共查询到10条相似文献,搜索用时 156 毫秒
1.
Increasingly, business processes are being controlled and/or monitored by information systems. As a result, many business
processes leave their “footprints” in transactional information systems, i.e., business events are recorded in so-called event
logs. Process mining aims at improving this by providing techniques and tools for discovering process, control, data, organizational,
and social structures from event logs, i.e., the basic idea of process mining is to diagnose business processes by mining
event logs for knowledge. In this paper we focus on the potential use of process mining for measuring business alignment, i.e., comparing the real behavior of an information system or its users with the intended or expected behavior. We identify
two ways to create and/or maintain the fit between business processes and supporting information systems: Delta analysis and conformance testing. Delta analysis compares the discovered model (i.e., an abstraction derived from the actual process) with some predefined
processes model (e.g., the workflow model or reference model used to configure the system). Conformance testing attempts to
quantify the “fit” between the event log and some predefined processes model. In this paper, we show that Delta analysis and
conformance testing can be used to analyze business alignment as long as the actual events are logged and users have some
control over the process.
相似文献
2.
Nowadays data mining plays an important role in decision making. Since many organizations do not possess the in-house expertise
of data mining, it is beneficial to outsource data mining tasks to external service providers. However, most organizations
hesitate to do so due to the concern of loss of business intelligence and customer privacy. In this paper, we present a Bloom
filter based solution to enable organizations to outsource their tasks of mining association rules, at the same time, protect
their business intelligence and customer privacy. Our approach can achieve high precision in data mining by trading-off the
storage requirement.
This research was supported by the USA National Science Foundation Grants CCR-0310974 and IIS-0546027.
相似文献
3.
This paper describes the simulated car racing competition that was arranged as part of the 2007 IEEE Congress on Evolutionary
Computation. Both the game that was used as the domain for the competition, the controllers submitted as entries to the competition
and its results are presented. With this paper, we hope to provide some insight into the efficacy of various computational
intelligence methods on a well-defined game task, as well as an example of one way of running a competition. In the process,
we provide a set of reference results for those who wish to use the simplerace game to benchmark their own algorithms. The paper is co-authored by the organizers and participants of the competition.
相似文献
4.
Quantitative usability requirements are a critical but challenging, and hence an often neglected aspect of a usability engineering process. A case study is described where quantitative usability requirements played a key role in the development of a new user interface of a mobile phone. Within the practical constraints of the project, existing methods for determining usability requirements and evaluating the extent to which these are met, could not be applied as such, therefore tailored methods had to be developed. These methods and their applications are discussed. 相似文献
5.
This paper describes security and privacy issues for multimedia database management systems. Multimedia data includes text,
images, audio and video. It describes access control for multimedia database management systems and describes security policies
and security architectures for such systems. Privacy problems that result from multimedia data mining are also discussed.
相似文献
6.
Current workflow management technology offers rich support for process-oriented coordination of distributed teamwork. In this
paper, we evaluate the performance of an industrial workflow process where similar tasks can be performed by various actors
at many different locations. We analyzed a large workflow process log with state-of-the-art mining tools associated with the
ProM framework. Our analysis leads to the conclusion that there is a positive effect on process performance when workflow
actors are geographically close to each other. Our case study shows that the use of workflow technology in itself is not sufficient
to level geographical barriers between team members and that additional measures are required for a desirable performance.
相似文献
7.
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components
(including human components). These trust assumptions, whether implicit or explicit, affect the scope of the analysis, derivation
of security requirements, and in some cases how functionality is realized. This paper presents trust assumptions in the context
of analysis of security requirements. A running example shows how trust assumptions can be used by a requirements engineer
to help define and limit the scope of analysis and to document the decisions made during the process. The paper concludes
with a case study examining the impact of trust assumptions on software that uses the secure electronic transaction specification.
相似文献
8.
The effect of Internet use as a mediating variable on self-efficacy as it relates to the cognition of network-changing possibility
(i.e., connecting people or groups with different social backgrounds) was examined. The results showed that Internet use (i.e.,
the frequency of sending e-mail, friends made on the Internet) had a positive effect on the cognition of network-changing
possibility. The cognition that it is possible to connect people with different social backgrounds by using the Internet also
had a positive effect on self-efficacy. On the other hand, the cognition that it is possible to find people or groups who
share beliefs and interests by using the Internet negatively affected self-efficacy. Hence, it was found that the effect of
Internet use on self-efficacy was different as a function of cognition of network-changing possibility.
Research for this study was supported by grants from the Japan Society for the Promotion of Science, KAKANHI15330137.
相似文献
9.
The complexity of group dynamics occurring in small group interactions often hinders the performance of teams. The availability
of rich multimodal information about what is going on during the meeting makes it possible to explore the possibility of providing
support to dysfunctional teams from facilitation to training sessions addressing both the individuals and the group as a whole.
A necessary step in this direction is that of capturing and understanding group dynamics. In this paper, we discuss a particular
scenario, in which meeting participants receive multimedia feedback on their relational behaviour, as a first step towards
increasing self-awareness. We describe the background and the motivation for a coding scheme for annotating meeting recordings
partially inspired by the Bales’ Interaction Process Analysis. This coding scheme was aimed at identifying suitable observable
behavioural sequences. The study is complemented with an experimental investigation on the acceptability of such a service.
相似文献
10.
Listening to music on personal, digital devices whilst mobile is an enjoyable, everyday activity. We explore a scheme for
exploiting this practice to immerse listeners in navigation cues. Our prototype, ONTRACK, continuously adapts audio, modifying
the spatial balance and volume to lead listeners to their target destination. First we report on an initial lab-based evaluation
that demonstrated the approach’s efficacy: users were able to complete tasks within a reasonable time and their subjective
feedback was positive. Encouraged by these results we constructed a handheld prototype. Here, we discuss this implementation
and the results of field-trials. These indicate that even with a low-fidelity realisation of the concept, users can quite
effectively navigate complicated routes.
相似文献
|