Declarative Process Discovery with MINERful in ProM
|
|
|
- Beverley Mitchell
- 9 years ago
- Views:
Transcription
1 Declarative Process Discovery with MINERful in ProM Claudio Di Ciccio 1, Mitchel H. M. Schouten 2, Massimiliano de Leoni 2, and Jan Mendling 1 1 Vienna University of Economics and Business, Austria [email protected], [email protected] 2 Eindhoven University of Technology, The Netherlands [email protected], [email protected] Abstract. Declarative process models consist of a set of constraints exerted over the execution of process activities. DECLARE is a declarative process modelling language that specifies a set of constraint templates along with their graphical notation. The automated discovery of DECLARE models aims at finding those constraints that are verified throughout a given event log. In this paper, we present a fast scalable tool for mining DECLARE models in ProM. Its usage is described with its application on a use case, based on a publicly available real-life benchmark. Keywords: Process Mining; Process Discovery; Declarative Processes 1 Overview Process Mining [1] is the area of research embracing the automated discovery, conformance checking and enhancement of business process models. All involved techniques are evidence-based, as the input always comprises a collection of computer-recorded information that track the executions of process instances, namely event logs. Indeed, process discovery pertains to the inference of process models stemming from event logs. Over the last years, the declarative process modelling approach has flanked the classical procedural one [5]. Declarative approaches only depict the behavioural constraints under which a process instance can unfold in its execution: as long as the constraints are not violated, the process instance is considered as valid. The declarative approach is a complementary strategy to the procedural models, which specify what are the next allowed activities at each stage of the process execution. Declarative process models are effective in a context of high flexibility for business processes [2]. The reason intuitively lies in the fact that fewer constraints allow for more possible executions. On the contrary, more flexibility implies a higher number of alternative paths to depict in the procedural models. DECLARE [2] is a declarative process modelling language. It specifies an extensible set of constraint templates that are parametric with respect to the process activities. A list of constraint templates used in the remainder of the paper are listed in Table 1, where a, b, and c are example activities. Examples of DECLARE constraints are Init(a), and Response(b, c). The first one states that every instance must start with the execution Copyright c 2015 for this paper by its authors. Copying permitted for private and academic purposes.
2 Constraints Init(a) AtMostOne(a) CoExistence(a, b) Response(a, b) AlternateResponse(a, b) Precedence(a, b) Description a should be the first activity in a trace a should be executed at most once If one of the activities a or b is executed, the other one also has to be executed When a is executed, b has to be executed after a When a is executed, b has to be executed after a and no other a can be executed in between b has to be preceded by a AlternatePrecedence(a, b) b has to be preceded by a and another b cannot be executed between a and b AlternateSuccession(a, b) Combination of AlternateResponse(a, b) and AlternatePrecedence(a, b) ChainSuccession(a, b) a is immediately followed by b NotChainSuccession(a, b) a is not allowed to be immediately followed by b Table 1: Table listing the constraints mentioned in this paper. of activity a. The second constraint imposes that if activity b is performed, then c must be performed eventually in the future. Init is named existence constraint template as it constrains the execution of one activity in process instances. Response is named relation constraint template instead, because it constrains the interplay of two activities. Among the pair of constrained activities, there always are at least an activation and a target. The activation is an event whose occurrence constrains the possibility of other events (targets) to occur before or afterwards. For example, for the constraint every request is eventually acknowledged, each request is an activation. This activation is eventually associated with either a fulfilment or a violation, depending on whether or not the activation is matched with a target event that satisfies the constraint. Using again the example of requests that need acknowledgements, if the request occurs, this activation is associated with a fulfilment if the acknowledgement event is later observed; otherwise, the activation is associated with a violation. For Response(b, c), b is the activation and c is the target. The full list of DECLARE constraint templates can be found in [2]. This paper reports on the implementation of MINERful, a technique to mine DE- CLARE process models from an existing event log [3]. Compared with other existing techniques, MINERful has shown the best scalability with respect to the input size, in terms of number of traces, length of traces and activities of the process. Readers are referred to[3] for more details about this comparison. In particular, the implementation presented in this paper has been realised in ProM, 3 an extensible framework that provides support to develop and exploit a wide variety of process mining techniques in a standardised environment. To use MINERful with ProM, it is necessary to download the ProM Nightly build 4 and, subsequently, install the DeclareMinerFul package through the ProM s Package Manager
