Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Mining Frequent Instances on Workflows

    A workflow is a partial or total automation of a business process, in which a collection of activities must be executed by humans or machines, according to certain procedural rules. This paper deals with an aspec...

    Gianluigi Greco, Antonella Guzzo in Advances in Knowledge Discovery and Data M… (2003)

  2. No Access

    Chapter and Conference Paper

    Reasoning on Workflow Executions

    This paper presents a new formalism for modelling workflows schemes which combines a control flow graph representation with simple (i.e., stratified), yet powerful DATALOG rules to express complex properties and ...

    Gianluigi Greco, Antonella Guzzo in Advances in Databases and Information Syst… (2003)

  3. No Access

    Chapter and Conference Paper

    Mining Expressive Process Models by Clustering Workflow Traces

    We propose a general framework for the process mining problem which encompasses the assumption of workflow schema with local constraints only, for it being applicable to more expressive specification languages...

    Gianluigi Greco, Antonella Guzzo in Advances in Knowledge Discovery and Data M… (2004)

  4. No Access

    Chapter and Conference Paper

    An Ontology-Driven Process Modeling Framework

    Designing, analyzing and managing complex processes are recently become crucial issues in most application contexts, such as e-commerce, business process (re-)engineering, Web/grid computing. In this paper, we...

    Gianluigi Greco, Antonella Guzzo in Database and Expert Systems Applications (2004)

  5. No Access

    Chapter and Conference Paper

    Modelling a Protein Structure Comparison Application on the Grid Using PROTEUS

    Bioinformatics applications manage complex biological data stored into distributed and often heterogeneous databases and require large computing power. Among these, protein structure comparison applications ex...

    Mario Cannataro, Matteo Comin, Carlo Ferrari in Scientific Applications of Grid Computing (2005)

  6. No Access

    Chapter and Conference Paper

    Mining Hierarchies of Models: From Abstract Views to Concrete Specifications

    Process mining techniques have been receiving great attention in the literature for their ability to automatically support process (re)design. The output of these techniques is a concrete workflow schema that ...

    Gianluigi Greco, Antonella Guzzo, Luigi Pontieri in Business Process Management (2005)

  7. Chapter and Conference Paper

    An Information-Theoretic Framework for High-Order Co-clustering of Heterogeneous Objects

    The high-order co-clustering problem, i.e., the problem of simultaneously clustering several heterogeneous types of domains, is usually faced by minimizing a linear combination of some optimization functions eval...

    Antonio D. Chiaravalloti, Gianluigi Greco, Antonella Guzzo in Machine Learning: ECML 2006 (2006)

  8. No Access

    Chapter and Conference Paper

    An Information-Theoretic Framework for Process Structure and Data Mining

    Process-oriented systems have been increasingly attracting data mining community, due to the opportunities the application of inductive process mining techniques to log data can open to both the analysis of compl...

    Antonio D. Chiaravalloti, Gianluigi Greco in Data Warehousing and Knowledge Discovery (2006)

  9. No Access

    Chapter and Conference Paper

    Mining Constrained Graphs: The Case of Workflow Systems

    Constrained graphs are directed graphs describing the control flow of processes models. In such graphs, nodes represent activities involved in the process, and edges the precedence relationship among such acti...

    Gianluigi Greco, Antonella Guzzo in Constraint-Based Mining and Inductive Data… (2006)

  10. No Access

    Article

    AZD3409 inhibits the growth of breast cancer cells with intrinsic resistance to the EGFR tyrosine kinase inhibitor gefitinib

    AKT and MAPK signaling are involved in the resistance of breast cancer cells to the EGFR tyrosine kinase inhibitor gefitinib. RAS proteins are upstream mediators that transfer messages from surface receptors t...

    Monica R. Maiello, Amelia D’Alessio in Breast Cancer Research and Treatment (2007)

  11. No Access

    Chapter and Conference Paper

    Outlier Detection Techniques for Process Mining Applications

    Classical outlier detection approaches may hardly fit process mining applications, since in these settings anomalies emerge not only as deviations from the sequence of events most often registered in the log, ...

    Lucantonio Ghionna, Gianluigi Greco, Antonella Guzzo in Foundations of Intelligent Systems (2008)

  12. No Access

    Chapter and Conference Paper

    Process Mining Based on Clustering: A Quest for Precision

    Process mining techniques attempt to extract non-trivial and useful information from event logs recorded by information systems. For example, there are many process mining techniques to automatically discover ...

    Ana Karla Alves de Medeiros, Antonella Guzzo in Business Process Management Workshops (2008)

  13. No Access

    Chapter and Conference Paper

    Discovering Multi-perspective Process Models: The Case of Loosely-Structured Processes

    Process Mining techniques exploit the information stored in the execution log of a process to extract some high-level process model, useful for analysis or design tasks. Most of these techniques focus on “stru...

    Francesco Folino, Gianluigi Greco, Antonella Guzzo in Enterprise Information Systems (2009)

  14. No Access

    Chapter and Conference Paper

    Count Constraints and the Inverse OLAP Problem: Definition, Complexity and a Step toward Aggregate Data Exchange

    A typical problem in database theory is to verify whether there exists a relation (or database) instance satisfying a number of given dependency constraints. This problem has recently received a renewed deal o...

    Domenico Saccà, Edoardo Serra in Foundations of Information and Knowledge S… (2012)

  15. Chapter and Conference Paper

    Process Mining Manifesto

    Process mining techniques are able to extract knowledge from event logs commonly available in today’s information systems. These techniques provide new means to discover, monitor, and improve processes in a varie...

    Wil van der Aalst, Arya Adriansyah in Business Process Management Workshops (2012)

  16. No Access

    Chapter and Conference Paper

    Intrusion Detection with Hypergraph-Based Attack Models

    In numerous security scenarios, given a sequence of logged activities, it is necessary to look for all subsequences that represent an intrusion, which can be meant as any “improper” use of a system, an attempt...

    Antonella Guzzo, Andrea Pugliese in Graph Structures for Knowledge Representat… (2014)

  17. No Access

    Chapter and Conference Paper

    Coalition Formation with Logic-Based Agents

    Coalition formation is studied in a setting where agents take part to a group decision-making scenario and where their preferences are expressed via weighted propositional logic, in particular by considering f...

    Gianluigi Greco, Antonella Guzzo in Multi-Agent Systems and Agreement Technologies (2017)

  18. No Access

    Chapter and Conference Paper

    FD-VAE: A Feature Driven VAE Architecture for Flexible Synthetic Data Generation

    Variational autoencoders (VAEs) are artificial neural networks used to learn effective data encodings in an unsupervised manner. Each input x provided to a VAE is indeed mapped to an internal representation, say

    Gianluigi Greco, Antonella Guzzo in Database and Expert Systems Applications (2020)

  19. No Access

    Chapter and Conference Paper

    A Framework for the Multi-modal Analysis of Novel Behavior in Business Processes

    Novelty detection refers to the task of finding observations that are new or unusual when compared to the ‘known’ behavior. Its practical and challenging nature has been proven in many application domains whil...

    Antonino Rullo, Antonella Guzzo in Intelligent Data Engineering and Automated… (2020)

  20. Article

    Open Access

    Identification and prediction of attacks to industrial control systems using temporal point processes

    The task of identifying malicious activities in logs and predicting threats is crucial nowadays in industrial sector. In this paper, we focus on the identification of past malicious activities and in the predi...

    Giancarlo Fortino, Claudia Greco in Journal of Ambient Intelligence and Humani… (2023)

previous disabled Page of 2