Semantic process mining towards discovery and enhancement of learning model analysis

Kingsley Okoye, Abdel Rahman H. Tawil, Usman Naeem, Elyes Lamine

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Citations (SciVal)
    Original languageEnglish
    Title of host publicationProceedings - 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security and 2015 IEEE 12th International Conference on Embedded Software and Systems, HPCC-CSS-ICESS 2015
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages363-370
    Number of pages8
    ISBN (Electronic)9781479989362
    DOIs
    Publication statusPublished (VoR) - 23 Nov 2015
    Event17th IEEE International Conference on High Performance Computing and Communications, IEEE 7th International Symposium on Cyberspace Safety and Security and IEEE 12th International Conference on Embedded Software and Systems, HPCC-ICESS-CSS 2015 - New York, United States
    Duration: 24 Aug 201526 Aug 2015

    Publication series

    NameProceedings - 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security and 2015 IEEE 12th International Conference on Embedded Software and Systems, HPCC-CSS-ICESS 2015

    Conference

    Conference17th IEEE International Conference on High Performance Computing and Communications, IEEE 7th International Symposium on Cyberspace Safety and Security and IEEE 12th International Conference on Embedded Software and Systems, HPCC-ICESS-CSS 2015
    Country/TerritoryUnited States
    CityNew York
    Period24/08/1526/08/15

    Keywords

    • Event logs
    • Learning process
    • Ontology
    • Process mining
    • Process model
    • Semantic annotation

    Fingerprint

    Dive into the research topics of 'Semantic process mining towards discovery and enhancement of learning model analysis'. Together they form a unique fingerprint.

    Cite this