1 |
IDS Scheer, ARIS process performance manage, IDS Scheer, 2006.
|
2 |
Dresner, H. "Business Activity Monitoring: BAM Architecture", Gartner Symposium ITXPO, Cannes, France, November 2003.
|
3 |
Anand Ranganathan, Roy H. Campbell, "An infrastructure for context-awareness based on first order logic", Personal and Ubiquitous Computing, Vol. 7 no.6, pp.353-364, 2003.
DOI
ScienceOn
|
4 |
Camci, F. and Chinnam, R. B., "General support vector representation machine for one-class classification of non-stationary classes," Pattern Recognition, 41(10), 3021-3034, 2008.
DOI
ScienceOn
|
5 |
Grigori, D., Casati, F., Castellanos, M., Dayal, U., sayal, M., and Shan, M-C, "Business Process Intelligence", Computers in Industry, 53, 321-343, 2004.
DOI
ScienceOn
|
6 |
Abadeh, M. S., Habibi, J., Barzegar, Z, and Sergi, M, "A parallel gentic local search algorithm for intrusion detection in computer networks," Engineering Applications of Artificial Intelligence, 20(8), 1058-1069, 2007.
DOI
ScienceOn
|
7 |
Sharma, A., Pujari, A. K., and Paliwal, K. K. "Intrusion detection using text processing techniques with a kernel based similarity measure", Computers and Security, 26, 488-495, 2007.
DOI
ScienceOn
|
8 |
Srinivasan, s., Krishna, V., Holmes, S., "Web-log-driven business activity monitoring," IEEE Computer, Vol. 38(3), pp 61-68, 2005.
|
9 |
Sonnen, D., Morris, H.D., Businessfactor : Event-driven business performance management White paper. IDC, 2004.
|
10 |
FileNet, Filenet process analyzer, FileNet, 2006.
|