Discovering Concurrency Learning (Business) Process Models from Examples
|
|
- Alexandrina White
- 5 years ago
- Views:
Transcription
1 Discovering Concurrency Learning (Business) Process Models from Examples Invited Talk CONCUR 2011, , Aachen. prof.dr.ir. Wil van der Aalst
2 Business Process Management? PAGE 1
3 Business Process Management!! PAGE 2
4 Types of Process Models Used in BPM Emphasis on graphical models supporting a substantial part of the so-called workflow patterns (incl. concurrency) PAGE 3
5 Classical Challenges in BPM Verification (cf. soundness problem in WF-nets) Performance analysis (e.g., simulation) Converting models into running systems Providing flexibility without loosing control Many problems have been solved : the real problem is adoption in practice! PAGE 4
6 A more interesting challenge: Dealing with variability Variants of the same process exist in various domains, e.g., Dutch Municipalities, Hertz, Suncorp, Salesforce, Easychair, etc. Configurable process models to generate concrete processes, cf. C-YAWL. Merging process models is a challenging problem. Model similarity (rather than equivalence). PAGE 5
7 So we are interested in processes but most of us do not study them! PAGE 6
8 Desire lines in process models PAGE 7
9 Data explosion PAGE 8
10 Process Mining = Event Data + Processes Data Mining + Process Analysis Machine Learning + Formal Methods PAGE 9
11 Process Mining Process discovery: "What is really happening?" Conformance checking: "Do we do what was agreed upon?" Performance analysis: "Where are the bottlenecks?" Process prediction: "Will this case be late?" Process improvement: "How to redesign this process?" Etc. PAGE 10
12 Process Mining
13 Starting point: event log XES, MXML, SA-MXML, CSV, etc. PAGE 12
14 Simplified event log a = register request, b = examine thoroughly, c = examine casually, d = check ticket, e = decide, f = reinitiate request, g = pay compensation, and h = reject request PAGE 13
15 Process discovery PAGE 14
16 Conformance checking case 7: e is executed without being enabled case 8: g or h is missing case 10: e is missing in second round PAGE 15
17 Extension: Adding perspectives to model based on event log PAGE 16
18 We applied ProM in >100 organizations Municipalities (e.g., Alkmaar, Heusden, Harderwijk, etc.) Government agencies (e.g., Rijkswaterstaat, Centraal Justitieel Incasso Bureau, Justice department) Insurance related agencies (e.g., UWV) Banks (e.g., ING Bank) Hospitals (e.g., AMC hospital, Catharina hospital) Multinationals (e.g., DSM, Deloitte) High-tech system manufacturers and their customers (e.g., Philips Healthcare, ASML, Ricoh, Thales) Media companies (e.g. Winkwaves)... PAGE 17
19 All supported by Open-source (L-GPL), cf. Plug-in architecture Plug-ins cover the whole process mining spectrum and also support classical forms of process analysis PAGE 18
20 Process discovery business processes people machines components organizations models analyzes supports/ controls specifies configures implements analyzes records events, e.g., messages, transactions, etc. conformance enhancement PAGE 19
21 Process Discovery Techniques (small selection) automata-based learning heuristic mining distributed genetic mining language-based regions partial-order based mining genetic mining pattern-based mining stochastic task graphs fuzzy mining mining block structures state-based regions LTL mining neural networks hidden Markov models α algorithm multi-phase mining conformal process graph α# algorithm α++ algorithm ILP mining PAGE 20
22 Why is process discovery such a difficult problem? There are no negative examples (i.e., a log shows what has happened but does not show what could not happen). Due to concurrency, loops, and choices the search space has a complex structure and the log typically contains only a fraction of all possible behaviors. There is no clear relation between the size of a model and its behavior (i.e., a smaller model may generate more or less behavior although classical analysis and evaluation methods typically assume some monotonicity property). PAGE 21
23 Challenge: four competing quality criteria able to replay event log Occam s razor not overfitting the log not underfitting the log PAGE 22
24 Example: one log four models start a register request b examine thoroughly c examine casually d check ticket e decide f reinitiate request g pay compensation h reject request N 1 : fitness = +, precision = +, generalization = +, simplicity = + end # trace 455 acdeh 191 abdeg 177 adceh 144 abdeh able to replay event log fitness process discovery Occam s razor simplicity start start a register request c examine casually examine thoroughly b d check ticket d check ticket decide pay compensation reject request N 2 : fitness = -, precision = +, generalization = -, simplicity = + a register examine request casually c reinitiate decide e f h request reject request N 3 : fitness = +, precision = -, generalization = +, simplicity = + e g h end end 111 acdeg 82 adceg 56 adbeh 47 acdefdbeh 38 adbeg 33 acdefbdeh 14 acdefbdeg 11 acdefdbeg 9 adcefcdeh 8 adcefdbeh generalization not overfitting the log precision not underfitting the log start a register request a register request a register request a register request d check ticket c examine casually d check ticket c examine casually c examine casually d check ticket c examine casually d check ticket e decide e decide e decide e decide g pay compensation g pay compensation h reject request h reject request end 5 adcefbdeg 3 acdefbdefdbeg 2 adcefdbeg 2 adcefbdefbdeg 1 adcefdbefbdeh 1 adbefbdefdbeg 1 adcefdbefcdefdbeg 1391 (all 21 variants seen in the log) a b d register request examine thoroughly check ticket e decide g pay compensation a register request d check ticket b examine thoroughly e decide h reject request a register request b examine thoroughly d check ticket decide reject request N 4 : fitness = +, precision = +, generalization = -, simplicity = - e h PAGE 23
