23
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Foundations and Practice of Security 

      Mining process models from workflow logs

      other
      , ,
      Springer Berlin Heidelberg

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Author and book information

          Book Chapter
          1998
          November 22 2006
          : 467-483
          10.1007/BFb0101003
          52a61453-61c8-4fd8-9f3c-4c1e56db8fbd
          History

          Comments

          Comment on this book

          Book chapters

          Similar content3,323

          Cited by37