Login / Signup
Abducing Compliance of Incomplete Event Logs.
Federico Chesani
Riccardo De Masellis
Chiara Di Francescomarino
Chiara Ghidini
Paola Mello
Marco Montali
Sergio Tessaris
Published in:
CoRR (2016)
Keyphrases
</>
event logs
process mining
process model
business process
log files
security policies
business processes
databases
information systems
website
expert systems
text mining
computer systems