Showing results for: [ Information Systems Management ]
This collection comprises the manifest and the two generated XES logs from the case study in . The manifest specifies which data related to the execution of the CryptoKitties smart contracts was re... moretrieved from the transaction log of the public Ethereum blockchain. The manifest also specifies how this data was transformed into the two XES logs. Details regarding the approach to extracting XES logs from the Ethereum blockchain and the case study are provided in . For more information on the XES standard see http://www.xes-standard.org.
 Klinkmüller, C., Ponomarev, A., Tran, A., Weber, I., and van der Aalst, W.: "Mining Blockchain Processes: Extracting Process Mining Data from Blockchain Applications", Blockchain Forum at BPM 2019. less
Legacy data - - Published 09 Jul 2019
The CSIRO 5-star Data Rating tool provides a self-assessment rating scheme against the social, technical and informational attributes of data. This tool provides implementations of the FORCE 11 FAIR d... moreata principles. The 5-star scheme aims to help users understand how mature some data or a service is. less
Operations DAMbusters - - Published 15 Jun 2018
This collection comprises the two synthetic datasets for the assessment of the reliability of predictive process monitoring techniques used in Klinkmüller, C., van Beest, N., Weber, I.: Towards Relia... moreble Predictive Process Monitoring. CAiSE Forum, 2018.
The two datasets are provided as XES-files. For more information on the Extensible Event Stream (XES) standard see http://www.xes-standard.org.
The classes for each traces are captured via the "concept:name" sub-element. Additionally, for each trace the "classifiableFrom" sub-element records the minimum number of events that must be observed for the trace to be classifiable. More information regarding the notion of classifiability is provided in the paper.less
Legacy data - - Published 13 Apr 2018