[1] 余来文.大数据商业模式[M].经济管理出版社,2014.
[2] 李骥宇.大数据交易模式的探讨[J].移动通信,2016,40(5):41-44.
[3] 冯朝胜,秦志光,袁丁,等.云计算环境下访问控制关键技术[J].电子学报,2015,43(2):312-319. FENG Chaosheng,QIN Zhiguang,YUAN Ding,et al.Key techniques of access control for cloud computing[J].Acta Electronica Sinica,2015,43(2):312-319.(in Chinese)
[4] Aalst W M P V D,Hofstede A H M T,Weske M.Business process management:a survey[J].Lecture Notes in Computer Science,2008,10(2):1-12.
[5] Cheng Z,Zhu R,Chen P,et al.A distributed process management model for better scalability on multicore platform[J].Chinese Journal of Electronics,2017,26(2):263-270.
[6] 黄贻望,何克清,冯在文,等.一种目标感知的可配置业务流程分析方法[J].电子学报,2014,42(10):2060-2068. HUANG Yiwang,HE Keqing,et al.A goal-aware analytical method of configurable business process[J].Acta Electronica Sinica,2014,42(10):2060-2068.(in Chinese)
[7] 于汪洋,黄昭,方贤文.电子商务业务流程网的可达分析方法[J].电子学报,2017,45(7):1731-1739. YU Wangyang,HUANG Zhao,FANG Xianwen.Reachabil-ity analysis methods of e-commerce business process net[J].Acta Electronica Sinica,2017,45(7):1731-1739.(in Chinese)
[8] Aalst W M P V D,Medeiros A K A D,Weijters A J M M.Genetic process mining[J].Lecture Notes in Computer Science,2006,14(2):76-83.
[9] van der Aalst W M P.Process Mining:Data Science in Action[M].Springer,2016.
[10] 杜玉越,朱鸿儒,王路,等.一种基于逻辑Petri网的过程挖掘方法[J].电子学报,2016,44(11):2742-2751. DU Yuyue,ZHU Hongru,WANG Lu,et al.A method of process mining based on logic petri nets[J].Acta Electronica Sinica,2016,44(11):2742-2751.(in Chinese)
[11] Pang S,Li Y,He H,et al.A model for dynamic business processes and process changes[J].Chinese Journal of Electronics,2011,20(4):632-636.
[12] Adriansyah A,Munoz-Gama J,Carmona J,et al.Alignment Based Precision Checking[M].Berlin Heidelberg:Springer,Business Process Management Workshops,2013.137-149.
[13] Fahland D,Aalst W M P V D.Model repair-aligning process models to reality[J].Information Systems,2015,47(1):220-243.
[14] Wynn M T,Wynn M T,Wynn M T,et al.Impact-driven process model repair[J].ACM Transactions on Software Engineering & Methodology,2016,25(4):28-80.
[15] Aalst V D.Decomposing Petri nets for process mining:A generic approach[J].Distributed & Parallel Databases,2013,31(4):471-507.
[16] Aalst W V D,Weijters T,Maruster L.Workflow Mining:Discovering Process Models from Event Logs[M].IEEE Educational Activities Department,2004.
[17] Aalst W V D,Adriansyah A,Dongen B V.Replaying history on process models for conformance checking and performance analysis[J].Wiley Interdisciplinary Reviews Data Mining & Knowledge Discovery,2012,2(2):182-192.
[18] 胡涛.流程挖掘的一致性检查算法研究[D].华南理工大学,2015.
[19] Rozinat A,Aalst W M P V D.Conformance checking of processes based on monitoring real behavior[J].Information Systems,2008,33(1):64-95.
[20] Mannhardt F,Leoni M D,Reijers H A,et al.Balanced multi-perspective checking of process conformance[J].Computing,2016,98(4):407-437.
[21] Munoz-Gama J,Carmona J,Aalst W M P V D.Conformance checking in the large:partitioning and topology[A].International Conference on Business Process Management[C].Springer-Verlag,2013.130-145.
[22] Adriansyah A,Dongen B F V,Aalst W M P V D.Towards Robust Conformance Checking[M].Berlin Heidelberg:Springer,Business,Process Management Workshops,2010.122-133.
[23] Sun W,Li T,Peng W,et al.Incremental workflow mining with optional patterns[A].IEEE International Conference on Systems,Man and Cybernetics[C].IEEE,2007.2764-2771.
[24] Kalsing A C,Nascimento G S D,Iochpe C,et al.An incremental process mining approach to extract knowledge from legacy systems[A].Enterprise Distributed Object Computing Conference[C].IEEE,2010.79-88. |