1 |
손성호, 정재윤, 조남욱, 강석호; "프로세스 기반 이 벤트 분석을 이용한 비즈니스 활동 모니터링", 한국전자거래학회지, 12 : 219-231, 2007
|
2 |
Abadeh, M. S., Habibi, J., Barzegar, Z., and Sergi, M.; "A parallel genetic local search algorithm for intrusion detection in computer networks," Engineering Applications of Artificial Intelligence, 20(8) : 1058-1069, 2007
DOI
ScienceOn
|
3 |
Camci, F. and Chinnam, R. B.; "General support vector representation machine for one-class classification of non-stationary classes," Pattern Recognition, 41(10) : 3021-3034, 2008
DOI
ScienceOn
|
4 |
Grigori, D., Casati, F., Castellanos, M., Dayal, U., Sayal, M., and Shan, M-C.; "Business Process Intelligence," Computers in Industry, 53 : 321-343, 2004
DOI
ScienceOn
|
5 |
Lamport, L.; "Time, Clocks, and the Ordering of Events in a Distributed System," Communications of the ACM, 21(7) : 558-565, 1978
DOI
ScienceOn
|
6 |
Leymann, F., Roller, D., and Schmidt, M-T.; "Web Services and Business Process Management," IBM Systems Journal, 41(2), 2002
|
7 |
Sharma, A., Pujari, A. K., and Paliwal, K. K.; "Intrusion detection using text processing techniques with a kernel based similarity measure," Computers and Security, 26 : 488-495, 2007
DOI
ScienceOn
|
8 |
Mendling, J., Verbeek, H. M. W., van Dongen, B. F., van der Aalst, W. M. P., and Neumann, G.; "Detection and prediction of errorsin EPCs of the SAP reference model," Data and Knowledge Engineering, 64(1) : 312-329, 2008
DOI
ScienceOn
|
9 |
Duda, R. O., Hart, P. E. and Stork, D. G.; Pattern Classification, Wiley-interscience, 2001
|
10 |
Mitchell, T. M.; Machine Learning, McGraw-Hill, Inc., New York, 1997
|
11 |
Wang D. and Romagnoli, J. A.; "Robust multi-scale principal components analysis with applications to process monitoring," Journal of Process Control, 15(8) : 869-882, 2005
DOI
ScienceOn
|
12 |
Adams, P.; "What's going on? [business activity monitoring]," Manufacturing Engineer, 81(6) : 282-283, 2002
DOI
ScienceOn
|
13 |
Albaghdadi, M., Briley, B., and Evens, M.; "Event storm detection and identification in communication systems," Reliability Engineering and System Safety, 91 (5) : 602-613, 2006
DOI
ScienceOn
|
14 |
Golfarelli, M., Rizzi, S., and Cella, I.; "Beyond data warehousing : what's next in business intelligence?," Proceedings of the 7th ACM international workshop on Data warehousing and OLAP, : 1-6, 2004
|
15 |
Luckham, D. C. and Frasca, B.; "Complex Event Processing in Distributed Systems," Stanford University, 1998
|
16 |
Lundberg, A.; "Leverage Complex Event Processing to Improve Operational Performance," Business Intelligence, 11(1) : 55-65, 2006
|
17 |
Perrochon, L., Mann, W., Kasriel, S., and Luckham, D. C.; "Event Mining with Event Processing Networks," Proceedings of Methodologies for Knowledge Discovery and Data Mining : Third Pacific-Asia Conference, 1574 : 474-478, 1999
|
18 |
Rolland, C.; "Modeling the Requirements Engineering Process," 3rd European-Japanese Seminar on Information Modelling and Knowledge Bases, 1993
|
19 |
Adi, A., Botzer, D., and Etzion, O.;"Semantic Event Model and Its Implication on Situation Detection," Proceedings of the 2000 European Conference on Information, 2000
|
20 |
Gross, P. N., Gupta, S., Kasier, G. E., Gaurav, S. K., and Parekh, J. J.; "An Active Events Model for Systems Monitoring," Working Conference on Complex and Dynamic Systems, 2001
|
21 |
Luckham, D. C.; The Power of Events, Person Education, 2002
|