaction logs or audit trails) related to the actual execution of business processes. Analysis of these execution logs may reveal important k...

    A. Rozinat, R. S. Mans, M. Song in International Journal on Software Tools fo… (2008)

  15. Article

    Open Access

    Protos2CPN: using colored Petri nets for configuring and testing business processes

    Protos is a popular tool for business process modelling used in more than 1,500 organizations. It has a built-in Petri-net-based simulation engine which shows key performance indicators for the modelled proces...

    F. Gottschalk, W. M. P. van der Aalst in International Journal on Software Tools fo… (2008)

  16. Article

    Open Access

    Genetic process mining: an experimental evaluation

    One of the aims of process mining is to retrieve a process model from an event log. The discovered models can be used as objective starting points during the deployment of process-aware information systems (Dumas...

    A. K. A. de Medeiros, A. J. M. M. Weijters in Data Mining and Knowledge Discovery (2007)

  17. No Access

    Article

    Business alignment: using process mining as a tool for Delta analysis and conformance testing

    Increasingly, business processes are being controlled and/or monitored by information systems. As a result, many business processes leave their “footprints” in transactional information systems, i.e., business...

    W. M. P. van der Aalst in Requirements Engineering (2005)

  18. No Access

    Article

    XRL/Woflan: Verification and Extensibility of an XML/Petri-Net-Based Language for Inter-Organizational Workflows

    In this paper, we present XRL/Woflan. XRL/Woflan is a software tool using state-of-the-art Petri-net analysis techniques for verifying XRL workflows. The workflow language XRL (eXchangeable Routing Language) s...

    H.M.W. Verbeek, W.M.P. van der Aalst, Akhil Kumar in Information Technology and Management (2004)

  19. No Access

    Article

    Inheritance of Interorganizational Workflows: How to Agree to Disagree Without Loosing Control?

    Internet-based technology, E-commerce, and the rise of networked virtual enterprises have fueled the need for interorganizational workflows. Although XML allows trading partners to exchange information, it can...

    W.M.P. van der Aalst in Information Technology and Management (2003)

  20. No Access

    Article

    Workflow Patterns

    Differences in features supported by the various contemporary commercial workflow management systems point to different insights of suitability and different levels of expressive power. The challenge, which we un...

    W.M.P. van der Aalst, A.H.M. ter Hofstede in Distributed and Parallel Databases (2003)

previous disabled Page of 2