Learn More
The aim of this experiment was to assess the effects of four different feeding programs designed to include tallow, a saturated fat at 0, 8, 12, and 28 d prior to slaughter on female broiler performance and the deposition, fatty acid profile, and melting point of abdominal fat. The following treatment groups were established according to dietary(More)
The torrents of event data generated by today's systems are an important enabler for process mining. However, at the same time, the size and variability of the resulting event logs are challenging for today's process mining techniques. This paper focuses on " conformance checking in the large " and presents a novel decomposition technique that partitions(More)
Process Conformance is becoming a crucial area due to the changing nature of processes within an Information System. By confronting specifications against system executions (the main problem tackled in process conformance), both system bugs and obsolete/incorrect specifications can be revealed. This paper presents novel techniques to enrich the process(More)
The paper presents a new method for the synthesis of Petri nets from event logs in the area of Process Mining. The method derives a bounded Petri net that over-approximates the behavior of an event log. The most important property is that it produces a net with the smallest behavior that still contains the behavior of the event log. The methods described in(More)
As semiconductor technology strides towards billions of transistors on a single die, problems concerned with deep sub-micron process features and design productivity call for new approaches in the area of be-havioural models. This paper focuses on some of recent developments and new opportunities for Petri nets in designing asynchronous circuits such as(More)
Most organizations have process models describing how cases need to be handled. In fact, legislation and standardization (cf. the Sarbanes-Oxley Act, the Basel II Accord, and the ISO 9000 family of standards) are forcing organizations to document their processes. These processes are often not enforced by information systems. However, torrents of event data(More)