Publications
Detailed Information
REAL-TIME RISK MEASUREMENT FOR BUSINESS ACTIVITY MONITORING (BAM)
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kang, Bokyoung | - |
dc.contributor.author | Cho, Nam Wook | - |
dc.contributor.author | Kang, Suk-Ho | - |
dc.date.accessioned | 2012-03-05T02:31:52Z | - |
dc.date.available | 2012-03-05T02:31:52Z | - |
dc.date.issued | 2009-11-01 | - |
dc.identifier.citation | INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL; Vol.5 11A; 3647-3657 | - |
dc.identifier.issn | 1349-4198 | - |
dc.identifier.uri | https://hdl.handle.net/10371/75356 | - |
dc.description.abstract | This paper proposes a methodology to measure the risk level in real-time for Business Activity Monitoring (BAM). A decision-tree methodology was employed to analyze the effect of process attributes on the result of the process execution. In the course of process execution, the level of risk is monitored in real-time, and an early warning can be issued depending on the change of the risk level. An algorithm for estimating the risk of ongoing processes in real-time was formulated. Comparison experiments were conducted to demonstrate the effectiveness of our method. The proposed method detects the risks of business processes more precisely and even earlier than existing approaches. | - |
dc.language.iso | en | - |
dc.publisher | ICIC INT | - |
dc.subject | Event processing | - |
dc.subject | Decision tree | - |
dc.subject | Risk measurement | - |
dc.subject | Business activity monitoring | - |
dc.title | REAL-TIME RISK MEASUREMENT FOR BUSINESS ACTIVITY MONITORING (BAM) | - |
dc.type | Article | - |
dc.contributor.AlternativeAuthor | 강보경 | - |
dc.contributor.AlternativeAuthor | 조남욱 | - |
dc.contributor.AlternativeAuthor | 강석호 | - |
dc.citation.journaltitle | INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL | - |
dc.description.citedreference | Kusunoki Y, 2008, INT J INNOV COMPUT I, V4, P2663 | - |
dc.description.citedreference | Camci F, 2008, PATTERN RECOGN, V41, P3021, DOI 10.1016/j.patcog.2008.04.001 | - |
dc.description.citedreference | Guh RS, 2008, COMPUT IND ENG, V55, P475, DOI 10.1016/j.cie.2008.01.013 | - |
dc.description.citedreference | Nakashima T, 2008, INT J INNOV COMPUT I, V4, P749 | - |
dc.description.citedreference | Chen RC, 2008, INT J INNOV COMPUT I, V4, P413 | - |
dc.description.citedreference | Mendling J, 2008, DATA KNOWL ENG, V64, P312, DOI 10.1016/j.datak.2007.06.019 | - |
dc.description.citedreference | CHANG CP, 2008, INFORM SOFTWARE TECH, V51, P375 | - |
dc.description.citedreference | KIM SW, 2008, LECT NOTE COMPUTER S, V4443, P201 | - |
dc.description.citedreference | Sharma A, 2007, COMPUT SECUR, V26, P488, DOI 10.1016/j.cose.2007.10.003 | - |
dc.description.citedreference | Abadeh MS, 2007, ENG APPL ARTIF INTEL, V20, P1058, DOI 10.1016/j.engappai.2007.02.007 | - |
dc.description.citedreference | Rusinov LA, 2007, CHEMOMETR INTELL LAB, V88, P18, DOI 10.1016/j.chemolab.2006.11.007 | - |
dc.description.citedreference | Peddabachigari S, 2007, J NETW COMPUT APPL, V30, P114, DOI 10.1016/j.jnca.2005.06.003 | - |
dc.description.citedreference | KIM H, 2007, LECT NOTES COMPUT SC, V4553, P581 | - |
dc.description.citedreference | Nelwamondo FV, 2006, INT J INNOV COMPUT I, V2, P1281 | - |
dc.description.citedreference | Berdjag D, 2006, INT J INNOV COMPUT I, V2, P1337 | - |
dc.description.citedreference | Ragot J, 2006, J PROCESS CONTR, V16, P887, DOI 10.1016/j.jprocont.2006.06.005 | - |
dc.description.citedreference | Albaghdadi M, 2006, RELIAB ENG SYST SAFE, V91, P602, DOI 10.1016/j.ress.2005.05.001 | - |
dc.description.citedreference | Ha BH, 2006, DATA KNOWL ENG, V56, P64, DOI 10.1016/j..datak.2005.02.007 | - |
dc.description.citedreference | LUNDBERG A, 2006, BUSINESS INTELLIGENC, V11, P55 | - |
dc.description.citedreference | ALLES M, 2006, INT J ACCOUNTING INF, V7, P137 | - |
dc.description.citedreference | CASTELLANOS M, 2006, LECT NOTES COMPUTER, V3433, P1 | - |
dc.description.citedreference | Wang D, 2005, J PROCESS CONTR, V15, P869, DOI 10.1016/j.jprocont.2005.04.001 | - |
dc.description.citedreference | Wang MH, 2005, KNOWL-BASED SYST, V18, P257, DOI 10.1016/j.knosys.2004.04.012 | - |
dc.description.citedreference | Grigori D, 2004, COMPUT IND, V53, P321, DOI 10.1016/j.compind.2003.10.007 | - |
dc.description.citedreference | VASARHELYI MA, 2004, J EMERGING TECHNOLOG, V1, P1 | - |
dc.description.citedreference | Leymann F, 2002, IBM SYST J, V41, P198 | - |
dc.description.citedreference | LUCKHAM DC, 2002, POWER EVENTS | - |
dc.description.citedreference | DUDA RO, 2001, PATTERN CLASSIFICATI | - |
dc.description.citedreference | MITCHELL TM, 1997, MACHINE LEARNING | - |
dc.description.citedreference | ROLLAND C, 1993, P 3 EUR JAP SEM INF, P86 | - |
dc.description.citedreference | LAMPORT L, 1978, COMMUN ACM, V21, P558 | - |
dc.description.tc | 2 | - |
dc.identifier.wosid | 000271918900004 | - |
- Appears in Collections:
- Files in This Item:
- There are no files associated with this item.
Item View & Download Count
Items in S-Space are protected by copyright, with all rights reserved, unless otherwise indicated.