Skip to main content

Showing 1–3 of 3 results for author: Dijkman, R M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2304.09970  [pdf, other

    cs.AI

    Learning policies for resource allocation in business processes

    Authors: J. Middelhuis, R. Lo Bianco, E. Scherzer, Z. A. Bukhsh, I. J. B. F. Adan, R. M. Dijkman

    Abstract: Efficient allocation of resources to activities is pivotal in executing business processes but remains challenging. While resource allocation methodologies are well-established in domains like manufacturing, their application within business process management remains limited. Existing methods often do not scale well to large processes with numerous activities or optimize across multiple cases. Th… ▽ More

    Submitted 23 January, 2024; v1 submitted 19 April, 2023; originally announced April 2023.

  2. arXiv:2104.00721  [pdf, other

    cs.LG cs.AI

    ProcessTransformer: Predictive Business Process Monitoring with Transformer Network

    Authors: Zaharah A. Bukhsh, Aaqib Saeed, Remco M. Dijkman

    Abstract: Predictive business process monitoring focuses on predicting future characteristics of a running process using event logs. The foresight into process execution promises great potentials for efficient operations, better resource management, and effective customer services. Deep learning-based approaches have been widely adopted in process mining to address the limitations of classical algorithms fo… ▽ More

    Submitted 1 April, 2021; originally announced April 2021.

  3. arXiv:1806.01657  [pdf, other

    cs.DB

    Native Directly Follows Operator

    Authors: Alifah Syamsiyah, Boudewijn F. van Dongen, Remco M. Dijkman

    Abstract: Typical legacy information systems store data in relational databases. Process mining is a research discipline that analyzes this data to obtain insights into processes. Many different process mining techniques can be applied to data. In current techniques, an XES event log serves as a basis for analysis. However, because of the static characteristic of an XES event log, we need to create one XES… ▽ More

    Submitted 5 June, 2018; originally announced June 2018.

    Comments: 12 pages