25 Model N 1 PAGE 24 acdeh abdeg adceh abdeh acdeg adceg adbeh acdefdbeh adbeg acdefbdeh acdefbdeg acdefdbeg adcefcdeh adcefdbeh adcefbdeg acdefbdefdbeg adcefdbeg adcefbdefbdeg adcefdbefbdeh adbefbdefdbeg adcefdbefcdefdbeg # trace 1391
26 Model N 2 PAGE 25 acdeh abdeg adceh abdeh acdeg adceg adbeh acdefdbeh adbeg acdefbdeh acdefbdeg acdefdbeg adcefcdeh adcefdbeh adcefbdeg acdefbdefdbeg adcefdbeg adcefbdefbdeg adcefdbefbdeh adbefbdefdbeg adcefdbefcdefdbeg # trace 1391
27 Model N 3 PAGE 26 acdeh abdeg adceh abdeh acdeg adceg adbeh acdefdbeh adbeg acdefbdeh acdefbdeg acdefdbeg adcefcdeh adcefdbeh adcefbdeg acdefbdefdbeg adcefdbeg adcefbdefbdeg adcefdbefbdeh adbefbdefdbeg adcefdbefcdefdbeg # trace 1391
28 # trace Model N acdeh abdeg adceh 144 abdeh a register request d check ticket c examine casually e decide g pay compensation acdeg adceg a register request c examine casually d check ticket e decide g pay compensation adbeh acdefdbeh a d c e h 38 adbeg register request check ticket examine casually decide reject request 33 acdefbdeh start a register request c examine casually d check ticket e decide h reject request end acdefbdeg acdefdbeg 9 adcefcdeh (all 21 variants seen in the log) 8 adcefdbeh a b d register request a register request a register request examine thoroughly d check ticket b examine thoroughly check ticket b examine thoroughly d check ticket decide decide reject request N 4 : fitness = +, precision = +, generalization = -, simplicity = - e decide e e g pay compensation h reject request h adcefbdeg acdefbdefdbeg adcefdbeg adcefbdefbdeg adcefdbefbdeh adbefbdefdbeg adcefdbefcdefdbeg PAGE 27
29 Example of a process discovery technique: Genetic Mining Characteristics requires a lot of computing power, but can be distributed easily, can deal with noise, infrequent behavior, duplicate tasks, invisible tasks, allows for incremental improvement and combinations with other approaches (heuristics post-optimization, etc.). PAGE 28
30 Genetic process mining: Overview PAGE 29
31 Example: crossover PAGE 30
32 Example: mutation remove place b b examine thoroughly g examine thoroughly g start a register request c examine casually d check ticket decide f e reinitiate request pay compensation h reject request end start a register request added arc c examine casually d check ticket e decide f reinitiate request pay compensation h reject request end PAGE 31
33 Example of a process discovery technique: Theory of Regions Two types of regions theory: State-based regions Language-based regions All about discovering places! PAGE 32
34 State-based regions: Two step approach a b [ a,b] e [a,e] d [a,d,e] [ ] [a] c b c d [a,c] [a,b,c] [a,b,c,d] b a p1 e p3 d start end p2 c p4 PAGE 33
35 Example region a enters, b and e exit, c and d do not cross a b [ a,b] e [a,e] d [a,d,e] [ ] [a] c b c d [a,c] [a,b,c] [a,b,c,d] b a p1 e p3 d start end p2 c p4 PAGE 34
36 Language-based regions A place is feasible if it can be added without disabling any of the traces in the event log. R PAGE 35
37 Conformance checking business processes people machines components organizations models analyzes supports/ controls specifies configures implements analyzes records events, e.g., messages, transactions, etc. discovery enhancement PAGE 36
38 Four models, one log N 1 b examine thoroughly g start a register request p1 p2 c examine casually d check ticket p3 p4 e decide f p5 reinitiate request pay compensation h reject request end PAGE 37
39 PAGE 38
40 Replaying (1/7) σ 1 on N 1 p = p+1 p = produced c = consumed m = missing c r = remaining p PAGE 39
41 Replaying (2/7) σ 1 on N 1 p = p+2 c = c+1 PAGE 40
42 Replaying (3/7) σ 1 on N 1 p = p+1 c = c+1 PAGE 41
43 Replaying (4/7) σ 1 on N 1 p = p+1 c = c+1 PAGE 42
44 Replaying (5/7) σ 1 on N 1 p = p+1 c = c+2 PAGE 43
45 Replaying (6/7) σ 1 on N 1 p = p+1 c = c+1 PAGE 44
46 Replaying (7/7) σ 1 on N 1 p=7 c=6 m=0 r=0 p=7 c=7 m=0 r=0 p1 p3 start p5 end c = c+1 p2 p4 m = 0 r = 0 no problems encountered PAGE 45
47 Replaying (1/7) σ 3 on N 2 p = p+1 p = produced c = consumed m = missing c r = remaining p PAGE 46
48 Replaying (2/7) σ 3 on N 2 p = p+1 c = c+1 PAGE 47
49 Replaying (3/7) σ 3 on N 2 p = p+1 c = c+1 m = m+1 PAGE 48
50 Replaying (4/7) σ 3 on N 2 p = p+1 c = c+1 PAGE 49
51 Replaying (5/7) σ 3 on N 2 p = p+1 c = c+1 PAGE 50
52 Replaying (6/7) σ 3 on N 2 p = p+1 c = c+1 PAGE 51
53 Replaying (7/7) σ 3 on N 2 r = r+1 c = c+1 Problems: m = 1 : d was forced to occur without being enabled r = 1 : output of c was not used by d PAGE 52
54 Computing fitness at trace level PAGE 53
55 Computing fitness at the log level PAGE 54
56 Example values N 1 b examine thoroughly g start a register request p1 p2 c examine casually d check ticket p3 p4 e decide f p5 reinitiate request pay compensation h reject request end PAGE 55
57 Diagnostics problem 430 tokens remain in place p1, because c did not happen while the model expected c to happen problem 10 tokens were missing in place p1 during replay, because c happened while this was not possible according to the model start 1391 problem 146 tokens were missing in place p2 during replay, because d happened while this was not possible according to the model 1391 a register request 1391 problem 566 tokens were missing in place p3 during replay, because e happened while this was not possible according to the model p1-146 p c examine casually d check ticket p3 p e decide 1537 problem 607 tokens remain in place p5, because h did not happen while the model expected h to happen p5 h reject request problem 461 of the 1391 cases did not reach place end -461 end PAGE 56
