The anonymized event logs of the experiments in the paper "Differentially Private Release of Event Logs for Process Mining
Privacy and confidentiality are very important prerequisites for applying process mining to comply w...
This upload contains the event logs, generated by L-Sim, on which the experiments of the related pap...
Event logs that originate from information systems enable comprehensive analysis of business process...
In this archive, we provide supplementary material for our paper entitled "Mine Me but Don’t Single ...
The applicability of process mining techniques hinges on the availability of event logs capturing th...
In this document, we provide supplementary material for the paper entitled "Mine Me but Don't Single...
The final publication is available at Springer via http://dx.doi.org/10.1007/s12599-019-00613-3Priva...
In this document, we list the selected event logs, their characteristics, and their descriptive sta...
Privacy regulations for data can be regarded as amajor driver for data sovereignty measures. A speci...
International audienceProcess mining aims to bridge the gap between data science and process science...
In the area of industrial process mining, privacy-preserving event data publication is becoming incr...
The privacy of an organization's workers represents a crucial concern in process mining settings, wh...
The growing complexity of software with respect to technological advances encourages model-based ana...
This supplementary material is part of the empirical evaluation performed for the paper entitled "Pr...
Validation in a big software system can be managed by analysis of its behaviour through occasionally...
Privacy and confidentiality are very important prerequisites for applying process mining to comply w...
This upload contains the event logs, generated by L-Sim, on which the experiments of the related pap...
Event logs that originate from information systems enable comprehensive analysis of business process...
In this archive, we provide supplementary material for our paper entitled "Mine Me but Don’t Single ...
The applicability of process mining techniques hinges on the availability of event logs capturing th...
In this document, we provide supplementary material for the paper entitled "Mine Me but Don't Single...
The final publication is available at Springer via http://dx.doi.org/10.1007/s12599-019-00613-3Priva...
In this document, we list the selected event logs, their characteristics, and their descriptive sta...
Privacy regulations for data can be regarded as amajor driver for data sovereignty measures. A speci...
International audienceProcess mining aims to bridge the gap between data science and process science...
In the area of industrial process mining, privacy-preserving event data publication is becoming incr...
The privacy of an organization's workers represents a crucial concern in process mining settings, wh...
The growing complexity of software with respect to technological advances encourages model-based ana...
This supplementary material is part of the empirical evaluation performed for the paper entitled "Pr...
Validation in a big software system can be managed by analysis of its behaviour through occasionally...
Privacy and confidentiality are very important prerequisites for applying process mining to comply w...
This upload contains the event logs, generated by L-Sim, on which the experiments of the related pap...
Event logs that originate from information systems enable comprehensive analysis of business process...