Discovering Concurrency Learning (Business) Process Models from Examples

Size: px
Start display at page:

Download "Discovering Concurrency Learning (Business) Process Models from Examples"

Transcription

1 Discovering Concurrency Learning (Business) Process Models from Examples Invited Talk CONCUR 2011, , Aachen. prof.dr.ir. Wil van der Aalst

2 Business Process Management? PAGE 1

3 Business Process Management!! PAGE 2

4 Types of Process Models Used in BPM Emphasis on graphical models supporting a substantial part of the so-called workflow patterns (incl. concurrency) PAGE 3

5 Classical Challenges in BPM Verification (cf. soundness problem in WF-nets) Performance analysis (e.g., simulation) Converting models into running systems Providing flexibility without loosing control Many problems have been solved : the real problem is adoption in practice! PAGE 4

6 A more interesting challenge: Dealing with variability Variants of the same process exist in various domains, e.g., Dutch Municipalities, Hertz, Suncorp, Salesforce, Easychair, etc. Configurable process models to generate concrete processes, cf. C-YAWL. Merging process models is a challenging problem. Model similarity (rather than equivalence). PAGE 5

7 So we are interested in processes but most of us do not study them! PAGE 6

8 Desire lines in process models PAGE 7

9 Data explosion PAGE 8

10 Process Mining = Event Data + Processes Data Mining + Process Analysis Machine Learning + Formal Methods PAGE 9

11 Process Mining Process discovery: "What is really happening?" Conformance checking: "Do we do what was agreed upon?" Performance analysis: "Where are the bottlenecks?" Process prediction: "Will this case be late?" Process improvement: "How to redesign this process?" Etc. PAGE 10

12 Process Mining

13 Starting point: event log XES, MXML, SA-MXML, CSV, etc. PAGE 12

14 Simplified event log a = register request, b = examine thoroughly, c = examine casually, d = check ticket, e = decide, f = reinitiate request, g = pay compensation, and h = reject request PAGE 13

15 Process discovery PAGE 14

16 Conformance checking case 7: e is executed without being enabled case 8: g or h is missing case 10: e is missing in second round PAGE 15

17 Extension: Adding perspectives to model based on event log PAGE 16

18 We applied ProM in >100 organizations Municipalities (e.g., Alkmaar, Heusden, Harderwijk, etc.) Government agencies (e.g., Rijkswaterstaat, Centraal Justitieel Incasso Bureau, Justice department) Insurance related agencies (e.g., UWV) Banks (e.g., ING Bank) Hospitals (e.g., AMC hospital, Catharina hospital) Multinationals (e.g., DSM, Deloitte) High-tech system manufacturers and their customers (e.g., Philips Healthcare, ASML, Ricoh, Thales) Media companies (e.g. Winkwaves)... PAGE 17

19 All supported by Open-source (L-GPL), cf. Plug-in architecture Plug-ins cover the whole process mining spectrum and also support classical forms of process analysis PAGE 18

20 Process discovery business processes people machines components organizations models analyzes supports/ controls specifies configures implements analyzes records events, e.g., messages, transactions, etc. conformance enhancement PAGE 19

21 Process Discovery Techniques (small selection) automata-based learning heuristic mining distributed genetic mining language-based regions partial-order based mining genetic mining pattern-based mining stochastic task graphs fuzzy mining mining block structures state-based regions LTL mining neural networks hidden Markov models α algorithm multi-phase mining conformal process graph α# algorithm α++ algorithm ILP mining PAGE 20

22 Why is process discovery such a difficult problem? There are no negative examples (i.e., a log shows what has happened but does not show what could not happen). Due to concurrency, loops, and choices the search space has a complex structure and the log typically contains only a fraction of all possible behaviors. There is no clear relation between the size of a model and its behavior (i.e., a smaller model may generate more or less behavior although classical analysis and evaluation methods typically assume some monotonicity property). PAGE 21

23 Challenge: four competing quality criteria able to replay event log Occam s razor not overfitting the log not underfitting the log PAGE 22

24 Example: one log four models start a register request b examine thoroughly c examine casually d check ticket e decide f reinitiate request g pay compensation h reject request N 1 : fitness = +, precision = +, generalization = +, simplicity = + end # trace 455 acdeh 191 abdeg 177 adceh 144 abdeh able to replay event log fitness process discovery Occam s razor simplicity start start a register request c examine casually examine thoroughly b d check ticket d check ticket decide pay compensation reject request N 2 : fitness = -, precision = +, generalization = -, simplicity = + a register examine request casually c reinitiate decide e f h request reject request N 3 : fitness = +, precision = -, generalization = +, simplicity = + e g h end end 111 acdeg 82 adceg 56 adbeh 47 acdefdbeh 38 adbeg 33 acdefbdeh 14 acdefbdeg 11 acdefdbeg 9 adcefcdeh 8 adcefdbeh generalization not overfitting the log precision not underfitting the log start a register request a register request a register request a register request d check ticket c examine casually d check ticket c examine casually c examine casually d check ticket c examine casually d check ticket e decide e decide e decide e decide g pay compensation g pay compensation h reject request h reject request end 5 adcefbdeg 3 acdefbdefdbeg 2 adcefdbeg 2 adcefbdefbdeg 1 adcefdbefbdeh 1 adbefbdefdbeg 1 adcefdbefcdefdbeg 1391 (all 21 variants seen in the log) a b d register request examine thoroughly check ticket e decide g pay compensation a register request d check ticket b examine thoroughly e decide h reject request a register request b examine thoroughly d check ticket decide reject request N 4 : fitness = +, precision = +, generalization = -, simplicity = - e h PAGE 23

25 Model N 1 PAGE 24 acdeh abdeg adceh abdeh acdeg adceg adbeh acdefdbeh adbeg acdefbdeh acdefbdeg acdefdbeg adcefcdeh adcefdbeh adcefbdeg acdefbdefdbeg adcefdbeg adcefbdefbdeg adcefdbefbdeh adbefbdefdbeg adcefdbefcdefdbeg # trace 1391

26 Model N 2 PAGE 25 acdeh abdeg adceh abdeh acdeg adceg adbeh acdefdbeh adbeg acdefbdeh acdefbdeg acdefdbeg adcefcdeh adcefdbeh adcefbdeg acdefbdefdbeg adcefdbeg adcefbdefbdeg adcefdbefbdeh adbefbdefdbeg adcefdbefcdefdbeg # trace 1391