58 Challenges related to conformance checking Not as simple as it seems! In case of duplicate tasks (two transition with the same label) or silent tasks (τ labeled transitions), multiple paths need to be considered (state space analysis, heuristics, or optimization). More general formulation of the problem with costs associated to skipping/inserting particular tasks, see ProM latest conformance checker (A* algorithm). Computing the most likely alignment is needed for other types of process mining (time analysis, measuring precision, social network analysis, etc.). PAGE 57
59 How can process mining help? Detect bottlenecks Detect deviations Performance measurement Suggest improvements Decision support (e.g., recommendation and prediction) Provide mirror Highlight important problems Avoid ICT failures Avoid management by PowerPoint From politics to analytics PAGE 58
60 PAGE 59
61 Example of a Lasagna process: WMO process of a Dutch municipality Each line corresponds to one of the 528 requests that were handled in the period from until In total there are 5498 events represented as dots. The mean time needed to handled a case is approximately 25 days. PAGE 60
62 WMO process (Wet Maatschappelijke Ondersteuning) WMO refers to the social support act that came into force in The Netherlands on January 1st, The aim of this act is to assist people with disabilities and impairments. Under the act, local authorities are required to give support to those who need it, e.g., household help, providing wheelchairs and scootmobiles, and adaptations to homes. There are different processes for the different kinds of help. We focus on the process for handling requests for household help. In a period of about one year, 528 requests for household WMO support were received. These 528 requests generated 5498 events. PAGE 61
63 C-net discovered using heuristic miner (1/3) PAGE 62
64 C-net discovered using heuristic miner (2/3) PAGE 63
65 C-net discovered using heuristic miner (3/3) PAGE 64
66 Conformance check WMO process (1/3) PAGE 65
67 Conformance check WMO process (2/3) PAGE 66
68 Conformance check WMO process (3/3) The fitness of the discovered process is Of the 528 cases, 496 cases fit perfectly whereas for 32 cases there are missing or remaining tokens. PAGE 67
69 Bottleneck analysis WMO process (1/3) PAGE 68
70 Bottleneck analysis WMO process (2/3) PAGE 69
71 Bottleneck analysis WMO process (3/3) flow time of approx. 25 days with a standard deviation of approx. 28 PAGE 70
72 Two additional Lasagna processes RWS ( Rijkswaterstaat ) process WOZ ( Waardering Onroerende Zaken ) process PAGE 71
73 RWS Process The Dutch national public works department, called Rijkswaterstaat (RWS), has twelve provincial offices. We analyzed the handling of invoices in one of these offices. The office employs about 1,000 civil servants and is primarily responsible for the construction and maintenance of the road and water infrastructure in its province. To perform its functions, the RWS office subcontracts various parties such as road construction companies, cleaning companies, and environmental bureaus. Also, it purchases services and products to support its construction, maintenance, and administrative activities. PAGE 72
74 C-net discovered using heuristic miner PAGE 73
75 Social network constructed based on handovers of work Each of the 271 nodes corresponds to a civil servant. Two civil servants are connected if one executed an activity causally following an activity executed by the other civil servant PAGE 74
76 Social network consisting of civil servants that executed more than 2000 activities in a 9 month period. The darker arcs indicate the strongest relationships in the social network. Nodes having the same color belong to the same clique. PAGE 75
77 WOZ process Event log containing information about 745 objections against the so-called WOZ ( Waardering Onroerende Zaken ) valuation. Dutch municipalities need to estimate the value of houses and apartments. The WOZ value is used as a basis for determining the real-estate property tax. The higher the WOZ value, the more tax the owner needs to pay. Therefore, there are many objections (i.e., appeals) of citizens that assert that the WOZ value is too high. WOZ process discovered for another municipality (i.e., different from the one for which we analyzed the WMO process). PAGE 76
78 Discovered process model The log contains events related to 745 objections against the so-called WOZ valuation. These 745 objections generated 9583 events. There are 13 activities. For 12 of these activities both start and complete events are recorded. Hence, the WF-net has 25 transitions. PAGE 77
79 Conformance checker: (fitness is ) PAGE 78
80 Performance analysis PAGE 79
81 Resource-activity matrix (four groups discovered) PAGE 80
82 PAGE 81
83 Example of a Spaghetti process Spaghetti process describing the diagnosis and treatment of 2765 patients in a Dutch hospital. The process model was constructed based on an event log containing 114,592 events. There are 619 different activities (taking event types into account) executed by 266 different individuals (doctors, nurses, etc.). PAGE 82
84 Fragment 18 activities of the 619 activities (2.9%) PAGE 83
85 Another example (event log of Dutch housing agency) The event log contains 208 cases that generated 5987 events. There are 74 different activities. PAGE 84
86 PAGE 85
87 Conclusion Many concurrency-related BPM challenges. Process leave traces in event logs. So, if you are interested in processes, use them! Process mining: challenging and highly relevant. Process discovery challenge balancing between different objectives only example behavior Conformance checking challenge finding the most likely trace dealing with silent/duplicate steps Eldorado for exciting concurrency research! PAGE 86
88 PAGE 87
Process Discovery: Capturing the Invisible
Process Discovery: Capturing the Invisible Wil M. P. van der Aalst Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, The Netherlands. W.M.P.v.d.Aalst@tue.nl Abstract. Processes
