1 |
Pokrajac, D., Lazarevic, A. and Latecki, L. J., "Incremental Local Outlier Detection for Data Streams," IEEE Symposium on Computational Intelligence and Data Mining (CIDM), 2007.
|
2 |
Rao, U. S., Kestur, S. and Pradhan, C., "Stochastic optimization modeling and quantitative project management," IEEE software, Vol. 25, No. 3, 2008, pp. 29-36.
|
3 |
Rusinov, L. A., Rudakova, I. V., and Kurkina, V. V., "Real time diagnostics of technological processes and field equipment," Chemometrics and Intelligent Laboratory Systems, Vol. 88, No. 1, 2007, pp. 18-25.
DOI
ScienceOn
|
4 |
Viaene, S., Dedene, G. and Derrig, R. A., "Auto claim fraud detection using Bayesian learning neural networks," Expert Systems with Applications, Vol. 29, No. 3, 2005, pp. 653-666.
DOI
ScienceOn
|
5 |
Wang, D. and Romagnoli, J. A., "Robust multi-scale principal components analysis with applications to process monitoring," Journal of Process Control, Vol. 15, No. 8, 2005, pp. 869-882.
DOI
ScienceOn
|
6 |
Yue, D., Wu, X., Wang, Y., Li, Y. and Chu, C. H., "A Review of Data Mining-Based Financial Fraud Detection Research," In Proceedings of 2007 International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, China, 2007, pp. 5514-5517.
|
7 |
Kang, B., Lee, S. K., Min, Y., Kang S. H. and Cho, N. W., "Real-time Process Quality Control for Business Activity Monitoring," In Proceedings of the 2009 International Conference on Computational Science and Its Applications, Yongin, Korea, 2009, pp. 237-242.
|
8 |
Keung, P. and Kawalek, P., "Goalbased business process models: Creation and evaluation," Business Process Management Journal, Vol. 3 No. 1, 1997, pp. 17-38.
DOI
ScienceOn
|
9 |
Kim, K., Choi, I. and Park, C., "A rulebased approach to proactive exception handling in business processes," Expert Systems with Applications, Vol. 38, No. 1, 2011, pp. 394-409.
DOI
ScienceOn
|
10 |
Lazarevic, A., Ertoz, L., Ozgur, A., Srivastava, J. and Kumar, V., "A comparative study of anomaly detection schemes in network intrusion detection," In Proceedings of the Third SIAM International Conference on Data Mining, San Francisco, CA, 2003.
|
11 |
Buytendijk, F. and Flint, D., "How BAM can turn a business into a real-time enterprise," Gartner Research, AV-15-4650, 2002.
|
12 |
Leitner, P., Wetzstein, B., Rosenberg, F., Michlmayr, A., Dustdar S., and Leymann, F., "Runtime prediction of service level agreement violations for composite services," In Proceedings of the 3rd Workshop on Non-Functional Properties and SLA Management in Service-Oriented Computing, Stockholm, Sweden, 2009.
|
13 |
Medioni, G., Cohen, I., Hongeng, S., Bremond F., and Nevatia. R., "Event Detection and Analysis from Video Streams," IEEE Trans. on Pattern Analysis and Machine Intelligence, Vol. 8, No. 23, 2001, pp. 873-889.
|
14 |
Nie, G., Zhang, L., Liu, Y., Zheng, X. and Shi, Y., "Decision analysis of data mining project based on Bayesian risk," Expert Systems with Applications, Vol. 36, No. 3, 2009, pp. 4589-4594.
DOI
ScienceOn
|
15 |
Castellanos, M., Salazar, N., Casati, F., Dayal U. and Shan, M. C., "Predictive business operations management," International Journal of Computational Science and Engineering, Vol. 2, No. 5/6, 2006, pp. 292-301.
DOI
|
16 |
Chen, J. C. and Lin, K. Y., "Diagnosis for monitoring system of municipal solid waste incineration plant," Expert Systems with Applications, Vol. 34, No. 1, 2008, pp. 247-255.
DOI
ScienceOn
|
17 |
Curtis, B., Seshagiri, G. V., Reifer, D., Hirmanpour, I. and Keeni, G., "The cases for quantitative process management," IEEE software, Vol. 25, No. 3, 2008, pp. 24-28.
DOI
|
18 |
Grigori, D., Casati, F., Dayal U., and Shan, M. C., "Improving business process quality through exception understanding, prediction, and prevention," In Proceedings of the 27th Very Large Data Base Endowment Conference, Roma, Italy, 2001, pp. 159-168.
|
19 |
Ek, A. R., Robinson, A. P., Radtke, P. J. and Walters, D. K., "Development and testing of regeneration imputation models for forests in Minnesota," Forest Ecology and Management, Vol. 94, No. 1-3, 1997, pp. 129-140.
DOI
ScienceOn
|
20 |
Grigori, D., Casati, F., Castellanos, M., Dayal, U., Sayal M., and Shan, M. C., "Business process intelligence," Computers in Industry, Vol. 53, No. 3, 2004, pp. 321-343.
DOI
ScienceOn
|
21 |
Kang, B., Cho N. W. and Kang, S. H., "Real-time risk measurement for Business Activity Monitoring(BAM)," International Journal of Innovative Computing, Information and Control, Vol. 5, No. 11(A), 2009, pp. 3647-3657.
|
22 |
Breunig, M. M., Kriegel, H. P., Ng R. T. and Sander, J., "LOF : Identifying Density Based Local Outliers," In Proceedings of the ACM SIGMOD Conference, Dallas, TX, 2000.
|