![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Mining Frequent Instances on Workflows
A workflow is a partial or total automation of a business process, in which a collection of activities must be executed by humans or machines, according to certain procedural rules. This paper deals with an aspec...
-
Chapter and Conference Paper
Reasoning on Workflow Executions
This paper presents a new formalism for modelling workflows schemes which combines a control flow graph representation with simple (i.e., stratified), yet powerful DATALOG rules to express complex properties and ...
-
Chapter and Conference Paper
Mining Expressive Process Models by Clustering Workflow Traces
We propose a general framework for the process mining problem which encompasses the assumption of workflow schema with local constraints only, for it being applicable to more expressive specification languages...
-
Chapter and Conference Paper
An Ontology-Driven Process Modeling Framework
Designing, analyzing and managing complex processes are recently become crucial issues in most application contexts, such as e-commerce, business process (re-)engineering, Web/grid computing. In this paper, we...
-
Chapter and Conference Paper
Modelling a Protein Structure Comparison Application on the Grid Using PROTEUS
Bioinformatics applications manage complex biological data stored into distributed and often heterogeneous databases and require large computing power. Among these, protein structure comparison applications ex...
-
Chapter and Conference Paper
Mining Hierarchies of Models: From Abstract Views to Concrete Specifications
Process mining techniques have been receiving great attention in the literature for their ability to automatically support process (re)design. The output of these techniques is a concrete workflow schema that ...
-
Chapter and Conference Paper
An Information-Theoretic Framework for High-Order Co-clustering of Heterogeneous Objects
The high-order co-clustering problem, i.e., the problem of simultaneously clustering several heterogeneous types of domains, is usually faced by minimizing a linear combination of some optimization functions eval...
-
Chapter and Conference Paper
An Information-Theoretic Framework for Process Structure and Data Mining
Process-oriented systems have been increasingly attracting data mining community, due to the opportunities the application of inductive process mining techniques to log data can open to both the analysis of compl...
-
Chapter and Conference Paper
Mining Constrained Graphs: The Case of Workflow Systems
Constrained graphs are directed graphs describing the control flow of processes models. In such graphs, nodes represent activities involved in the process, and edges the precedence relationship among such acti...
-
Chapter and Conference Paper
Outlier Detection Techniques for Process Mining Applications
Classical outlier detection approaches may hardly fit process mining applications, since in these settings anomalies emerge not only as deviations from the sequence of events most often registered in the log, ...
-
Chapter and Conference Paper
Process Mining Based on Clustering: A Quest for Precision
Process mining techniques attempt to extract non-trivial and useful information from event logs recorded by information systems. For example, there are many process mining techniques to automatically discover ...
-
Chapter and Conference Paper
Discovering Multi-perspective Process Models: The Case of Loosely-Structured Processes
Process Mining techniques exploit the information stored in the execution log of a process to extract some high-level process model, useful for analysis or design tasks. Most of these techniques focus on “stru...
-
Chapter and Conference Paper
Count Constraints and the Inverse OLAP Problem: Definition, Complexity and a Step toward Aggregate Data Exchange
A typical problem in database theory is to verify whether there exists a relation (or database) instance satisfying a number of given dependency constraints. This problem has recently received a renewed deal o...
-
Chapter and Conference Paper
Process Mining Manifesto
Process mining techniques are able to extract knowledge from event logs commonly available in today’s information systems. These techniques provide new means to discover, monitor, and improve processes in a varie...
-
Chapter and Conference Paper
Intrusion Detection with Hypergraph-Based Attack Models
In numerous security scenarios, given a sequence of logged activities, it is necessary to look for all subsequences that represent an intrusion, which can be meant as any “improper” use of a system, an attempt...
-
Chapter and Conference Paper
Coalition Formation with Logic-Based Agents
Coalition formation is studied in a setting where agents take part to a group decision-making scenario and where their preferences are expressed via weighted propositional logic, in particular by considering f...
-
Chapter and Conference Paper
FD-VAE: A Feature Driven VAE Architecture for Flexible Synthetic Data Generation
Variational autoencoders (VAEs) are artificial neural networks used to learn effective data encodings in an unsupervised manner. Each input x provided to a VAE is indeed mapped to an internal representation, say
-
Chapter and Conference Paper
A Framework for the Multi-modal Analysis of Novel Behavior in Business Processes
Novelty detection refers to the task of finding observations that are new or unusual when compared to the ‘known’ behavior. Its practical and challenging nature has been proven in many application domains whil...
-
Chapter
Firmware Dynamic Analysis Through Rewriting
The proliferation of IoT devices and their increasing integration into daily life has led to significant security concerns. Due to the presence of a multitude of easily exploitable security vulnerabilities, th...
-
Chapter and Conference Paper
SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language
The Internet of Things (IoT) has brought about significant advancements in connectivity but has also introduced security challenges due to the diverse range of IoT devices. Traditional security solutions strug...