Login / Signup
Abducing Compliance of Incomplete Event Logs.
Federico Chesani
Riccardo De Masellis
Chiara Di Francescomarino
Chiara Ghidini
Paola Mello
Marco Montali
Sergio Tessaris
Published in:
AI*IA (2016)
Keyphrases
</>
event logs
process mining
process model
business process
log files
security policies
intrusion detection
formal concept analysis
control flow