27 Model N 3 PAGE 26 acdeh abdeg adceh abdeh acdeg adceg adbeh acdefdbeh adbeg acdefbdeh acdefbdeg acdefdbeg adcefcdeh adcefdbeh adcefbdeg acdefbdefdbeg adcefdbeg adcefbdefbdeg adcefdbefbdeh adbefbdefdbeg adcefdbefcdefdbeg # trace 1391

28 # trace Model N acdeh abdeg adceh 144 abdeh a register request d check ticket c examine casually e decide g pay compensation acdeg adceg a register request c examine casually d check ticket e decide g pay compensation adbeh acdefdbeh a d c e h 38 adbeg register request check ticket examine casually decide reject request 33 acdefbdeh start a register request c examine casually d check ticket e decide h reject request end acdefbdeg acdefdbeg 9 adcefcdeh (all 21 variants seen in the log) 8 adcefdbeh a b d register request a register request a register request examine thoroughly d check ticket b examine thoroughly check ticket b examine thoroughly d check ticket decide decide reject request N 4 : fitness = +, precision = +, generalization = -, simplicity = - e decide e e g pay compensation h reject request h adcefbdeg acdefbdefdbeg adcefdbeg adcefbdefbdeg adcefdbefbdeh adbefbdefdbeg adcefdbefcdefdbeg PAGE 27

29 Example of a process discovery technique: Genetic Mining Characteristics requires a lot of computing power, but can be distributed easily, can deal with noise, infrequent behavior, duplicate tasks, invisible tasks, allows for incremental improvement and combinations with other approaches (heuristics post-optimization, etc.). PAGE 28

30 Genetic process mining: Overview PAGE 29

31 Example: crossover PAGE 30

32 Example: mutation remove place b b examine thoroughly g examine thoroughly g start a register request c examine casually d check ticket decide f e reinitiate request pay compensation h reject request end start a register request added arc c examine casually d check ticket e decide f reinitiate request pay compensation h reject request end PAGE 31

33 Example of a process discovery technique: Theory of Regions Two types of regions theory: State-based regions Language-based regions All about discovering places! PAGE 32

34 State-based regions: Two step approach a b [ a,b] e [a,e] d [a,d,e] [ ] [a] c b c d [a,c] [a,b,c] [a,b,c,d] b a p1 e p3 d start end p2 c p4 PAGE 33

35 Example region a enters, b and e exit, c and d do not cross a b [ a,b] e [a,e] d [a,d,e] [ ] [a] c b c d [a,c] [a,b,c] [a,b,c,d] b a p1 e p3 d start end p2 c p4 PAGE 34

36 Language-based regions A place is feasible if it can be added without disabling any of the traces in the event log. R PAGE 35

37 Conformance checking business processes people machines components organizations models analyzes supports/ controls specifies configures implements analyzes records events, e.g., messages, transactions, etc. discovery enhancement PAGE 36

38 Four models, one log N 1 b examine thoroughly g start a register request p1 p2 c examine casually d check ticket p3 p4 e decide f p5 reinitiate request pay compensation h reject request end PAGE 37

39 PAGE 38

40 Replaying (1/7) σ 1 on N 1 p = p+1 p = produced c = consumed m = missing c r = remaining p PAGE 39

41 Replaying (2/7) σ 1 on N 1 p = p+2 c = c+1 PAGE 40

42 Replaying (3/7) σ 1 on N 1 p = p+1 c = c+1 PAGE 41

43 Replaying (4/7) σ 1 on N 1 p = p+1 c = c+1 PAGE 42

44 Replaying (5/7) σ 1 on N 1 p = p+1 c = c+2 PAGE 43

45 Replaying (6/7) σ 1 on N 1 p = p+1 c = c+1 PAGE 44

46 Replaying (7/7) σ 1 on N 1 p=7 c=6 m=0 r=0 p=7 c=7 m=0 r=0 p1 p3 start p5 end c = c+1 p2 p4 m = 0 r = 0 no problems encountered PAGE 45

47 Replaying (1/7) σ 3 on N 2 p = p+1 p = produced c = consumed m = missing c r = remaining p PAGE 46

48 Replaying (2/7) σ 3 on N 2 p = p+1 c = c+1 PAGE 47

49 Replaying (3/7) σ 3 on N 2 p = p+1 c = c+1 m = m+1 PAGE 48

50 Replaying (4/7) σ 3 on N 2 p = p+1 c = c+1 PAGE 49

51 Replaying (5/7) σ 3 on N 2 p = p+1 c = c+1 PAGE 50

52 Replaying (6/7) σ 3 on N 2 p = p+1 c = c+1 PAGE 51

53 Replaying (7/7) σ 3 on N 2 r = r+1 c = c+1 Problems: m = 1 : d was forced to occur without being enabled r = 1 : output of c was not used by d PAGE 52

54 Computing fitness at trace level PAGE 53

55 Computing fitness at the log level PAGE 54

56 Example values N 1 b examine thoroughly g start a register request p1 p2 c examine casually d check ticket p3 p4 e decide f p5 reinitiate request pay compensation h reject request end PAGE 55

57 Diagnostics problem 430 tokens remain in place p1, because c did not happen while the model expected c to happen problem 10 tokens were missing in place p1 during replay, because c happened while this was not possible according to the model start 1391 problem 146 tokens were missing in place p2 during replay, because d happened while this was not possible according to the model 1391 a register request 1391 problem 566 tokens were missing in place p3 during replay, because e happened while this was not possible according to the model p1-146 p c examine casually d check ticket p3 p e decide 1537 problem 607 tokens remain in place p5, because h did not happen while the model expected h to happen p5 h reject request problem 461 of the 1391 cases did not reach place end -461 end PAGE 56

58 Challenges related to conformance checking Not as simple as it seems! In case of duplicate tasks (two transition with the same label) or silent tasks (τ labeled transitions), multiple paths need to be considered (state space analysis, heuristics, or optimization). More general formulation of the problem with costs associated to skipping/inserting particular tasks, see ProM latest conformance checker (A* algorithm). Computing the most likely alignment is needed for other types of process mining (time analysis, measuring precision, social network analysis, etc.). PAGE 57

59 How can process mining help? Detect bottlenecks Detect deviations Performance measurement Suggest improvements Decision support (e.g., recommendation and prediction) Provide mirror Highlight important problems Avoid ICT failures Avoid management by PowerPoint From politics to analytics PAGE 58

60 PAGE 59

61 Example of a Lasagna process: WMO process of a Dutch municipality Each line corresponds to one of the 528 requests that were handled in the period from until In total there are 5498 events represented as dots. The mean time needed to handled a case is approximately 25 days. PAGE 60

