Author of the publication

Filtering Spurious Events from Event Streams of Business Processes.

, , , , and . CAiSE, volume 10816 of Lecture Notes in Computer Science, page 35-52. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Repairing Outlier Behaviour in Event Logs., , and . BIS, volume 320 of Lecture Notes in Business Information Processing, page 115-131. Springer, (2018)Prototype Selection Based on Clustering and Conformance Metrics for Model Discovery., , and . CoRR, (2019)Process mining usage in cybersecurity and software reliability analysis: A systematic literature review., , , and . Array, (2022)Model Independent Error Bound Estimation for Conformance Checking Approximation., , , and . CoRR, (2021)A Systematic Literature Review on Process-Aware Recommender Systems., , and . CoRR, (2021)Event Log Sampling for Predictive Monitoring., , , , , and . CoRR, (2022)Behavioral Recommender System for Process Automation Steps., , , and . DATA, page 255-262. SCITEPRESS, (2023)Cybersecurity Analysis via Process Mining: A Systematic Literature Review., , , and . ADMA, volume 13087 of Lecture Notes in Computer Science, page 393-407. Springer, (2021)Conformance Checking Approximation Using Simulation., , , and . ICPM, page 105-112. IEEE, (2020)Privacy and Confidentiality in Process Mining - Threats and Research Challenges., , , , , , , and . CoRR, (2021)