We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Complex Event Processing Methods for Process Querying

    Business Process Management targets the design, execution, and optimization of business operations. This includes techniques for process querying,...
    Han van der Aa, Alexander Artikis, Matthias Weidlich in Process Querying Methods
    Chapter 2022
  2. Complex Event Processing (CEP)

    Sandra Geisler in Encyclopedia of Big Data
    Reference work entry 2022
  3. Brand sponsorship effectiveness: how self-congruity, event attachment, and subjective event knowledge matters to sponsor brands

    The present study aims to understand the impact of actual and ideal self-congruity with an event on spectators’ attitude and purchase intentions...

    Tapas Ranjan Moharana, Debashree Roy, Garima Saxena in Journal of Brand Management
    Article 28 March 2023
  4. Why advertisers should embrace event typicality and maximize leveraging of major events

    The current study details how marketing campaigns featuring event-typical ads adapted to sporting events (e.g., a car ad that displays its brand logo...

    François A. Carrillat, Marc Mazodier, Christine Eckert in Journal of the Academy of Marketing Science
    Article Open access 27 March 2024
  5. Dare more Psychology – Taxonomy of Event Psychology Knowledge and Competencies for Contemporary Event Education (TEPKC)

    Evolving trends in event management, characterized by the rise of online events, hybrid formats, and virtual platforms, demand a revised educational...
    Chapter 2024
  6. Assessing the Suitability of Traditional Event Log Standards for IoT-Enhanced Event Logs

    Since IoT devices supporting business processes (BPs) in sectors like manufacturing, logistics or healthcare can collect data on the execution of the...
    Yannis Bertrand, Jochen De Weerdt, Estefanía Serral in Business Process Management Workshops
    Conference paper 2023
  7. An Experiment on Transfer Learning for Suffix Prediction on Event Logs

    Predicting future activity occurrences for a process instance is a key challenge in predictive process monitoring. Sequential deep learning models...
    Mathieu van Luijken, István Ketykó, Felix Mannhardt in Business Process Management Workshops
    Conference paper 2024
  8. Star help and knowledge transfer: an event study analysis of star interactions observed from acknowledgement texts

    This paper contributes to the growing literature on the impact of connections to star scientists on the productivity of academic scientists. The...

    Akhil Sasidharan, John McHale, Jason Harold in The Journal of Technology Transfer
    Article Open access 24 March 2024
  9. Real-time gras** strategies using event camera

    Robotic vision plays a key role for perceiving the environment in gras** applications. However, the conventional framed-based robotic vision,...

    **aoqian Huang, Mohamad Halwani, ... Yahya Zweiri in Journal of Intelligent Manufacturing
    Article Open access 10 January 2022
  10. Beta tourist world: a conceptual framework for organizing an event in the metaverse

    The relationships between metaverse applications and tourism can be categorized into two dimensions. One is about the effects of metaverse...

    Ilkay Tas Gursoy, Erdem Aktas, ... O. Avsar Kurgun in Information Technology & Tourism
    Article 07 September 2023
  11. Foundations of Process Event Data

    Process event data is a fundamental building block for process mining as event logs portray the execution trails of business processes from which...
    Jochen De Weerdt, Moe Thandar Wynn in Process Mining Handbook
    Chapter Open access 2022
  12. vAMoS: eVent Abstraction via Motifs Search

    Process mining analyzes events that are logged during the execution of a business process. The level of abstraction at which a process model is...
    Gemma Di Federico, Andrea Burattin in Business Process Management Workshops
    Conference paper 2023
  13. Intelligent Architectures for Extreme Event Visualisation

    Realistic immersive visualisation can provide a valuable method for studying extreme events and enhancing our understanding of their complexity,...
    Yang Song, Maurice Pagnucco, ... Michael J. Ostwald in Climate Disaster Preparedness
    Chapter Open access 2024
  14. Discrete Event Simulation of Manufacturing Processes and Inventory Control

    This chapter is devoted to the development of simulation models for manufacturing process and inventory control. First, we learn principles of...
    Chapter 2024
  15. Event-triggered hierarchical learning control of air-breathing hypersonic vehicles with predefined-time convergence

    This study delves into an event-triggered hierarchical learning control framework for air-breathing hypersonic vehicles subject to practically...

    Guan Wang, Hongwei **a in Journal of Intelligent Manufacturing
    Article 30 November 2023
  16. Supporting Event Log Extraction Based on Matching

    Process mining allows organizations to obtain relevant insights into the execution of their processes. However, the starting point of any process...
    Vinicius Stein Dani, Henrik Leopold, ... Hajo A. Reijers in Business Process Management Workshops
    Conference paper 2023
  17. Information Management and Data Processing

    Commencing with a brief review of the nature of data and data management this chapter explores a range of issues related to data processing, data...
    Chapter 2024
  18. Monitoring Business Process Compliance Across Multiple Executions with Stream Processing

    Compliance checking is the operation that consists of assessing whether every execution trace of a business process satisfies a given correctness...
    Chukri Soueidi, Yliès Falcone, Sylvain Hallé in Enterprise Design, Operations, and Computing. EDOC 2023 Workshops
    Conference paper 2024
  19. Automatic detection of phishing pages with event-based request processing, deep-hybrid feature extraction and light gradient boosted machine model

    Cyber attackers target unconscious users with phishing methods is a serious threat to cyber security. It is important to quickly detect benign web...

    Ömer Kasim in Telecommunication Systems
    Article 19 May 2021
Did you find what you were looking for? Share feedback.