62 WMO process (Wet Maatschappelijke Ondersteuning) WMO refers to the social support act that came into force in The Netherlands on January 1st, The aim of this act is to assist people with disabilities and impairments. Under the act, local authorities are required to give support to those who need it, e.g., household help, providing wheelchairs and scootmobiles, and adaptations to homes. There are different processes for the different kinds of help. We focus on the process for handling requests for household help. In a period of about one year, 528 requests for household WMO support were received. These 528 requests generated 5498 events. PAGE 61

63 C-net discovered using heuristic miner (1/3) PAGE 62

64 C-net discovered using heuristic miner (2/3) PAGE 63

65 C-net discovered using heuristic miner (3/3) PAGE 64

66 Conformance check WMO process (1/3) PAGE 65

67 Conformance check WMO process (2/3) PAGE 66

68 Conformance check WMO process (3/3) The fitness of the discovered process is Of the 528 cases, 496 cases fit perfectly whereas for 32 cases there are missing or remaining tokens. PAGE 67

69 Bottleneck analysis WMO process (1/3) PAGE 68

70 Bottleneck analysis WMO process (2/3) PAGE 69

71 Bottleneck analysis WMO process (3/3) flow time of approx. 25 days with a standard deviation of approx. 28 PAGE 70

72 Two additional Lasagna processes RWS ( Rijkswaterstaat ) process WOZ ( Waardering Onroerende Zaken ) process PAGE 71

73 RWS Process The Dutch national public works department, called Rijkswaterstaat (RWS), has twelve provincial offices. We analyzed the handling of invoices in one of these offices. The office employs about 1,000 civil servants and is primarily responsible for the construction and maintenance of the road and water infrastructure in its province. To perform its functions, the RWS office subcontracts various parties such as road construction companies, cleaning companies, and environmental bureaus. Also, it purchases services and products to support its construction, maintenance, and administrative activities. PAGE 72

74 C-net discovered using heuristic miner PAGE 73

75 Social network constructed based on handovers of work Each of the 271 nodes corresponds to a civil servant. Two civil servants are connected if one executed an activity causally following an activity executed by the other civil servant PAGE 74

76 Social network consisting of civil servants that executed more than 2000 activities in a 9 month period. The darker arcs indicate the strongest relationships in the social network. Nodes having the same color belong to the same clique. PAGE 75

77 WOZ process Event log containing information about 745 objections against the so-called WOZ ( Waardering Onroerende Zaken ) valuation. Dutch municipalities need to estimate the value of houses and apartments. The WOZ value is used as a basis for determining the real-estate property tax. The higher the WOZ value, the more tax the owner needs to pay. Therefore, there are many objections (i.e., appeals) of citizens that assert that the WOZ value is too high. WOZ process discovered for another municipality (i.e., different from the one for which we analyzed the WMO process). PAGE 76

78 Discovered process model The log contains events related to 745 objections against the so-called WOZ valuation. These 745 objections generated 9583 events. There are 13 activities. For 12 of these activities both start and complete events are recorded. Hence, the WF-net has 25 transitions. PAGE 77

79 Conformance checker: (fitness is ) PAGE 78

80 Performance analysis PAGE 79

81 Resource-activity matrix (four groups discovered) PAGE 80

82 PAGE 81

83 Example of a Spaghetti process Spaghetti process describing the diagnosis and treatment of 2765 patients in a Dutch hospital. The process model was constructed based on an event log containing 114,592 events. There are 619 different activities (taking event types into account) executed by 266 different individuals (doctors, nurses, etc.). PAGE 82

84 Fragment 18 activities of the 619 activities (2.9%) PAGE 83

85 Another example (event log of Dutch housing agency) The event log contains 208 cases that generated 5987 events. There are 74 different activities. PAGE 84

86 PAGE 85

87 Conclusion Many concurrency-related BPM challenges. Process leave traces in event logs. So, if you are interested in processes, use them! Process mining: challenging and highly relevant. Process discovery challenge balancing between different objectives only example behavior Conformance checking challenge finding the most likely trace dealing with silent/duplicate steps Eldorado for exciting concurrency research! PAGE 86

88 PAGE 87

Process Discovery: Capturing the Invisible

Process Discovery: Capturing the Invisible Process Discovery: Capturing the Invisible Wil M. P. van der Aalst Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, The Netherlands. W.M.P.v.d.Aalst@tue.nl Abstract. Processes

More information

Non-Dominated Bi-Objective Genetic Mining Algorithm

Non-Dominated Bi-Objective Genetic Mining Algorithm Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 6 (2017) pp. 1607-1614 Research India Publications http://www.ripublication.com Non-Dominated Bi-Objective Genetic Mining

More information

Mediating Between Modeled and Observed Behavior: The Quest for the "Right" Process. prof.dr.ir. Wil van der Aalst

Mediating Between Modeled and Observed Behavior: The Quest for the Right Process. prof.dr.ir. Wil van der Aalst ediating Between odeled and Observed Behavior: The Quest for the "Right" Process prof.dr.ir. Wil van der Aalst Outline Introduction to Process ining (short) ediating between a reference model and observed

More information

Process Mining in the Context of Web Services

Process Mining in the Context of Web Services Process Mining in the Context of Web Services Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology, P.O. Box 513, 5600 MB Eindhoven, The Netherlands w.m.p.v.d.aalst@tue.nl Outline Web services

More information

Introduction. Process Mining post-execution analysis Process Simulation what-if analysis

Introduction. Process Mining post-execution analysis Process Simulation what-if analysis Process mining Process mining is the missing link between model-based process analysis and dataoriented analysis techniques. Through concrete data sets and easy to use software the process mining provides

More information

Business Intelligence & Process Modelling

Business Intelligence & Process Modelling Business Intelligence & Process Modelling Frank Takes Universiteit Leiden Lecture 9 Process Modelling & BPMN & Tooling BIPM Lecture 9 Process Modelling & BPMN & Tooling 1 / 47 Recap Business Intelligence:

More information

Mine Your Own Business

Mine Your Own Business 33 Mine Your Own Business Evidence-Based BPM using Process Mining prof.dr.ir. Wil van der Aalst IBM BPM Symposium Kurhaus Wiesbaden 25-9-2013 PAGE 0 Season 1, Episode 4 (1969) PAGE 1 "Mine Your Own Business"

More information

Intra- and Inter-Organizational Process Mining: Discovering Processes Within and Between Organizations

Intra- and Inter-Organizational Process Mining: Discovering Processes Within and Between Organizations Intra- and Inter-Organizational Process Mining: Discovering Processes Within and Between Organizations Wil M.P. van der Aalst Eindhoven University of Technology, PO Box 513, NL-5600 MB, Eindhoven, The

More information

ProM 4.0: Comprehensive Support for Real Process Analysis

ProM 4.0: Comprehensive Support for Real Process Analysis ProM 4.0: Comprehensive Support for Real Process Analysis W.M.P. van der Aalst 1, B.F. van Dongen 1, C.W. Günther 1, R.S. Mans 1, A.K. Alves de Medeiros 1, A. Rozinat 1, V. Rubin 2,1, M. Song 1, H.M.W.