More informationNon-Dominated Bi-Objective Genetic Mining Algorithm
Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 6 (2017) pp. 1607-1614 Research India Publications http://www.ripublication.com Non-Dominated Bi-Objective Genetic Mining
More informationMediating Between Modeled and Observed Behavior: The Quest for the "Right" Process. prof.dr.ir. Wil van der Aalst
ediating Between odeled and Observed Behavior: The Quest for the "Right" Process prof.dr.ir. Wil van der Aalst Outline Introduction to Process ining (short) ediating between a reference model and observed
More informationProcess Mining in the Context of Web Services
Process Mining in the Context of Web Services Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology, P.O. Box 513, 5600 MB Eindhoven, The Netherlands w.m.p.v.d.aalst@tue.nl Outline Web services
More informationIntroduction. Process Mining post-execution analysis Process Simulation what-if analysis
Process mining Process mining is the missing link between model-based process analysis and dataoriented analysis techniques. Through concrete data sets and easy to use software the process mining provides
More informationBusiness Intelligence & Process Modelling
Business Intelligence & Process Modelling Frank Takes Universiteit Leiden Lecture 9 Process Modelling & BPMN & Tooling BIPM Lecture 9 Process Modelling & BPMN & Tooling 1 / 47 Recap Business Intelligence:
More informationMine Your Own Business
33 Mine Your Own Business Evidence-Based BPM using Process Mining prof.dr.ir. Wil van der Aalst IBM BPM Symposium Kurhaus Wiesbaden 25-9-2013 PAGE 0 Season 1, Episode 4 (1969) PAGE 1 "Mine Your Own Business"
More informationIntra- and Inter-Organizational Process Mining: Discovering Processes Within and Between Organizations
Intra- and Inter-Organizational Process Mining: Discovering Processes Within and Between Organizations Wil M.P. van der Aalst Eindhoven University of Technology, PO Box 513, NL-5600 MB, Eindhoven, The
More informationProM 4.0: Comprehensive Support for Real Process Analysis
ProM 4.0: Comprehensive Support for Real Process Analysis W.M.P. van der Aalst 1, B.F. van Dongen 1, C.W. Günther 1, R.S. Mans 1, A.K. Alves de Medeiros 1, A. Rozinat 1, V. Rubin 2,1, M. Song 1, H.M.W.
More informationQUALITY DIMENSIONS IN PROCESS DISCOVERY: THE IMPORTANCE OF FITNESS, PRECISION, GENERALIZATION AND SIMPLICITY
International Journal of Cooperative Information Systems c World Scientific Publishing Company QUALITY DIMENSIONS IN PROCESS DISCOVERY: THE IMPORTANCE OF FITNESS, PRECISION, GENERALIZATION AND SIMPLICITY
More informationPart II Workflow discovery algorithms
Process Mining Part II Workflow discovery algorithms Induction of Control-Flow Graphs α-algorithm Heuristic Miner Fuzzy Miner Outline Part I Introduction to Process Mining Context, motivation and goal
More informationReality Mining Via Process Mining
Reality Mining Via Process Mining O. M. Hassan, M. S. Farag, M. M. MohieEl-Din Department of Mathematics, Facility of Science Al-Azhar University Cairo, Egypt {ohassan, farag.sayed, mmeldin}@azhar.edu.eg
More informationProcess Mining Tutorial
Anne Rozinat Christian W. Günther 26. April 2010 Web: http://fluxicon.com Email: anne@fluxicon.com Phone: +31(0)62 4364201 Copyright 2010 Fluxicon Problem IT-supported business processes are complex Lack
More informationDecomposed Process Mining with DivideAndConquer
Decomposed Process Mining with DivideAndConquer H.M.W. Verbeek Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, The Netherlands h.m.w.verbeek@tue.nl Abstract.
More informationMining Process Performance from Event Logs
Mining Process Performance from Event Logs The BPI Challenge 2012 Case Study A. Adriansyah and J.C.A.M Buijs Department of Mathematics and Computer Science Eindhoven University of Technology P.O. Box 513,
More informationModel Repair Aligning Process Models to Reality
Model Repair Aligning Process Models to Reality Dirk Fahland, Wil M.P. van der Aalst Eindhoven University of Technology, The Netherlands Abstract Process mining techniques relate observed behavior (i.e.,
More informationThe Multi-perspective Process Explorer
The Multi-perspective Process Explorer Felix Mannhardt 1,2, Massimiliano de Leoni 1, Hajo A. Reijers 3,1 1 Eindhoven University of Technology, Eindhoven, The Netherlands 2 Lexmark Enterprise Software,
More informationFlexible evolutionary algorithms for mining structured process models Buijs, J.C.A.M.
Flexible evolutionary algorithms for mining structured process models Buijs, J.C.A.M. DOI: 10.6100/IR780920 Published: 01/01/2014 Document Version Publisher s PDF, also known as Version of Record (includes
More informationPublished in: Petri Nets and Other Models of Concurrency - ICATPN 2007 (28th International Conference, Siedcle, Poland, June 25-29, 2007)
ProM 4.0 : comprehensive support for real process analysis van der Aalst, W.M.P.; van Dongen, B.F.; Günther, C.W.; Mans, R.S.; Alves De Medeiros, A.K.; Rozinat, A.; Rubin, V.A.; Song, M.S.; Verbeek, H.M.W.;
More informationMining with Eve - Process Discovery and Event Structures
Mining with Eve - Process Discovery and Event Structures Robin Bergenthum, Benjamin Meis Department of Software Engineering, FernUniversität in Hagen {firstname.lastname}@fernuni-hagen.de Abstract. This
More informationProcess Mining Based on Clustering: A Quest for Precision
Process Mining Based on Clustering: A Quest for Precision A.K. Alves de Medeiros 1, A. Guzzo 2, G. Greco 2, W.M.P. van der Aalst 1, A.J.M.M. Weijters 1, B. van Dongen 1, and D. Saccà 2 1 Eindhoven University
More informationReality Mining Via Process Mining
Reality Mining Via Process Mining O. M. Hassan, M. S. Farag, and M. M. Mohie El-Din Abstract Reality mining project work on Ubiquitous Mobile Systems (UMSs) that allow for automated capturing of events.