3 2 Usage of the Tool on a Use Case In this paper we will demonstrate the functionalities of MINERful using the publicly available real-life event log Road Traffic Fine Management Process. 5 The event log records executions of instances of the process enacted in an Italian local police office for managing fines for road traffic violations. It contains 150,370 traces and 561,470 events for 11 different process activities. 2.1 Parameters The MINERful plug-in uses an event log as input. In the remainder, we will adopt the following example event log: { a, b, a, c, a, b, b, a, c, b, a, a, c, c, a, b, c }. The application of the MINERful plug-in for the DECLARE-model discovery can be customised through four parameters, namely: Support. It is the number of fulfilments divided by either (i) the number of traces in the log, in the case of existence constraints like Init(a), or (ii) the number of occurrences of the activations (in the case of relation constraints like Response(b, c)). In the example log, the support of Init(a) is 1.0, because all traces start with a, whereas the support of Response(b, c) is 0.8, as 4 b s out of 5 fulfil the constraint. Confidence. It is the product of the support and the fraction of traces in the log where either (i) the constrained activity occurs (existence constraints), or (ii) the activation occurs (relation constraints). The confidence of Init(a) is = 1.0 and the confidence of Response(b, c) is = 0.6, since b occurs in 3 traces out of 4. Interest Factor. It is the product of confidence and the fraction of traces in the log where either (i) the constrained activity occurs (existence constraints), or (ii) the target occurs (relation constraints). The interest factor of Init(a) is = 1.0, and the interest factor of Response(b, c) is = 0.6, since c occurs in all traces. Skip Negative Constraints. When the process is characterised by parts with a rigid structure, the discovered model may blow up in term of presence of negative constraints. Therefore, analysts are provided with an option to not considering negative constraints, thus increasing the readability of the discovered models. 2.2 Output Initially, the MINERful plug-in was executed skipping the negative constraints and using the following values for the other parameters: (i) support = 0.50, (ii) confidence = 0.00, (iii) interest factor = The resulting declarative process model can be seen in Fig. 1. The output view consists of two panels. The panel on the left-hand side contains the mined declarative process model. The user is free to relocate activities and constraints to manually improve the readability. The panel on the right-hand side allows the user to adjust the four parameters mentioned in Section 2.1 (see the area delimited by a black 5
4 Fig. 1: The resulting output screen from MINERful s where the model has been discovered by setting support to 0.5 and setting confidence and interest factor to 0. rectangle in the figure). After the adjustment, the user can click on button Regenerate Model to mine a new model with the new values set for those parameters. The model in Fig. 1 has been obtained by assigning value 0 to all parameters, except for support. This configuration has produced a cluttered declarative process model with many constraints, i.e. the model is probably overfitting the event log. The increase of the value of any parameter would generate a model with fewer constraints, thus probably reducing the overfitting problems and, also, improving the readability of the declarative process model. Of course, an excessive increase of any parameter may have a detrimental effect on the precision of the discovered model: the model may underfit the event log, allowing for too much behaviour. The declarative process model shown in Fig. 2 derives from the application of the following parameters: (i) support = 0.70, (ii) confidence = 0.30, (iii) interest factor = A screencast illustrating the functioning of the MINERful plug-in is available at prom/documentation/declareminerful/screencast.mp Tool Maturity The process models were discovered using a laptop equipped with an Intel Core i3 with 4GB of RAM. With this modest hardware, the MINERful plug-in was able to mine the model in less than 30 seconds using a real-size event log with 561,470 events belonging to 150,370 traces. This indicates that the MINERful plug-in has reached a
5 Fig. 2: The resulting output screen from MINERful s where the model has been discovered by setting support, confidence and interesting factor to 0.7, 0.3 and 0, respectively. The resulting model is certainly simpler but may be underfitting, hence not very precise. large degree of maturity as it performs extremely well in terms of scalability. Also, the plug-in is integrated with the entire repertoire of techniques that are already available in ProM (see, e.g., [4]): the mined model can thus be later used for conformance checking, bottleneck analysis, improvement, and more. Acknowledgements. The work of Dr. Di Ciccio and Dr. de Leoni has received funding from the EU Seventh Framework Programme under grant agreement (GET Service) and grant agreement (CORE), respectively. References 1. van der Aalst, W.M.P.: Process Mining: Discovery, Conformance and Enhancement of Business Processes. Springer (2011) 2. van der Aalst, W.M.P., Pesic, M.: DecSerFlow: Towards a truly declarative service flow language. In: WS-FM. pp (2006) 3. Di Ciccio, C., Mecella, M.: On the discovery of declarative control flows for artful processes. ACM Trans. Manage. Inf. Syst. 5(4), 24:1 24:37 (2015) 4. Maggi, F.M.: Declarative process mining with the Declare component of ProM. In: BPM Demos. CEUR Workshop Proceedings (2013) 5. Pichler, P., Weber, B., Zugal, S., Pinggera, J., Mendling, J., Reijers, H.A.: Imperative versus declarative process modeling languages: An empirical investigation. In: BPM Workshops. pp (2011)