More information

QUALITY DIMENSIONS IN PROCESS DISCOVERY: THE IMPORTANCE OF FITNESS, PRECISION, GENERALIZATION AND SIMPLICITY

QUALITY DIMENSIONS IN PROCESS DISCOVERY: THE IMPORTANCE OF FITNESS, PRECISION, GENERALIZATION AND SIMPLICITY International Journal of Cooperative Information Systems c World Scientific Publishing Company QUALITY DIMENSIONS IN PROCESS DISCOVERY: THE IMPORTANCE OF FITNESS, PRECISION, GENERALIZATION AND SIMPLICITY

More information

Part II Workflow discovery algorithms

Part II Workflow discovery algorithms Process Mining Part II Workflow discovery algorithms Induction of Control-Flow Graphs α-algorithm Heuristic Miner Fuzzy Miner Outline Part I Introduction to Process Mining Context, motivation and goal

More information

Reality Mining Via Process Mining

Reality Mining Via Process Mining Reality Mining Via Process Mining O. M. Hassan, M. S. Farag, M. M. MohieEl-Din Department of Mathematics, Facility of Science Al-Azhar University Cairo, Egypt {ohassan, farag.sayed, mmeldin}@azhar.edu.eg

More information

Process Mining Tutorial

Process Mining Tutorial Anne Rozinat Christian W. Günther 26. April 2010 Web: http://fluxicon.com Email: anne@fluxicon.com Phone: +31(0)62 4364201 Copyright 2010 Fluxicon Problem IT-supported business processes are complex Lack

More information

Decomposed Process Mining with DivideAndConquer

Decomposed Process Mining with DivideAndConquer Decomposed Process Mining with DivideAndConquer H.M.W. Verbeek Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, The Netherlands h.m.w.verbeek@tue.nl Abstract.

More information

Mining Process Performance from Event Logs

Mining Process Performance from Event Logs Mining Process Performance from Event Logs The BPI Challenge 2012 Case Study A. Adriansyah and J.C.A.M Buijs Department of Mathematics and Computer Science Eindhoven University of Technology P.O. Box 513,

More information

Model Repair Aligning Process Models to Reality

Model Repair Aligning Process Models to Reality Model Repair Aligning Process Models to Reality Dirk Fahland, Wil M.P. van der Aalst Eindhoven University of Technology, The Netherlands Abstract Process mining techniques relate observed behavior (i.e.,

More information

The Multi-perspective Process Explorer

The Multi-perspective Process Explorer The Multi-perspective Process Explorer Felix Mannhardt 1,2, Massimiliano de Leoni 1, Hajo A. Reijers 3,1 1 Eindhoven University of Technology, Eindhoven, The Netherlands 2 Lexmark Enterprise Software,

More information

Flexible evolutionary algorithms for mining structured process models Buijs, J.C.A.M.

Flexible evolutionary algorithms for mining structured process models Buijs, J.C.A.M. Flexible evolutionary algorithms for mining structured process models Buijs, J.C.A.M. DOI: 10.6100/IR780920 Published: 01/01/2014 Document Version Publisher s PDF, also known as Version of Record (includes

More information

Published in: Petri Nets and Other Models of Concurrency - ICATPN 2007 (28th International Conference, Siedcle, Poland, June 25-29, 2007)

Published in: Petri Nets and Other Models of Concurrency - ICATPN 2007 (28th International Conference, Siedcle, Poland, June 25-29, 2007) ProM 4.0 : comprehensive support for real process analysis van der Aalst, W.M.P.; van Dongen, B.F.; Günther, C.W.; Mans, R.S.; Alves De Medeiros, A.K.; Rozinat, A.; Rubin, V.A.; Song, M.S.; Verbeek, H.M.W.;

More information

Mining with Eve - Process Discovery and Event Structures

Mining with Eve - Process Discovery and Event Structures Mining with Eve - Process Discovery and Event Structures Robin Bergenthum, Benjamin Meis Department of Software Engineering, FernUniversität in Hagen {firstname.lastname}@fernuni-hagen.de Abstract. This

More information

Process Mining Based on Clustering: A Quest for Precision

Process Mining Based on Clustering: A Quest for Precision Process Mining Based on Clustering: A Quest for Precision A.K. Alves de Medeiros 1, A. Guzzo 2, G. Greco 2, W.M.P. van der Aalst 1, A.J.M.M. Weijters 1, B. van Dongen 1, and D. Saccà 2 1 Eindhoven University

More information

Reality Mining Via Process Mining

Reality Mining Via Process Mining Reality Mining Via Process Mining O. M. Hassan, M. S. Farag, and M. M. Mohie El-Din Abstract Reality mining project work on Ubiquitous Mobile Systems (UMSs) that allow for automated capturing of events.

More information

Conformance Checking of Processes Based on Monitoring Real Behavior

Conformance Checking of Processes Based on Monitoring Real Behavior Conformance Checking of Processes Based on Monitoring Real Behavior Seminar - Multimedia Retrieval and Data Mining Aljoscha Steffens Data Management and Data Exploration Group RWTH Aachen University Germany

More information

ProM 6: The Process Mining Toolkit

ProM 6: The Process Mining Toolkit ProM 6: The Process Mining Toolkit H.M.W. Verbeek, J.C.A.M. Buijs, B.F. van Dongen, W.M.P. van der Aalst Department of Mathematics and Computer Science, Eindhoven University of Technology P.O. Box 513,

More information

The multi-perspective process explorer

The multi-perspective process explorer The multi-perspective process explorer Mannhardt, F.; de Leoni, M.; Reijers, H.A. Published in: Proceedings of the Demo Session of the 13th International Conference on Business Process Management (BPM

More information

Types of Process Mining

Types of Process Mining 1 Types of Process Mining 2 Types of Mining Algorithms 3 Types of Mining Algorithms 4 Control-Flow Mining 1. Start 2. 1. Get Ready Start 1. 3. 2. Start Travel by Get Train Ready 1. 2. 4. Start 3. Get Beta