More informationConformance Checking of Processes Based on Monitoring Real Behavior
Conformance Checking of Processes Based on Monitoring Real Behavior Seminar - Multimedia Retrieval and Data Mining Aljoscha Steffens Data Management and Data Exploration Group RWTH Aachen University Germany
More informationProM 6: The Process Mining Toolkit
ProM 6: The Process Mining Toolkit H.M.W. Verbeek, J.C.A.M. Buijs, B.F. van Dongen, W.M.P. van der Aalst Department of Mathematics and Computer Science, Eindhoven University of Technology P.O. Box 513,
More informationThe multi-perspective process explorer
The multi-perspective process explorer Mannhardt, F.; de Leoni, M.; Reijers, H.A. Published in: Proceedings of the Demo Session of the 13th International Conference on Business Process Management (BPM
More informationTypes of Process Mining
1 Types of Process Mining 2 Types of Mining Algorithms 3 Types of Mining Algorithms 4 Control-Flow Mining 1. Start 2. 1. Get Ready Start 1. 3. 2. Start Travel by Get Train Ready 1. 2. 4. Start 3. Get Beta
More informationDecomposed Process Mining: The ILP Case
Decomposed Process Mining: The ILP Case H.M.W. Verbeek and W.M.P. van der Aalst Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, The Netherlands {h.m.w.verbeek,w.m.p.v.d.aaalst}@tue.nl
More informationScalable Process Discovery and Conformance Checking
Scalable Process Discovery and Conformance Checking Sander J.J. Leemans, Dirk Fahland, and Wil M.P. van der Aalst Eindhoven University of Technology, the Netherlands {s.j.j.leemans, d.fahland, w.m.p.v.d.aalst}@tue.nl
More informationTowards Process Instances Building for Spaghetti Processes
Towards Process Instances Building for Spaghetti Processes Claudia Diamantini 1, Laura Genga 1, Domenico Potena 1, and Wil M.P. van der Aalst 2 1 Information Engineering Department Università Politecnica
More informationScientific Workflows for Process Mining: Building Blocks, Scenarios, and Implementation
Software Tools for Technology Transfer manuscript No. (will be inserted by the editor) Scientific Workflows for Process Mining: Building Blocks, Scenarios, and Implementation Alfredo Bolt, Massimiliano
More informationGenetic Process Mining: A Basic Approach and its Challenges
Genetic Process Mining: A Basic Approach and its hallenges A.K. Alves de Medeiros, A.J.M.M. Weijters and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O.
More informationProcess Mining Based on Clustering: A Quest for Precision
Process Mining Based on Clustering: A Quest for Precision Ana Karla Alves de Medeiros 1, Antonella Guzzo 2, Gianluigi Greco 2, WilM.P.vanderAalst 1, A.J.M.M. Weijters 1, Boudewijn F. van Dongen 1, and
More informationProcess Mining Discovering Workflow Models from Event-Based Data
Process Mining Discovering Workflow Models from Event-Based Data A.J.M.M. Weijters W.M.P van der Aalst Eindhoven University of Technology, P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands, +31 40 2473857/2290
More informationData Streams in ProM 6: A Single-Node Architecture
Data Streams in ProM 6: A Single-Node Architecture S.J. van Zelst, A. Burattin 2, B.F. van Dongen and H.M.W. Verbeek Eindhoven University of Technology {s.j.v.zelst,b.f.v.dongen,h.m.w.verbeek}@tue.nl 2
More informationA PROPOSAL OF USING DEVS MODEL FOR PROCESS MINING
A PROPOSAL OF USING DEVS MODEL FOR PROCESS MINING Yan Wang (a), Grégory Zacharewicz (b), David Chen (c), Mamadou Kaba Traoré (d) (a),(b),(c) IMS, University of Bordeaux, 33405 Talence Cedex, France (d)
More informationOnline Conformance Checking for Petri Nets and Event Streams
Online Conformance Checking for Petri Nets and Event Streams Andrea Burattin University of Innsbruck, Austria; Technical University of Denmark, Denmark andbur@dtu.dk Abstract. Within process mining, we
More informationModeling the Control-Flow Perspective. prof.dr.ir. Wil van der Aalst
Modeling the ontrol-flow Perspective prof.dr.ir. Wil van der Aalst From model to behavior... http://wwwis.win.tue.nl/~wvdaalst/workflowcourse/examples/casehandling.swf asic concepts process instance, e.g.,
More informationMeasuring the Precision of Multi-perspective Process Models
Measuring the Precision of Multi-perspective Process Models Felix Mannhardt 1,2, Massimiliano de Leoni 1, Hajo A. Reijers 3,1, Wil M.P. van der Aalst 1 1 Eindhoven University of Technology, Eindhoven,
More informationSupporting the Workflow Management System Development Process with YAWL
Supporting the Workflow Management System Development Process with YAWL R.S. Mans 1, W.M.P. van der Aalst 1 Department of Mathematics and Computer Science, Eindhoven University of Technology, P.O. ox 513,
More informationA General Divide and Conquer Approach for Process Mining
A General Divide and Conquer Approach for Process Mining Wil M.P. van der Aalst Architecture of Information Systems, Eindhoven University of Technology, P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands.
