Picture for Farbod Taymouri

Farbod Taymouri

A Deep Adversarial Model for Suffix and Remaining Time Prediction of Event Sequences

Add code
Feb 15, 2021
Figure 1 for A Deep Adversarial Model for Suffix and Remaining Time Prediction of Event Sequences
Figure 2 for A Deep Adversarial Model for Suffix and Remaining Time Prediction of Event Sequences
Figure 3 for A Deep Adversarial Model for Suffix and Remaining Time Prediction of Event Sequences
Figure 4 for A Deep Adversarial Model for Suffix and Remaining Time Prediction of Event Sequences
Viaarxiv icon

Encoder-Decoder Generative Adversarial Nets for Suffix Generation and Remaining Time Predication of Business Process Models

Add code
Jul 30, 2020
Figure 1 for Encoder-Decoder Generative Adversarial Nets for Suffix Generation and Remaining Time Predication of Business Process Models
Figure 2 for Encoder-Decoder Generative Adversarial Nets for Suffix Generation and Remaining Time Predication of Business Process Models
Figure 3 for Encoder-Decoder Generative Adversarial Nets for Suffix Generation and Remaining Time Predication of Business Process Models
Figure 4 for Encoder-Decoder Generative Adversarial Nets for Suffix Generation and Remaining Time Predication of Business Process Models
Viaarxiv icon

Predictive Business Process Monitoring via Generative Adversarial Nets: The Case of Next Event Prediction

Add code
Apr 01, 2020
Figure 1 for Predictive Business Process Monitoring via Generative Adversarial Nets: The Case of Next Event Prediction
Figure 2 for Predictive Business Process Monitoring via Generative Adversarial Nets: The Case of Next Event Prediction
Figure 3 for Predictive Business Process Monitoring via Generative Adversarial Nets: The Case of Next Event Prediction
Figure 4 for Predictive Business Process Monitoring via Generative Adversarial Nets: The Case of Next Event Prediction
Viaarxiv icon

Business Process Variant Analysis based on Mutual Fingerprints of Event Logs

Add code
Dec 23, 2019
Figure 1 for Business Process Variant Analysis based on Mutual Fingerprints of Event Logs
Figure 2 for Business Process Variant Analysis based on Mutual Fingerprints of Event Logs
Figure 3 for Business Process Variant Analysis based on Mutual Fingerprints of Event Logs
Figure 4 for Business Process Variant Analysis based on Mutual Fingerprints of Event Logs
Viaarxiv icon