Process mining methods for post-delivery validation

2Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.

Abstract

The aim of this paper is to show the strengths and the weakness of process mining tools in post-delivery validation. This is illustrated on two use-cases from a real-world system. We also indicate what type of research has to be done to make process mining tools more usable for validation purposes.

Cite

CITATION STYLE

APA

Markowski, P., & Przybylek, M. R. (2017). Process mining methods for post-delivery validation. In Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, FedCSIS 2017 (pp. 1199–1202). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.15439/2017F372

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free