• Publications
  • Influence
The Application of Petri Nets to Workflow Management
  • W. Aalst
  • Computer Science
  • J. Circuits Syst. Comput.
  • 1 February 1998
TLDR
This paper introduces workflow management as an application domain for Petri nets, presents state-of-the-art results with respect to the verification of workflows, and highlights some Petri-net-based workflow tools. Expand
Workflow mining: discovering process models from event logs
TLDR
We show that the /spl alpha/-algorithm can successfully mine any workflow represented by a so-called SWF-net. Expand
Workflow Patterns
TLDR
The paper describes a number of workflow patterns addressing what we believe identify comprehensive workflow functionality. Expand
Verification of Workflow Nets
  • W. Aalst
  • Computer Science
  • ICATPN
  • 23 June 1997
TLDR
Workflow management systems will change the architecture of future information systems dramatically. Expand
Process Mining: Data Science in Action
This is the second edition of Wil van der Aalsts seminal book on process mining, which now discusses the field also in the broader context of data science and big data approaches. It includes severalExpand
The ProM Framework: A New Era in Process Mining Tool Support
TLDR
This paper introduces the ProM framework and gives an overview of the plug-ins that have been developed for process mining. Expand
YAWL: yet another workflow language
TLDR
We propose a new workflow language based on the control-flow perspective to capture control flows for non-trivial workflow processes. Expand
Conformance checking of processes based on monitoring real behavior
TLDR
Conformance checking, also referred to as conformance analysis, aims at the detection of inconsistencies between a process model and its corresponding execution log. Expand
Workflow Management: Models, Methods, and Systems
TLDR
This book offers a comprehensive introduction to workflow management, the management of business processes with information technology. Expand
Process Mining Manifesto
TLDR
Process mining techniques are able to extract knowledge from event logs commonly available in today’s information systems. Expand
...
1
2
3
4
5
...