More information

Decomposed Process Mining: The ILP Case

Decomposed Process Mining: The ILP Case Decomposed Process Mining: The ILP Case H.M.W. Verbeek and W.M.P. van der Aalst Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, The Netherlands {h.m.w.verbeek,w.m.p.v.d.aaalst}@tue.nl

More information

Scalable Process Discovery and Conformance Checking

Scalable Process Discovery and Conformance Checking Scalable Process Discovery and Conformance Checking Sander J.J. Leemans, Dirk Fahland, and Wil M.P. van der Aalst Eindhoven University of Technology, the Netherlands {s.j.j.leemans, d.fahland, w.m.p.v.d.aalst}@tue.nl

More information

Towards Process Instances Building for Spaghetti Processes

Towards Process Instances Building for Spaghetti Processes Towards Process Instances Building for Spaghetti Processes Claudia Diamantini 1, Laura Genga 1, Domenico Potena 1, and Wil M.P. van der Aalst 2 1 Information Engineering Department Università Politecnica

More information

Scientific Workflows for Process Mining: Building Blocks, Scenarios, and Implementation

Scientific Workflows for Process Mining: Building Blocks, Scenarios, and Implementation Software Tools for Technology Transfer manuscript No. (will be inserted by the editor) Scientific Workflows for Process Mining: Building Blocks, Scenarios, and Implementation Alfredo Bolt, Massimiliano

More information

Genetic Process Mining: A Basic Approach and its Challenges

Genetic Process Mining: A Basic Approach and its Challenges Genetic Process Mining: A Basic Approach and its hallenges A.K. Alves de Medeiros, A.J.M.M. Weijters and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O.

More information

Process Mining Based on Clustering: A Quest for Precision

Process Mining Based on Clustering: A Quest for Precision Process Mining Based on Clustering: A Quest for Precision Ana Karla Alves de Medeiros 1, Antonella Guzzo 2, Gianluigi Greco 2, WilM.P.vanderAalst 1, A.J.M.M. Weijters 1, Boudewijn F. van Dongen 1, and

More information

Process Mining Discovering Workflow Models from Event-Based Data

Process Mining Discovering Workflow Models from Event-Based Data Process Mining Discovering Workflow Models from Event-Based Data A.J.M.M. Weijters W.M.P van der Aalst Eindhoven University of Technology, P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands, +31 40 2473857/2290

More information

Data Streams in ProM 6: A Single-Node Architecture

Data Streams in ProM 6: A Single-Node Architecture Data Streams in ProM 6: A Single-Node Architecture S.J. van Zelst, A. Burattin 2, B.F. van Dongen and H.M.W. Verbeek Eindhoven University of Technology {s.j.v.zelst,b.f.v.dongen,h.m.w.verbeek}@tue.nl 2

More information

A PROPOSAL OF USING DEVS MODEL FOR PROCESS MINING

A PROPOSAL OF USING DEVS MODEL FOR PROCESS MINING A PROPOSAL OF USING DEVS MODEL FOR PROCESS MINING Yan Wang (a), Grégory Zacharewicz (b), David Chen (c), Mamadou Kaba Traoré (d) (a),(b),(c) IMS, University of Bordeaux, 33405 Talence Cedex, France (d)

More information

Online Conformance Checking for Petri Nets and Event Streams

Online Conformance Checking for Petri Nets and Event Streams Online Conformance Checking for Petri Nets and Event Streams Andrea Burattin University of Innsbruck, Austria; Technical University of Denmark, Denmark andbur@dtu.dk Abstract. Within process mining, we

More information

Modeling the Control-Flow Perspective. prof.dr.ir. Wil van der Aalst

Modeling the Control-Flow Perspective. prof.dr.ir. Wil van der Aalst Modeling the ontrol-flow Perspective prof.dr.ir. Wil van der Aalst From model to behavior... http://wwwis.win.tue.nl/~wvdaalst/workflowcourse/examples/casehandling.swf asic concepts process instance, e.g.,

More information

Measuring the Precision of Multi-perspective Process Models

Measuring the Precision of Multi-perspective Process Models Measuring the Precision of Multi-perspective Process Models Felix Mannhardt 1,2, Massimiliano de Leoni 1, Hajo A. Reijers 3,1, Wil M.P. van der Aalst 1 1 Eindhoven University of Technology, Eindhoven,

More information

Supporting the Workflow Management System Development Process with YAWL

Supporting the Workflow Management System Development Process with YAWL Supporting the Workflow Management System Development Process with YAWL R.S. Mans 1, W.M.P. van der Aalst 1 Department of Mathematics and Computer Science, Eindhoven University of Technology, P.O. ox 513,

More information

A General Divide and Conquer Approach for Process Mining

A General Divide and Conquer Approach for Process Mining A General Divide and Conquer Approach for Process Mining Wil M.P. van der Aalst Architecture of Information Systems, Eindhoven University of Technology, P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands.

More information

Data- and Resource-Aware Conformance Checking of Business Processes

Data- and Resource-Aware Conformance Checking of Business Processes Data- and Resource-Aware Conformance Checking of Business Processes Massimiliano de Leoni, Wil M. P. van der Aalst, and Boudewijn F. van Dongen Eindhoven University of Technology, Eindhoven, The Netherlands

More information

Dealing with Artifact-Centric Systems: a Process Mining Approach

Dealing with Artifact-Centric Systems: a Process Mining Approach Dealing with Artifact-Centric Systems: a Process Mining Approach Guangming Li and Renata Medeiros de Carvalho 2 Abstract: Process mining provides a series of techniques to analyze business processes based

More information

Mining CPN Models. Discovering Process Models with Data from Event Logs. A. Rozinat, R.S. Mans, and W.M.P. van der Aalst

Mining CPN Models. Discovering Process Models with Data from Event Logs. A. Rozinat, R.S. Mans, and W.M.P. van der Aalst Mining CPN Models Discovering Process Models with Data from Event Logs A. Rozinat, R.S. Mans, and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513,

More information

Online Conformance Checking for Petri Nets and Event Streams

Online Conformance Checking for Petri Nets and Event Streams Downloaded from orbit.dtu.dk on: Apr 30, 2018 Online Conformance Checking for Petri Nets and Event Streams Burattin, Andrea Published in: Online Proceedings of the BPM Demo Track 2017 Publication date:

More information

BPMN Miner 2.0: Discovering Hierarchical and Block-Structured BPMN Process Models

BPMN Miner 2.0: Discovering Hierarchical and Block-Structured BPMN Process Models BPMN Miner 2.0: Discovering Hierarchical and Block-Structured BPMN Process Models Raffaele Conforti 1, Adriano Augusto 1, Marcello La Rosa 1, Marlon Dumas 2, and Luciano García-Bañuelos 2 1 Queensland

More information

APD tool: Mining Anomalous Patterns from Event Logs

APD tool: Mining Anomalous Patterns from Event Logs APD tool: Mining Anomalous Patterns from Event Logs Laura Genga 1, Mahdi Alizadeh 1, Domenico Potena 2, Claudia Diamantini 2, and Nicola Zannone 1 1 Eindhoven University of Technology 2 Università Politecnica

More information

Multidimensional Process Mining with PMCube Explorer

Multidimensional Process Mining with PMCube Explorer Multidimensional Process Mining with PMCube Explorer Thomas Vogelgesang and H.-Jürgen Appelrath Department of Computer Science University of Oldenburg, Germany thomas.vogelgesang@uni-oldenburg.de Abstract.