More informationData- and Resource-Aware Conformance Checking of Business Processes
Data- and Resource-Aware Conformance Checking of Business Processes Massimiliano de Leoni, Wil M. P. van der Aalst, and Boudewijn F. van Dongen Eindhoven University of Technology, Eindhoven, The Netherlands
More informationDealing with Artifact-Centric Systems: a Process Mining Approach
Dealing with Artifact-Centric Systems: a Process Mining Approach Guangming Li and Renata Medeiros de Carvalho 2 Abstract: Process mining provides a series of techniques to analyze business processes based
More informationMining CPN Models. Discovering Process Models with Data from Event Logs. A. Rozinat, R.S. Mans, and W.M.P. van der Aalst
Mining CPN Models Discovering Process Models with Data from Event Logs A. Rozinat, R.S. Mans, and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513,
More informationOnline Conformance Checking for Petri Nets and Event Streams
Downloaded from orbit.dtu.dk on: Apr 30, 2018 Online Conformance Checking for Petri Nets and Event Streams Burattin, Andrea Published in: Online Proceedings of the BPM Demo Track 2017 Publication date:
More informationBPMN Miner 2.0: Discovering Hierarchical and Block-Structured BPMN Process Models
BPMN Miner 2.0: Discovering Hierarchical and Block-Structured BPMN Process Models Raffaele Conforti 1, Adriano Augusto 1, Marcello La Rosa 1, Marlon Dumas 2, and Luciano García-Bañuelos 2 1 Queensland
More informationAPD tool: Mining Anomalous Patterns from Event Logs
APD tool: Mining Anomalous Patterns from Event Logs Laura Genga 1, Mahdi Alizadeh 1, Domenico Potena 2, Claudia Diamantini 2, and Nicola Zannone 1 1 Eindhoven University of Technology 2 Università Politecnica
More informationMultidimensional Process Mining with PMCube Explorer
Multidimensional Process Mining with PMCube Explorer Thomas Vogelgesang and H.-Jürgen Appelrath Department of Computer Science University of Oldenburg, Germany thomas.vogelgesang@uni-oldenburg.de Abstract.
More informationFilter Techniques for Region-Based Process Discovery
Filter Techniques for Region-Based Process Discovery S.J. van Zelst, B.F. van Dongen, W.M.P. van der Aalst Department of Mathematics and Computer Science Eindhoven University of Technology, The Netherlands
More informationPredicting the next click with Web log Process Mining
Predicting the next click with Web log Process Mining Suresh Kumar Mukhiya Master in Information Systems Submission date: June 2016 Supervisor: Jon Atle Gulla, IDI Co-supervisor: Jon Espen Ingvaldsen,
More informationEindhoven University of Technology MASTER. Context analysis of business processes based on event logs. Airlangga Adi Hermawan, A.
Eindhoven University of Technology MASTER Context analysis of business processes based on event logs Airlangga Adi Hermawan, A. Award date: 2013 Link to publication Disclaimer This document contains a
More informationConformance Checking Evaluation of Process Discovery Using Modified Alpha++ Miner Algorithm
Conformance Checking Evaluation of Process Discovery Using Modified Alpha++ Miner Algorithm Yutika Amelia Effendi and Riyanarto Sarno Department of Informatics, Faculty of Information and Communication
More informationDiscovering Hierarchical Process Models Using ProM
Discovering Hierarchical Process Models Using ProM R.P. Jagadeesh Chandra Bose 1,2, Eric H.M.W. Verbeek 1 and Wil M.P. van der Aalst 1 1 Department of Mathematics and Computer Science, University of Technology,
More informationBidimensional Process Discovery for Mining BPMN Models
Bidimensional Process Discovery for Mining BPMN Models DeMiMoP 2014, Haifa Eindhoven Jochen De Weerdt, KU Leuven (@jochendw) Seppe vanden Broucke, KU Leuven (@macuyiko) (presenter) Filip Caron, KU Leuven
More informationProcess Model Discovery: A Method Based on Transition System Decomposition
Process Model Discovery: A Method Based on Transition System Decomposition Anna A. Kalenkova 1, Irina A. Lomazova 1, and Wil M.P. van der Aalst 1,2 1 National Research University Higher School of Economics
More informationTowards Improving the Representational Bias of Process Mining
Towards Improving the Representational Bias of Process Mining Wil Aalst, Joos Buijs, Boudewijn Dongen To cite this version: Wil Aalst, Joos Buijs, Boudewijn Dongen. Towards Improving the Representational
More informationA ProM Operational Support Provider for Predictive Monitoring of Business Processes
A ProM Operational Support Provider for Predictive Monitoring of Business Processes Marco Federici 1,2, Williams Rizzi 1,2, Chiara Di Francescomarino 1, Marlon Dumas 3, Chiara Ghidini 1, Fabrizio Maria
More informationArtifact lifecycle discovery
Artifact lifecycle discovery Popova, V.; Fahland, D.; Dumas, M. Published: 01/01/2013 Document Version Publisher s PDF, also known as Version of Record (includes final page, issue and volume numbers) Please
More informationProcess Mining: Using CPN Tools to Create Test Logs for Mining Algorithms
Process Mining: Using CPN Tools to Create Test Logs for Mining Algorithms A.K. Alves de Medeiros and C.W. Günther Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600
More informationProcess Mining Put Into Context
Process Mining Put Into Context Wil M.P. van der Aalst 1,2 and Schahram Dustdar 3 1 Eindhoven University of Technology 2 Queensland University of Technology 3 Technical University of Vienna Abstract. Process
More informationEnabling Flexibility in Process-aware Information Systems Challenges, Methods, Technologies
Enabling Flexibility in Process-aware Information Systems Challenges, Methods, Technologies MONTEVIDEO, DECEMBER 11 TH 2012 PRESENTED BY BARBARA WEBER UNIV. OF INNSBRUCK Content Keynote based on new Springer
More informationWorkflow : Patterns and Specifications
Workflow : Patterns and Specifications Seminar Presentation by Ahana Pradhan Under the guidance of Prof. Rushikesh K. Joshi Department of Computer Science and Engineering Indian Institute of Technology,
