參考文獻 |
[1] B. Sherehiy, W. Karwowski, and J. K. Layer, "A review of enterprise agility: Concepts, frameworks, and attributes," International Journal of industrial ergonomics, vol. 37, no. 5, pp. 445-460, 2007.
[2] F. Bezerra and J. Wainer, "Anomaly detection algorithms in business process logs," in Proc. of the Tenth International Conference on Enterprise Information Systems (ICEIS), 2008, pp. 11–18.
[3] R. K. L. Ko, "A computer scientist’s introductory guide to business process management (BPM)," Crossroads, vol. 15, no. 4, pp. 11-18, 2009.
[4] Y.-C. Chuang, P.-Y. Hsu, M.-T. Wang, and S.-C. Chen, "A frequency-based algorithm for workflow outlier mining," in Future Generation Information Technology, 2010, pp. 191-207.
[5] J. Eder and E. Panagos, Managing Time in Workflow Systems, in Workflow Handbook, L. Fischer (Ed.), Future Strategies Inc., USA, 2001.
[6] W. Li and Y. Fan, "A time management method in workflow management system," in IEEE Workshops at the Grid and Pervasive Computing Conference (GPC′09), 2009, pp. 3-10.
[7] J. H. Son and M. H. Kim, “Improving the performance of time-constrained workflow processing,” Journal of Systems and Software, vol. 58, no. 3, pp. 211-219, 2001.
[8] S. Kim, N. W. Cho, Y. J. Lee, S. H. Kang, T. Kim, H. Hwang, and D. Mun, "Application of density-based outlier detection to database activity monitoring," Information Systems Frontiers, vol. 15, no. 1, pp. 55-65, 2010.
[9] M. Song and W. M. P. van der Aalst, "Towards comprehensive support for organizational mining," Decision Support Systems, vol. 46, no. 1, pp. 300-317, 2008.
[10] M.-T. Wang, P.-Y. Hsu and Y.-C. Chuang, “Mining workflow outlier with a frequency-based algorithm,” International Journal of Control and Automation, vol. 4, no. 2, pp. 1-22, 2011.
[11] T. Liu, Y. Cheng, and Z. Ni, “Mining event logs to support workflow resource allocation” Knowledge-Based Systems, vol. 35, pp. 320–331, 2012.
[12] D. R. Ferreira and L. H. Thom, "A semantic approach to the discovery of workflow activity patterns in event logs," International Journal of Business Process Integration and Management, vol. 6, no. 1, pp. 4-17, 2012.
[13] Y. Wen, Z. Chen, J. Liu, and J. Chen, “Mining batch processing workflow models from event logs,” Concurrency and Computation: Practice and Experience, vol. 25, no. 13, pp. 1928-1942, 2013.
[14] L. Bouarfa and J. Dankelman, "Workflow mining and outlier detection from clinical activity logs," Journal of Biomedical Informatics, vol. 45, no. 6, pp. 1185–1190, 2012.
[15] Z. Huang, X. Lu , H. Duan, and W. Fan, "Summarizing clinical pathways from event logs," Journal of Biomedical Informatics, vol. 46, no. 1, pp. 111–127, 2013.
[16] V. R. Jakkula, A. S. Crandall, and D. J. Cook, "Enhancing anomaly detection using temporal pattern discovery," in Advanced Intelligent Environments, 2009, pp. 175-194.
[17] G. Bruno and P. Garza, "Temporal outlier detection by using quasi-functional temporal dependencies," Data & Knowledge Engineering, vol. 69, no. 6, pp. 619-639, 2010.
[18] B. Kang, D. Kim, S. H. Kang, "Real-time business process monitoring method for prediction of abnormal termination using KNNI-based LOF prediction," Expert Systems with Applications, vol. 39, no. 5 , pp. 6061-6068, 2012.
[19] S. B. Needleman and C. D. Wunsch, "A general method applicable to the search for similarities in the amino acid sequence of two proteins," Journal of molecular biology, vol. 48, no. 3, pp. 443-453, 1970.
