In this document, we provide supplementary material for the paper entitled "Mine Me but Don't Single Me Out: Differentially Private Event Logs for Process Mining." First, we present the proofs of privacy. Then, We list the selected event logs, their characteristics, and their descriptive statistics. Also, we list the anonymized event logs attached with the document as the result of the experiments
Event logs recorded during the execution of business processes constitute a valuable source of infor...
Event logs that originate from information systems enable comprehensive analysis of business process...
Privacy and confidentiality are very important prerequisites for applying process mining to comply w...
In this document, we provide supplementary material for the paper entitled "Mine Me but Don't Single...
In this archive, we provide supplementary material for our paper entitled "Mine Me but Don’t Single ...
The anonymized event logs of the experiments in the paper "Differentially Private Release of Event L...
The final publication is available at Springer via http://dx.doi.org/10.1007/s12599-019-00613-3Priva...
In this document, we list the selected event logs, their characteristics, and their descriptive sta...
International audienceProcess mining aims to bridge the gap between data science and process science...
The privacy of an organization's workers represents a crucial concern in process mining settings, wh...
Privacy regulations for data can be regarded as amajor driver for data sovereignty measures. A speci...
This supplementary material is part of the empirical evaluation performed for the paper entitled "Pr...
Process mining has been successfully applied in the healthcare domain and has helped to uncover vari...
Event logs recorded during the execution of business processes constitute a valuable source of infor...
Event logs that originate from information systems enable comprehensive analysis of business process...
Privacy and confidentiality are very important prerequisites for applying process mining to comply w...
In this document, we provide supplementary material for the paper entitled "Mine Me but Don't Single...
In this archive, we provide supplementary material for our paper entitled "Mine Me but Don’t Single ...
The anonymized event logs of the experiments in the paper "Differentially Private Release of Event L...
The final publication is available at Springer via http://dx.doi.org/10.1007/s12599-019-00613-3Priva...
In this document, we list the selected event logs, their characteristics, and their descriptive sta...
International audienceProcess mining aims to bridge the gap between data science and process science...
The privacy of an organization's workers represents a crucial concern in process mining settings, wh...
Privacy regulations for data can be regarded as amajor driver for data sovereignty measures. A speci...
This supplementary material is part of the empirical evaluation performed for the paper entitled "Pr...
Process mining has been successfully applied in the healthcare domain and has helped to uncover vari...
Event logs recorded during the execution of business processes constitute a valuable source of infor...
Event logs that originate from information systems enable comprehensive analysis of business process...
Privacy and confidentiality are very important prerequisites for applying process mining to comply w...