More information

Filter Techniques for Region-Based Process Discovery

Filter Techniques for Region-Based Process Discovery Filter Techniques for Region-Based Process Discovery S.J. van Zelst, B.F. van Dongen, W.M.P. van der Aalst Department of Mathematics and Computer Science Eindhoven University of Technology, The Netherlands

More information

Predicting the next click with Web log Process Mining

Predicting the next click with Web log Process Mining Predicting the next click with Web log Process Mining Suresh Kumar Mukhiya Master in Information Systems Submission date: June 2016 Supervisor: Jon Atle Gulla, IDI Co-supervisor: Jon Espen Ingvaldsen,

More information

Eindhoven University of Technology MASTER. Context analysis of business processes based on event logs. Airlangga Adi Hermawan, A.

Eindhoven University of Technology MASTER. Context analysis of business processes based on event logs. Airlangga Adi Hermawan, A. Eindhoven University of Technology MASTER Context analysis of business processes based on event logs Airlangga Adi Hermawan, A. Award date: 2013 Link to publication Disclaimer This document contains a

More information

Conformance Checking Evaluation of Process Discovery Using Modified Alpha++ Miner Algorithm

Conformance Checking Evaluation of Process Discovery Using Modified Alpha++ Miner Algorithm Conformance Checking Evaluation of Process Discovery Using Modified Alpha++ Miner Algorithm Yutika Amelia Effendi and Riyanarto Sarno Department of Informatics, Faculty of Information and Communication

More information

Discovering Hierarchical Process Models Using ProM

Discovering Hierarchical Process Models Using ProM Discovering Hierarchical Process Models Using ProM R.P. Jagadeesh Chandra Bose 1,2, Eric H.M.W. Verbeek 1 and Wil M.P. van der Aalst 1 1 Department of Mathematics and Computer Science, University of Technology,

More information

Bidimensional Process Discovery for Mining BPMN Models

Bidimensional Process Discovery for Mining BPMN Models Bidimensional Process Discovery for Mining BPMN Models DeMiMoP 2014, Haifa Eindhoven Jochen De Weerdt, KU Leuven (@jochendw) Seppe vanden Broucke, KU Leuven (@macuyiko) (presenter) Filip Caron, KU Leuven

More information

Process Model Discovery: A Method Based on Transition System Decomposition

Process Model Discovery: A Method Based on Transition System Decomposition Process Model Discovery: A Method Based on Transition System Decomposition Anna A. Kalenkova 1, Irina A. Lomazova 1, and Wil M.P. van der Aalst 1,2 1 National Research University Higher School of Economics

More information

Towards Improving the Representational Bias of Process Mining

Towards Improving the Representational Bias of Process Mining Towards Improving the Representational Bias of Process Mining Wil Aalst, Joos Buijs, Boudewijn Dongen To cite this version: Wil Aalst, Joos Buijs, Boudewijn Dongen. Towards Improving the Representational

More information

A ProM Operational Support Provider for Predictive Monitoring of Business Processes

A ProM Operational Support Provider for Predictive Monitoring of Business Processes A ProM Operational Support Provider for Predictive Monitoring of Business Processes Marco Federici 1,2, Williams Rizzi 1,2, Chiara Di Francescomarino 1, Marlon Dumas 3, Chiara Ghidini 1, Fabrizio Maria

More information

Artifact lifecycle discovery

Artifact lifecycle discovery Artifact lifecycle discovery Popova, V.; Fahland, D.; Dumas, M. Published: 01/01/2013 Document Version Publisher s PDF, also known as Version of Record (includes final page, issue and volume numbers) Please

More information

Process Mining: Using CPN Tools to Create Test Logs for Mining Algorithms

Process Mining: Using CPN Tools to Create Test Logs for Mining Algorithms Process Mining: Using CPN Tools to Create Test Logs for Mining Algorithms A.K. Alves de Medeiros and C.W. Günther Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600

More information

Process Mining Put Into Context

Process Mining Put Into Context Process Mining Put Into Context Wil M.P. van der Aalst 1,2 and Schahram Dustdar 3 1 Eindhoven University of Technology 2 Queensland University of Technology 3 Technical University of Vienna Abstract. Process

More information

Enabling Flexibility in Process-aware Information Systems Challenges, Methods, Technologies

Enabling Flexibility in Process-aware Information Systems Challenges, Methods, Technologies Enabling Flexibility in Process-aware Information Systems Challenges, Methods, Technologies MONTEVIDEO, DECEMBER 11 TH 2012 PRESENTED BY BARBARA WEBER UNIV. OF INNSBRUCK Content Keynote based on new Springer

More information

Workflow : Patterns and Specifications

Workflow : Patterns and Specifications Workflow : Patterns and Specifications Seminar Presentation by Ahana Pradhan Under the guidance of Prof. Rushikesh K. Joshi Department of Computer Science and Engineering Indian Institute of Technology,

More information

Discovering workflow nets using integer linear programming

Discovering workflow nets using integer linear programming Computing DOI 10.1007/s00607-017-0582-5 Discovering workflow nets using integer linear programming S. J. van Zelst 1 B. F. van Dongen 1 W. M. P. van der Aalst 1 H. M. W. Verbeek 1 Received: 19 July 2016

More information

Interoperability in the ProM Framework

Interoperability in the ProM Framework Interoperability in the ProM Framework H.M.W. Verbeek 1, B.F. van Dongen 1, J. Mendling 2, and W.M.P. van der Aalst 1 1 Department of Technology Management, Eindhoven University of Technology P.O. Box