[20] J. H. Son, J. H. Kim, and M. H. O. Kim, “Deadline allocation in a time-constrained workflow,” International Journal of Cooperative Information Systems, vol. 10, no. 4, pp. 509-530, 2014.
[21] F. Angiulli and F. Fassetti, “Exploiting domain knowledge to detect outliers,” Data Mining and Knowledge Discovery, vol. 28, no. 2, pp. 519–568, 2014.
[22] G. Alonso, D. Agrawal, A. El Abbadi, and C. Mohan, “Functionality and limitations of current workflow management systems,” IEEE Expert, vol. 12, no. 5, 1997.
[23] Y. G. Kim, "Process modeling for BPR: Event-process chain approach," in J. I. DeGross, G. Ariau, C. Beath, R. Hoyer, C. Kemmer (eds) Proc. 16th International Conference on Information Systems (ICIS), 1995, p. 11.
[24] H.-H. Hvolby and A. Barfod, "Modelling customer order processes," in Proc. of the 13th IPS Research Seminar on Design for Integration in Manufacturing, 1998, ISBN, 87-89867.
[25] J. H. Trienekens and H.-H. Hvolby, “Models for supply chain reengineering,” Production Planning & Control, vol. 12, no. 3, pp. 254-264, 2001.
[26] H. D. Kuna, R. García-Martinez, F. R. Villatoro, "Outlier detection in audit logs for application systems," Information Systems, vol. 44, pp. 22–33, 2014.
[27] X. Li, Y. Xue, and B. Malin, “Detecting anomalous user behaviors in workflow-driven Web applications,” in Proc. of the 2012 IEEE 31st Symposium on Reliable Distributed Systems, IEEE Computer Society, 2012, pp. 1-10.
[28] A. V. Deokar and O. F. El-Gayar, "Decision-enabled dynamic process management for networked enterprises," Information Systems Frontiers, vol. 13, no.5, pp. 655-668, 2011.
[29] S. Nurcan1 and M. H. Edme, "Intention-driven modeling for flexible workflow applications," Software Process: Improvement and Practice, vol. 10, no. 4, pp. 363-377, 2005.
[30] S.-K. Lee, B. Kim , M. Huh, S. Cho, S. Park, and D. Lee, "Mining transportation logs for understanding the after-assembly block manufacturing process in the shipbuilding industry," Expert Systems with Applications, vol. 40, no. 1, pp. 83-95, 2013.
[31] J. Eder, E. Panagos, and M. Rabinovich, "Time constraints in workflow systems," in Proc. of the 11th International Conference on Advanced Information Systems Engineering (CAiSE), 1999, pp. 286-300.
[32] M. Bierbaumer, J. Eder, and H. Pichler, "Calculation of delay times for workflows with fixed-date constraints," in Proc. of 7th IEEE International Conference on E-Commerce Technology, 2005, pp. 544 - 547.
[33] B. Weber, B. F. van Dongen, M. Pesic, and C. W. Guenther, “Supporting flexible processes through recommendations based on history,” in Proc. of the 6th International Conference on Business Process Management, 2008, pp. 51-66.
[34] A. Rozinat, R. S. Mans, M. S. Song, W. M. P. van der Aalst, "Discovering colored Petri nets from event logs," International Journal on Software Tools for Technology Transfer, vol. 10, no. 1, pp. 57-74, 2008.
[35] A. Rozinat, R. S. Mans, M. S. Song, W. M. P. van der Aalst, "Discovering simulation models," Information Systems, vol. 34, no. 3, pp. 305-327, 2009.
[36] H. Wang and Q. Zeng, “Modeling and analysis for workflow constrained by resources and nondetermined time: An approach based on Petri nets,” in IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 2008, vol. 38, no. 4, pp. 802– 817.
[37] W. M. P. van der Aalst, K. M. van Hee, A. H. ter Hofstede, N. Sidorova, H. M. Verbeek, M. Voorhoeve, and M. T. Wynn, “Soundness of workflow nets: classification, decidability, and analysis,” Formal Aspects of Computing, vol. 23, no. 3, pp. 333-363, 2011.
