Search
Search Results
-
Complex Event Processing Methods for Process Querying
Business Process Management targets the design, execution, and optimization of business operations. This includes techniques for process querying,... -
-
-
Brand sponsorship effectiveness: how self-congruity, event attachment, and subjective event knowledge matters to sponsor brands
The present study aims to understand the impact of actual and ideal self-congruity with an event on spectators’ attitude and purchase intentions...
-
Why advertisers should embrace event typicality and maximize leveraging of major events
The current study details how marketing campaigns featuring event-typical ads adapted to sporting events (e.g., a car ad that displays its brand logo...
-
Dare more Psychology – Taxonomy of Event Psychology Knowledge and Competencies for Contemporary Event Education (TEPKC)
Evolving trends in event management, characterized by the rise of online events, hybrid formats, and virtual platforms, demand a revised educational... -
Assessing the Suitability of Traditional Event Log Standards for IoT-Enhanced Event Logs
Since IoT devices supporting business processes (BPs) in sectors like manufacturing, logistics or healthcare can collect data on the execution of the... -
An Experiment on Transfer Learning for Suffix Prediction on Event Logs
Predicting future activity occurrences for a process instance is a key challenge in predictive process monitoring. Sequential deep learning models... -
Star help and knowledge transfer: an event study analysis of star interactions observed from acknowledgement texts
This paper contributes to the growing literature on the impact of connections to star scientists on the productivity of academic scientists. The...
-
Real-time gras** strategies using event camera
Robotic vision plays a key role for perceiving the environment in gras** applications. However, the conventional framed-based robotic vision,...
-
Beta tourist world: a conceptual framework for organizing an event in the metaverse
The relationships between metaverse applications and tourism can be categorized into two dimensions. One is about the effects of metaverse...
-
Foundations of Process Event Data
Process event data is a fundamental building block for process mining as event logs portray the execution trails of business processes from which... -
vAMoS: eVent Abstraction via Motifs Search
Process mining analyzes events that are logged during the execution of a business process. The level of abstraction at which a process model is... -
Intelligent Architectures for Extreme Event Visualisation
Realistic immersive visualisation can provide a valuable method for studying extreme events and enhancing our understanding of their complexity,... -
Discrete Event Simulation of Manufacturing Processes and Inventory Control
This chapter is devoted to the development of simulation models for manufacturing process and inventory control. First, we learn principles of... -
Event-triggered hierarchical learning control of air-breathing hypersonic vehicles with predefined-time convergence
This study delves into an event-triggered hierarchical learning control framework for air-breathing hypersonic vehicles subject to practically...
-
Supporting Event Log Extraction Based on Matching
Process mining allows organizations to obtain relevant insights into the execution of their processes. However, the starting point of any process... -
Information Management and Data Processing
Commencing with a brief review of the nature of data and data management this chapter explores a range of issues related to data processing, data... -
Monitoring Business Process Compliance Across Multiple Executions with Stream Processing
Compliance checking is the operation that consists of assessing whether every execution trace of a business process satisfies a given correctness... -
Automatic detection of phishing pages with event-based request processing, deep-hybrid feature extraction and light gradient boosted machine model
Cyber attackers target unconscious users with phishing methods is a serious threat to cyber security. It is important to quickly detect benign web...