More informationDiscovering workflow nets using integer linear programming
Computing DOI 10.1007/s00607-017-0582-5 Discovering workflow nets using integer linear programming S. J. van Zelst 1 B. F. van Dongen 1 W. M. P. van der Aalst 1 H. M. W. Verbeek 1 Received: 19 July 2016
More informationInteroperability in the ProM Framework
Interoperability in the ProM Framework H.M.W. Verbeek 1, B.F. van Dongen 1, J. Mendling 2, and W.M.P. van der Aalst 1 1 Department of Technology Management, Eindhoven University of Technology P.O. Box
More informationLezione 14 Model Transformations for BP Analysis and Execution
Lezione 14 Model Transformations for BP Analysis and Execution Ingegneria dei Processi Aziendali Modulo 1 - Servizi Web Unità didattica 1 Protocolli Web Ernesto Damiani 1 Università di Milano 1 Business
More informationMining Based on Learning from Process Change Logs
Mining Based on Learning from Process Change Logs Chen Li 1, Manfred Reichert 2, and Andreas Wombacher 3 1 Information System group, University of Twente, The Netherlands lic@cs.utwente.nl 2 Institute
More informationBusiness Process Management
Business Process Management Paolo Bottoni Lecture 11: Process Mining Adapted from the slides for the book : Dumas, La Rosa, Mendling & Reijers: Fundamentals of Business Process Management, Springer 2013
More informationStreaming Fraud Detection on Session Based Data
Streaming Fraud Detection on Session Based Data Master s Thesis Hylke Hendriksen Streaming Fraud Detection on Session Based Data THESIS submitted in partial fulfillment of the requirements for the degree
More informationXES, XESame, and ProM 6
XES, XESame, and ProM 6 H.M.W. Verbeek, J.C.A.M. Buijs, B.F. van Dongen, and W.M.P. van der Aalst Technische Universiteit Eindhoven Department of Mathematics and Computer Science P.O. Box 513, 5600 MB
More informationKnowledge Discovery. URL - Spring 2018 CS - MIA 1/22
Knowledge Discovery Javier Béjar cbea URL - Spring 2018 CS - MIA 1/22 Knowledge Discovery (KDD) Knowledge Discovery in Databases (KDD) Practical application of the methodologies from machine learning/statistics
More informationProcess mining using BPMN: relating event logs and process models Kalenkova, A.A.; van der Aalst, W.M.P.; Lomazova, I.A.; Rubin, V.A.
Process mining using BPMN: relating event logs and process models Kalenkova, A.A.; van der Aalst, W.M.P.; Lomazova, I.A.; Rubin, V.A. Published in: Software and Systems Modeling DOI: 10.1007/s10270-015-0502-0
More information2015 International Conference on Computer, Control, Informatics and Its Applications
2015 International Conference on Computer, Control, Informatics and Its Applications Business Process Optimization from Single Timestamp Event Log Riyanarto Sarno *, Fitrianing Haryadita, Kartini, Sarwosri
More informationUsing Minimum Description Length for Process Mining
Using Minimum Description Length for Process Mining T. alders TU indhoven t.calders@tue.nl.w. Günther TU indhoven c.w.gunther@tue.nl M. Pechenizkiy TU indhoven m.pechenizkiy@tue.nl. Rozinat TU indhoven
More informationYAWL in the Cloud. 1 Introduction. D.M.M. Schunselaar, T.F. van der Avoort, H.M.W. Verbeek, and W.M.P. van der Aalst
YAWL in the Cloud D.M.M. Schunselaar, T.F. van der Avoort, H.M.W. Verbeek, and W.M.P. van der Aalst Eindhoven University of Technology, P.O. Box 513, 5600 MB, Eindhoven, The Netherlands {d.m.m.schunselaar,
More informationEnabling Flexibility in Process-Aware
Manfred Reichert Barbara Weber Enabling Flexibility in Process-Aware Information Systems Challenges, Methods, Technologies ^ Springer Part I Basic Concepts and Flexibility Issues 1 Introduction 3 1.1 Motivation
More informationTesting! Prof. Leon Osterweil! CS 520/620! Spring 2013!
Testing Prof. Leon Osterweil CS 520/620 Spring 2013 Relations and Analysis A software product consists of A collection of (types of) artifacts Related to each other by myriad Relations The relations are
More informationCA441 BPM - Modelling Workflow with Petri Nets. Modelling Workflow with Petri Nets. Workflow Management Issues. Workflow. Process.
Modelling Workflow with Petri Nets 1 Workflow Management Issues Georgakopoulos,Hornick, Sheth Process Workflow specification Workflow Implementation =workflow application Business Process Modelling/ Workflow
More informationInteractive PMCube Explorer
Interactive PMCube Explorer Documentation and User Manual Thomas Vogelgesang Carl von Ossietzky Universität Oldenburg June 15, 2017 Contents 1. Introduction 4 2. Application Overview 5 3. Data Preparation
More informationImproving Process Model Precision by Loop Unrolling
Improving Process Model Precision by Loop Unrolling David Sánchez-Charles 1, Marc Solé 1, Josep Carmona 2, Victor Muntés-Mulero 1 1 CA Strategic Research Labs, CA Technologies, Spain David.Sanchez,Marc.SoleSimo,Victor.Muntes@ca.com
More informationDeclarative Workflows
Informatik - Forschung und Entwicklung manuscript No. (will be inserted by the editor) W.M.P. van der Aalst M. Pesic H. Schonenberg Declarative Workflows Balancing Between Flexibility and Support Eingegangen:
More informationREENGINEERING SYSTEM
GENERAL OBJECTIVES OF THE SUBJECT At the end of the course, Individuals will analyze the characteristics of the materials in the industries, taking into account its advantages and functionality, for their
More informationFinding Suitable Activity Clusters for Decomposed Process Discovery
Finding Suitable Activity Clusters for Decomposed Process Discovery B.F.A. Hompes, H.M.W. Verbeek, and W.M.P. van der Aalst Department of Mathematics and Computer Science Eindhoven University of Technology,
More informationA Simulation-Based Approach to Process Conformance
A Simulation-Based Approach to Process Conformance Pedro M. Martins IST Technical University of Lisbon Avenida Prof. Dr. Cavaco Silva 2744-016 Porto Salvo, Portugal pedro.m.martins@tagus.ist.utl.pt Abstract.
