Predictive End-to-End Enterprise Process Network Monitoring

نویسندگان

چکیده

Abstract Ever-growing data availability combined with rapid progress in analytics has laid the foundation for emergence of business process analytics. Organizations strive to leverage predictive obtain insights. However, current implementations are designed deal homogeneous data. Consequently, there is limited practical use an organization heterogeneous sources. The paper proposes a method end-to-end enterprise network monitoring leveraging multi-headed deep neural networks overcome this limitation. A case study performed medium-sized German manufacturing company highlights method’s utility organizations.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

End-to-End Network Performance Monitoring for Dispersed Computing

With a growing demand for computationally intensive applications with widely distributed data sources, there is an increased need for dispersed computing systems that can schedule computation on cloud nodes across a network. A key challenge in dispersed computing is the need to characterize the end to end network performance for data transfer between compute points and measure it at run-time so...

متن کامل

End-to-End Security for Enterprise Mashups

Mashups are gaining momentum as a means to develop situational Web applications by combining different resources (services, data feeds) and user interfaces. In enterprise environments, mashups are recently used for implementing Web-based business processes, however, security is a major concern. Current approaches do not allow the mashup to securely consume services with diverse security require...

متن کامل

End-to-end esophagojejunostomy versus standard end-to-side esophagojejunostomy: which one is preferable?

 Abstract Background: End-to-side esophagojejunostomy has almost always been associated with some degree of dysphagia. To overcome this complication we decided to perform an end-to-end anastomosis and compare it with end-to-side Roux-en-Y esophagojejunostomy. Methods: In this prospective study, between 1998 and 2005, 71 patients with a diagnosis of gastric adenocarcinoma underwent total gastrec...

متن کامل

End-to-End Network Security

Traditionally, the kernel has provided extremely limited protection of network communications. This is especially nettlesome since network connections are the conduits through which the computer systems are most vulnerable. IPSec is now widely available to protect network connections, encrypting network communications in the kernel. But cryptography alone is insufficient to implement end-to-end...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Business & Information Systems Engineering

سال: 2022

ISSN: ['2363-7005', '1867-0202']

DOI: https://doi.org/10.1007/s12599-022-00778-4