More information

Lezione 14 Model Transformations for BP Analysis and Execution

Lezione 14 Model Transformations for BP Analysis and Execution Lezione 14 Model Transformations for BP Analysis and Execution Ingegneria dei Processi Aziendali Modulo 1 - Servizi Web Unità didattica 1 Protocolli Web Ernesto Damiani 1 Università di Milano 1 Business

More information

Mining Based on Learning from Process Change Logs

Mining Based on Learning from Process Change Logs Mining Based on Learning from Process Change Logs Chen Li 1, Manfred Reichert 2, and Andreas Wombacher 3 1 Information System group, University of Twente, The Netherlands lic@cs.utwente.nl 2 Institute

More information

Business Process Management

Business Process Management Business Process Management Paolo Bottoni Lecture 11: Process Mining Adapted from the slides for the book : Dumas, La Rosa, Mendling & Reijers: Fundamentals of Business Process Management, Springer 2013

More information

Streaming Fraud Detection on Session Based Data

Streaming Fraud Detection on Session Based Data Streaming Fraud Detection on Session Based Data Master s Thesis Hylke Hendriksen Streaming Fraud Detection on Session Based Data THESIS submitted in partial fulfillment of the requirements for the degree

More information

XES, XESame, and ProM 6

XES, XESame, and ProM 6 XES, XESame, and ProM 6 H.M.W. Verbeek, J.C.A.M. Buijs, B.F. van Dongen, and W.M.P. van der Aalst Technische Universiteit Eindhoven Department of Mathematics and Computer Science P.O. Box 513, 5600 MB

More information

Knowledge Discovery. URL - Spring 2018 CS - MIA 1/22

Knowledge Discovery. URL - Spring 2018 CS - MIA 1/22 Knowledge Discovery Javier Béjar cbea URL - Spring 2018 CS - MIA 1/22 Knowledge Discovery (KDD) Knowledge Discovery in Databases (KDD) Practical application of the methodologies from machine learning/statistics

More information

Process mining using BPMN: relating event logs and process models Kalenkova, A.A.; van der Aalst, W.M.P.; Lomazova, I.A.; Rubin, V.A.

Process mining using BPMN: relating event logs and process models Kalenkova, A.A.; van der Aalst, W.M.P.; Lomazova, I.A.; Rubin, V.A. Process mining using BPMN: relating event logs and process models Kalenkova, A.A.; van der Aalst, W.M.P.; Lomazova, I.A.; Rubin, V.A. Published in: Software and Systems Modeling DOI: 10.1007/s10270-015-0502-0

More information

2015 International Conference on Computer, Control, Informatics and Its Applications

2015 International Conference on Computer, Control, Informatics and Its Applications 2015 International Conference on Computer, Control, Informatics and Its Applications Business Process Optimization from Single Timestamp Event Log Riyanarto Sarno *, Fitrianing Haryadita, Kartini, Sarwosri

More information

Using Minimum Description Length for Process Mining

Using Minimum Description Length for Process Mining Using Minimum Description Length for Process Mining T. alders TU indhoven t.calders@tue.nl.w. Günther TU indhoven c.w.gunther@tue.nl M. Pechenizkiy TU indhoven m.pechenizkiy@tue.nl. Rozinat TU indhoven

More information

YAWL in the Cloud. 1 Introduction. D.M.M. Schunselaar, T.F. van der Avoort, H.M.W. Verbeek, and W.M.P. van der Aalst

YAWL in the Cloud. 1 Introduction. D.M.M. Schunselaar, T.F. van der Avoort, H.M.W. Verbeek, and W.M.P. van der Aalst YAWL in the Cloud D.M.M. Schunselaar, T.F. van der Avoort, H.M.W. Verbeek, and W.M.P. van der Aalst Eindhoven University of Technology, P.O. Box 513, 5600 MB, Eindhoven, The Netherlands {d.m.m.schunselaar,

More information

Enabling Flexibility in Process-Aware

Enabling Flexibility in Process-Aware Manfred Reichert Barbara Weber Enabling Flexibility in Process-Aware Information Systems Challenges, Methods, Technologies ^ Springer Part I Basic Concepts and Flexibility Issues 1 Introduction 3 1.1 Motivation

More information

Testing! Prof. Leon Osterweil! CS 520/620! Spring 2013!

Testing! Prof. Leon Osterweil! CS 520/620! Spring 2013! Testing Prof. Leon Osterweil CS 520/620 Spring 2013 Relations and Analysis A software product consists of A collection of (types of) artifacts Related to each other by myriad Relations The relations are

More information

CA441 BPM - Modelling Workflow with Petri Nets. Modelling Workflow with Petri Nets. Workflow Management Issues. Workflow. Process.

CA441 BPM - Modelling Workflow with Petri Nets. Modelling Workflow with Petri Nets. Workflow Management Issues. Workflow. Process. Modelling Workflow with Petri Nets 1 Workflow Management Issues Georgakopoulos,Hornick, Sheth Process Workflow specification Workflow Implementation =workflow application Business Process Modelling/ Workflow

More information

Interactive PMCube Explorer

Interactive PMCube Explorer Interactive PMCube Explorer Documentation and User Manual Thomas Vogelgesang Carl von Ossietzky Universität Oldenburg June 15, 2017 Contents 1. Introduction 4 2. Application Overview 5 3. Data Preparation

More information

Improving Process Model Precision by Loop Unrolling

Improving Process Model Precision by Loop Unrolling Improving Process Model Precision by Loop Unrolling David Sánchez-Charles 1, Marc Solé 1, Josep Carmona 2, Victor Muntés-Mulero 1 1 CA Strategic Research Labs, CA Technologies, Spain David.Sanchez,Marc.SoleSimo,Victor.Muntes@ca.com

More information

Declarative Workflows

Declarative Workflows Informatik - Forschung und Entwicklung manuscript No. (will be inserted by the editor) W.M.P. van der Aalst M. Pesic H. Schonenberg Declarative Workflows Balancing Between Flexibility and Support Eingegangen:

More information

REENGINEERING SYSTEM

REENGINEERING SYSTEM GENERAL OBJECTIVES OF THE SUBJECT At the end of the course, Individuals will analyze the characteristics of the materials in the industries, taking into account its advantages and functionality, for their

More information

Finding Suitable Activity Clusters for Decomposed Process Discovery

Finding Suitable Activity Clusters for Decomposed Process Discovery Finding Suitable Activity Clusters for Decomposed Process Discovery B.F.A. Hompes, H.M.W. Verbeek, and W.M.P. van der Aalst Department of Mathematics and Computer Science Eindhoven University of Technology,

More information

A Simulation-Based Approach to Process Conformance

A Simulation-Based Approach to Process Conformance A Simulation-Based Approach to Process Conformance Pedro M. Martins IST Technical University of Lisbon Avenida Prof. Dr. Cavaco Silva 2744-016 Porto Salvo, Portugal pedro.m.martins@tagus.ist.utl.pt Abstract.