Process Mining An index to the state of the art and an outline of open research challenges at DIIAG
An index to the state of the art and an outline of open research challenges at DIIAG Claudio Di Ciccio, Massimo Mecella Seminars in Software and Services for the Information Society Rome, 2012, May the
CPN Tools 4: A Process Modeling Tool Combining Declarative and Imperative Paradigms
CPN Tools 4: A Process Modeling Tool Combining Declarative and Imperative Paradigms Michael Westergaard 1,2 and Tijs Slaats 3,4 1 Department of Mathematics and Computer Science, Eindhoven University of
CCaaS: Online Conformance Checking as a Service
CCaaS: Online Conformance Checking as a Service Ingo Weber 1, Andreas Rogge-Solti 2, Chao Li 1, and Jan Mendling 2 1 NICTA, Sydney, Australia [email protected] 2 Wirtschaftsuniversität Wien,
Process Modelling from Insurance Event Log
Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R
Handling Big(ger) Logs: Connecting ProM 6 to Apache Hadoop
Handling Big(ger) Logs: Connecting ProM 6 to Apache Hadoop Sergio Hernández 1, S.J. van Zelst 2, Joaquín Ezpeleta 1, and Wil M.P. van der Aalst 2 1 Department of Computer Science and Systems Engineering
BPIC 2014: Insights from the Analysis of Rabobank Service Desk Processes
BPIC 2014: Insights from the Analysis of Rabobank Service Desk Processes Bruna Christina P. Brandão, Guilherme Neves Lopes, Pedro Henrique P. Richetti Department of Applied Informatics - Federal University
Eventifier: Extracting Process Execution Logs from Operational Databases
Eventifier: Extracting Process Execution Logs from Operational Databases Carlos Rodríguez 1, Robert Engel 2, Galena Kostoska 1, Florian Daniel 1, Fabio Casati 1, and Marco Aimar 3 1 University of Trento,
EDIminer: A Toolset for Process Mining from EDI Messages
EDIminer: A Toolset for Process Mining from EDI Messages Robert Engel 1, R. P. Jagadeesh Chandra Bose 2, Christian Pichler 1, Marco Zapletal 1, and Hannes Werthner 1 1 Vienna University of Technology,
Mining Configurable Process Models from Collections of Event Logs
Mining Configurable Models from Collections of Event Logs J.C.A.M. Buijs, B.F. van Dongen, and W.M.P. van der Aalst Eindhoven University of Technology, The Netherlands {j.c.a.m.buijs,b.f.v.dongen,w.m.p.v.d.aalst}@tue.nl
WoPeD - An Educational Tool for Workflow Nets
WoPeD - An Educational Tool for Workflow Nets Thomas Freytag, Cooperative State University (DHBW) Karlsruhe, Germany [email protected] Martin Sänger, 1&1 Internet AG, Karlsruhe, Germany [email protected]
Dotted Chart and Control-Flow Analysis for a Loan Application Process
Dotted Chart and Control-Flow Analysis for a Loan Application Process Thomas Molka 1,2, Wasif Gilani 1 and Xiao-Jun Zeng 2 Business Intelligence Practice, SAP Research, Belfast, UK The University of Manchester,
Process Mining in Big Data Scenario
Process Mining in Big Data Scenario Antonia Azzini, Ernesto Damiani SESAR Lab - Dipartimento di Informatica Università degli Studi di Milano, Italy antonia.azzini,[email protected] Abstract. In
Aligning Event Logs and Declarative Process Models for Conformance Checking
Aligning Event Logs and Declarative Process Models for Conformance Checking Massimiliano de Leoni, Fabrizio M. Maggi, and Wil M. P. van der Aalst Eindhoven University of Technology, Eindhoven, The Netherlands
Supporting the BPM lifecycle with FileNet
Supporting the BPM lifecycle with FileNet Mariska Netjes Hajo A. Reijers Wil. M.P. van der Aalst Outline Introduction Evaluation approach Evaluation of FileNet Conclusions Business Process Management Supporting
Towards Cross-Organizational Process Mining in Collections of Process Models and their Executions
Towards Cross-Organizational Process Mining in Collections of Process Models and their Executions J.C.A.M. Buijs, B.F. van Dongen, W.M.P. van der Aalst Department of Mathematics and Computer Science, Eindhoven
Visualizing the Process of Process Modeling with PPMCharts
Visualizing the Process of Process Modeling with PPMCharts (regular paper) Jan Claes 1, Irene Vanderfeesten 2, Jakob Pinggera 3, Hajo A. Reijers 2, Barbara Weber 3 and Geert Poels 1 1 Ghent University,
Implementing Heuristic Miner for Different Types of Event Logs
Implementing Heuristic Miner for Different Types of Event Logs Angelina Prima Kurniati 1, GunturPrabawa Kusuma 2, GedeAgungAry Wisudiawan 3 1,3 School of Compuing, Telkom University, Indonesia. 2 School
Process Mining and Monitoring Processes and Services: Workshop Report
Process Mining and Monitoring Processes and Services: Workshop Report Wil van der Aalst (editor) Eindhoven University of Technology, P.O.Box 513, NL-5600 MB, Eindhoven, The Netherlands. [email protected]
Relational XES: Data Management for Process Mining
Relational XES: Data Management for Process Mining B.F. van Dongen and Sh. Shabani Department of Mathematics and Computer Science, Eindhoven University of Technology, The Netherlands. B.F.v.Dongen, [email protected]
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Research Motivation In today s modern digital environment with or without our notice we are leaving our digital footprints in various data repositories through our daily activities,
BUsiness process mining, or process mining in a short
, July 2-4, 2014, London, U.K. A Process Mining Approach in Software Development and Testing Process: A Case Study Rabia Saylam, Ozgur Koray Sahingoz Abstract Process mining is a relatively new and emerging
Business Process Measurement in small enterprises after the installation of an ERP software.