More informationProject IST SUPER Semantics Utilized for Process management within and between Enterprises. Deliverable 6.11
Project IST 026850 SUPER Semantics Utilized for Process management within and between Enterprises Deliverable 6.11 Semantic Process Mining Tool Final Implementation Leading Partner: TUE Contributing Partner:
More informationChange Your History: Learning from Event Logs to Improve Processes
Change Your History: Learning from Event Logs to Improve Processes Wil M.P. van der Aalst Wei Zhe Low Moe T. Wynn Arthur H.M. ter Hofstede Technische Universiteit Eindhoven (TU/e), Eindhoven, The Netherlands
More informationConformance Testing: Measuring the Fit and Appropriateness of Event Logs and Process Models
Conformance Testing: Measuring the Fit and Appropriateness of Event Logs and Process Models A. Rozinat 1,2 and W.M.P. van der Aalst 1 1 Department of Technology Management, Eindhoven University of Technology
More informationAnalysis of BPMN Models
Analysis of BPMN Models Addis Gebremichael addisalemayehu.gebremichael@student.uantwerpen.be Abstract The Business Process Modeling Notation (BPMN) is a standard notation for capturing business processes,
More informationDigital Enablement bridging the digital divide
Digital Enablement bridging the digital divide Ahmar Waryas ahmar.waryas@huawei.com China Internet plus policy will transform industries New Economic Growth Engine: From Made in China to Create in China
More informationLecture 7 Quantitative Process Analysis II
MTAT.03.231 Business Process Management Lecture 7 Quantitative Process Analysis II Marlon Dumas marlon.dumas ät ut. ee 1 Process Analysis 2 Process Analysis Techniques Qualitative analysis Value-Added
More informationStatistical Testing of Software Based on a Usage Model
SOFTWARE PRACTICE AND EXPERIENCE, VOL. 25(1), 97 108 (JANUARY 1995) Statistical Testing of Software Based on a Usage Model gwendolyn h. walton, j. h. poore and carmen j. trammell Department of Computer
More informationDierencegraph - A ProM Plugin for Calculating and Visualizing Dierences between Processes
Dierencegraph - A ProM Plugin for Calculating and Visualizing Dierences between Processes Manuel Gall 1, Günter Wallner 2, Simone Kriglstein 3, Stefanie Rinderle-Ma 1 1 University of Vienna, Faculty of
More informationGenetic Process Mining
Genetic Process Mining Copyright c 2006 by Ana Karla Alves de Medeiros. All rights reserved. CIP-DATA LIBRARY TECHNISCHE UNIVERSITEIT EINDHOVEN Alves de Medeiros, Ana Karla Genetic Process Mining / by
More informationGestão e Tratamento da Informação
Gestão e Tratamento da Informação Web Data Extraction: Automatic Wrapper Generation Departamento de Engenharia Informática Instituto Superior Técnico 1 o Semestre 2010/2011 Outline Automatic Wrapper Generation
More informationTowards Automated Process Modeling based on BPMN Diagram Composition
Towards Automated Process Modeling based on BPMN Diagram Composition Piotr Wiśniewski, Krzysztof Kluza and Antoni Ligęza AGH University of Science and Technology al. A. Mickiewicza 30, 30-059 Krakow, Poland
More informationFormal Modeling of BPEL Workflows Including Fault and Compensation Handling
Formal Modeling of BPEL Workflows Including Fault and Compensation Handling Máté Kovács, Dániel Varró, László Gönczy kovmate@mit.bme.hu Budapest University of Technology and Economics Dept. of Measurement
More informationDiscovering Hierarchical Process Models Using ProM
Discovering Hierarchical Process Models Using ProM R.P. Jagadeesh Chandra Bose 1,2, Eric H.M.W. Verbeek 1 and Wil M.P. van der Aalst 1 1 Department of Mathematics and Computer Science, University of Technology,
More informationAddendum to the proof of log n approximation ratio for the greedy set cover algorithm
Addendum to the proof of log n approximation ratio for the greedy set cover algorithm (From Vazirani s very nice book Approximation algorithms ) Let x, x 2,...,x n be the order in which the elements are
More informationBusiness Process Management Seminar 2007/ Oktober 2007
Business Process Management Seminar 2007/2008 22. Oktober 2007 Process 2 Today Presentation of topics Deadline 29.10.2007 9:00 Rank up to 3 topics - send to hagen.overdick@hpi.uni-potsdam.de 3.12.2007
More informationDiscovering artifact-centric processes mining assistance handling process of a first aid company using an artifact-centric approach
Eindhoven University of Technology MASTER Discovering artifact-centric processes mining assistance handling process of a first aid company using an artifact-centric approach Canbaz, S. Award date: 2011
More informationApplicability of Process Mining Techniques in Business Environments
Applicability of Process Mining Techniques in Business Environments Annual Meeting IEEE Task Force on Process Mining Andrea Burattin andreaburattin September 8, 2014 Brief Curriculum Vitæ 2009, M.Sc. Computer
More informationBayesian Methods in Vision: MAP Estimation, MRFs, Optimization
Bayesian Methods in Vision: MAP Estimation, MRFs, Optimization CS 650: Computer Vision Bryan S. Morse Optimization Approaches to Vision / Image Processing Recurring theme: Cast vision problem as an optimization
More information