[38] Y. Liu, H. Zhang, C. Li, and R. J. Jiao, “Workflow simulation for operational decision support using event graph through process mining,” Decision Support Systems, vol. 52, no. 3, pp. 685–697, 2012.
[39] H. Zhuge, T. Cheung, and H. K. Pung, “A timed workflow process model,” Journal of Systems and Software, vol. 55, no. 3, pp. 231-243, 2001.
[40] R. S. Mans, N. C. Russell, W. van der Aalst, P. J. Bakker, and A. J. Moleman, "Simulation to analyze the impact of a schedule-aware workflow management system," Simulation, vol. 86, no. 8-9, pp. 519-541, 2010.
[41] Q. Zeng, S. X. Sun, H. Duan, C. Liu, and H. Wang, “Cross-organizational collaborative workflow mining from a multi-source log,” Decision Support Systems, vol. 54, no. 3, pp. 1280–1301, 2013.
[42] L. Xu, H. Liu, S. Wang, and K. Wang, “Modelling and analysis techniques for cross-organizational workflow systems,” Systems Research and Behavioral Science, vol. 26, no. 3, pp. 367-389, 2009.
[43] X. H. Jiang and Z. X. Nie, "Load-related completion time estimation for business process instances," Computer Integrated Manufacturing Systems, vol. 17, no. 8, pp. 1640-1646, 2011.
[44] S. X. Sun and J. L. Zhao, “Formal workflow design analytics using data flow modeling,” Decision Support Systems, vol. 55, no.1, pp. 270–283, 2013.
[45] C. Earl, The fuzzy systems handbook, A Practitioner′s Guide to Building, Using, and Maintaining Fuzzy Systems, Boston: AP Professional, 1994.
[46] H. Liu, F. Hussain, C. L. Tan, and M. Dash, “Discretization: An enabling technique," Data Mining Knowledge Discovery, vol. 6, no. 4, pp. 393–423, 2002.
[47] O. Shafiq, R. Alhajj, and J. Rokne, "Log based business process engineering using fuzzy web service discovery," Knowledge-Based Systems, vol. 60, pp. 1-9, 2014.
[48] W. M. P. van der Aalst, “Formalization and verification of event-driven process chains,” Information and Software Technology, vol. 41, no. 10, pp. 639-650, 1999.
[49] M. M. Breunig, H.-P. Kriegel, R. T. Ng and J. Sander, "LOF: Identifying density-based local outliers," in ACM sigmod record, 2000, vol. 29, no. 2, pp. 93-104.
[50] B. Kang, S. K. Lee, Y. B. Min, S. H. Kang, and N. W. Cho, "Real-time process quality control for business activity monitoring," in IEEE International Conference on Computational Science and Its Applications (ICCSA′09), 2009. pp. 237-242.
[51] D. Grigori, F. Casati, U. Dayal, and M.-C. Shan, "Improving business process quality through exception understanding, prediction, and prevention," in Proc. of the 27th very large data base endowment conference, 2001, pp. 159–168.
[52] D. Grigori, F. Casati, M. Castellanos, U. Dayal, M. Sayal, and M.-C. Shan, "Business process intelligence," Computers in Industry, vol. 53, no. 3, pp. 321–343, 2004.
[53] V. Bhatt, K. G. Sharma, A. Ram, "An enhanced approach for LOF in data mining," in IEEE International Conference on Green High Performance Computing (ICGHPC), 2013, p. 1-3.
[54] Y. Ma, H. Shi, H. Ma, and M. Wang, "Dynamic process monitoring using adaptive local outlier factor," Chemometrics and Intelligent Laboratory Systems, vol. 127, pp. 89–101, 2013.
[55] D. M. Hawkins, Identification of Outliers, London: Chapman and Hall, 1980.
[56] G. Terzakis, How can we find the k in kNN, http://www.researchgate.net/, 2014.
|