More information

Project IST SUPER Semantics Utilized for Process management within and between Enterprises. Deliverable 6.11

Project IST SUPER Semantics Utilized for Process management within and between Enterprises. Deliverable 6.11 Project IST 026850 SUPER Semantics Utilized for Process management within and between Enterprises Deliverable 6.11 Semantic Process Mining Tool Final Implementation Leading Partner: TUE Contributing Partner:

More information

Change Your History: Learning from Event Logs to Improve Processes

Change Your History: Learning from Event Logs to Improve Processes Change Your History: Learning from Event Logs to Improve Processes Wil M.P. van der Aalst Wei Zhe Low Moe T. Wynn Arthur H.M. ter Hofstede Technische Universiteit Eindhoven (TU/e), Eindhoven, The Netherlands

More information

Conformance Testing: Measuring the Fit and Appropriateness of Event Logs and Process Models

Conformance Testing: Measuring the Fit and Appropriateness of Event Logs and Process Models Conformance Testing: Measuring the Fit and Appropriateness of Event Logs and Process Models A. Rozinat 1,2 and W.M.P. van der Aalst 1 1 Department of Technology Management, Eindhoven University of Technology

More information

Analysis of BPMN Models

Analysis of BPMN Models Analysis of BPMN Models Addis Gebremichael addisalemayehu.gebremichael@student.uantwerpen.be Abstract The Business Process Modeling Notation (BPMN) is a standard notation for capturing business processes,

More information

Digital Enablement bridging the digital divide

Digital Enablement bridging the digital divide Digital Enablement bridging the digital divide Ahmar Waryas ahmar.waryas@huawei.com China Internet plus policy will transform industries New Economic Growth Engine: From Made in China to Create in China

More information

Lecture 7 Quantitative Process Analysis II

Lecture 7 Quantitative Process Analysis II MTAT.03.231 Business Process Management Lecture 7 Quantitative Process Analysis II Marlon Dumas marlon.dumas ät ut. ee 1 Process Analysis 2 Process Analysis Techniques Qualitative analysis Value-Added

More information

Statistical Testing of Software Based on a Usage Model

Statistical Testing of Software Based on a Usage Model SOFTWARE PRACTICE AND EXPERIENCE, VOL. 25(1), 97 108 (JANUARY 1995) Statistical Testing of Software Based on a Usage Model gwendolyn h. walton, j. h. poore and carmen j. trammell Department of Computer

More information

Dierencegraph - A ProM Plugin for Calculating and Visualizing Dierences between Processes

Dierencegraph - A ProM Plugin for Calculating and Visualizing Dierences between Processes Dierencegraph - A ProM Plugin for Calculating and Visualizing Dierences between Processes Manuel Gall 1, Günter Wallner 2, Simone Kriglstein 3, Stefanie Rinderle-Ma 1 1 University of Vienna, Faculty of

More information

Genetic Process Mining

Genetic Process Mining Genetic Process Mining Copyright c 2006 by Ana Karla Alves de Medeiros. All rights reserved. CIP-DATA LIBRARY TECHNISCHE UNIVERSITEIT EINDHOVEN Alves de Medeiros, Ana Karla Genetic Process Mining / by

More information

Gestão e Tratamento da Informação

Gestão e Tratamento da Informação Gestão e Tratamento da Informação Web Data Extraction: Automatic Wrapper Generation Departamento de Engenharia Informática Instituto Superior Técnico 1 o Semestre 2010/2011 Outline Automatic Wrapper Generation

More information

Towards Automated Process Modeling based on BPMN Diagram Composition

Towards Automated Process Modeling based on BPMN Diagram Composition Towards Automated Process Modeling based on BPMN Diagram Composition Piotr Wiśniewski, Krzysztof Kluza and Antoni Ligęza AGH University of Science and Technology al. A. Mickiewicza 30, 30-059 Krakow, Poland

More information

Formal Modeling of BPEL Workflows Including Fault and Compensation Handling

Formal Modeling of BPEL Workflows Including Fault and Compensation Handling Formal Modeling of BPEL Workflows Including Fault and Compensation Handling Máté Kovács, Dániel Varró, László Gönczy kovmate@mit.bme.hu Budapest University of Technology and Economics Dept. of Measurement

More information

Discovering Hierarchical Process Models Using ProM

Discovering Hierarchical Process Models Using ProM Discovering Hierarchical Process Models Using ProM R.P. Jagadeesh Chandra Bose 1,2, Eric H.M.W. Verbeek 1 and Wil M.P. van der Aalst 1 1 Department of Mathematics and Computer Science, University of Technology,

More information

Addendum to the proof of log n approximation ratio for the greedy set cover algorithm

Addendum to the proof of log n approximation ratio for the greedy set cover algorithm Addendum to the proof of log n approximation ratio for the greedy set cover algorithm (From Vazirani s very nice book Approximation algorithms ) Let x, x 2,...,x n be the order in which the elements are

More information

Business Process Management Seminar 2007/ Oktober 2007

Business Process Management Seminar 2007/ Oktober 2007 Business Process Management Seminar 2007/2008 22. Oktober 2007 Process 2 Today Presentation of topics Deadline 29.10.2007 9:00 Rank up to 3 topics - send to hagen.overdick@hpi.uni-potsdam.de 3.12.2007

More information

Discovering artifact-centric processes mining assistance handling process of a first aid company using an artifact-centric approach

Discovering artifact-centric processes mining assistance handling process of a first aid company using an artifact-centric approach Eindhoven University of Technology MASTER Discovering artifact-centric processes mining assistance handling process of a first aid company using an artifact-centric approach Canbaz, S. Award date: 2011

More information

Applicability of Process Mining Techniques in Business Environments

Applicability of Process Mining Techniques in Business Environments Applicability of Process Mining Techniques in Business Environments Annual Meeting IEEE Task Force on Process Mining Andrea Burattin andreaburattin September 8, 2014 Brief Curriculum Vitæ 2009, M.Sc. Computer

More information

Bayesian Methods in Vision: MAP Estimation, MRFs, Optimization

Bayesian Methods in Vision: MAP Estimation, MRFs, Optimization Bayesian Methods in Vision: MAP Estimation, MRFs, Optimization CS 650: Computer Vision Bryan S. Morse Optimization Approaches to Vision / Image Processing Recurring theme: Cast vision problem as an optimization

More information