Business Process Measurement in small enterprises after the installation of an ERP software. Stefano Siccardi and Claudia Sebastiani CQ Creativiquadrati snc, via Tadino 60, Milano, Italy http://www.creativiquadrati.it
SecSy: A Security-oriented Tool for Synthesizing Process Event Logs
SecSy: A Security-oriented Tool for Synthesizing Process Event Logs Thomas Stocker and Rafael Accorsi University of Freiburg, Germany {stocker,accorsi}@iig.uni-freiburg.de Abstract. SecSy is a highly flexible
Activity Mining for Discovering Software Process Models
Activity Mining for Discovering Software Process Models Ekkart Kindler, Vladimir Rubin, Wilhelm Schäfer Software Engineering Group, University of Paderborn, Germany [kindler, vroubine, wilhelm]@uni-paderborn.de
Mercy Health System. St. Louis, MO. Process Mining of Clinical Workflows for Quality and Process Improvement
Mercy Health System St. Louis, MO Process Mining of Clinical Workflows for Quality and Process Improvement Paul Helmering, Executive Director, Enterprise Architecture Pete Harrison, Data Analyst, Mercy
Predicting Deadline Transgressions Using Event Logs
Predicting Deadline Transgressions Using Event Logs Anastasiia Pika 1, Wil M. P. van der Aalst 2,1, Colin J. Fidge 1, Arthur H. M. ter Hofstede 1,2, and Moe T. Wynn 1 1 Queensland University of Technology,
Generation of a Set of Event Logs with Noise
Generation of a Set of Event Logs with Noise Ivan Shugurov International Laboratory of Process-Aware Information Systems National Research University Higher School of Economics 33 Kirpichnaya Str., Moscow,
Business Process Modeling
Business Process Concepts Process Mining Kelly Rosa Braghetto Instituto de Matemática e Estatística Universidade de São Paulo [email protected] January 30, 2009 1 / 41 Business Process Concepts Process
Process Mining: Making Knowledge Discovery Process Centric
Process Mining: Making Knowledge Discovery Process Centric Wil van der alst Department of Mathematics and Computer Science Eindhoven University of Technology PO Box 513, 5600 MB, Eindhoven, The Netherlands
An Ontology-based Framework for Enriching Event-log Data
An Ontology-based Framework for Enriching Event-log Data Thanh Tran Thi Kim, Hannes Werthner e-commerce group Institute of Software Technology and Interactive Systems, Vienna, Austria Email: [email protected],
Model Discovery from Motor Claim Process Using Process Mining Technique
International Journal of Scientific and Research Publications, Volume 3, Issue 1, January 2013 1 Model Discovery from Motor Claim Process Using Process Mining Technique P.V.Kumaraguru *, Dr.S.P.Rajagopalan
Analysis of Service Level Agreements using Process Mining techniques
Analysis of Service Level Agreements using Process Mining techniques CHRISTIAN MAGER University of Applied Sciences Wuerzburg-Schweinfurt Process Mining offers powerful methods to extract knowledge from
Ontology-Based Discovery of Workflow Activity Patterns
Ontology-Based Discovery of Workflow Activity Patterns Diogo R. Ferreira 1, Susana Alves 1, Lucinéia H. Thom 2 1 IST Technical University of Lisbon, Portugal {diogo.ferreira,susana.alves}@ist.utl.pt 2
ProM 6 Tutorial. H.M.W. (Eric) Verbeek mailto:[email protected] R. P. Jagadeesh Chandra Bose mailto:j.c.b.rantham.prabhakara@tue.
ProM 6 Tutorial H.M.W. (Eric) Verbeek mailto:[email protected] R. P. Jagadeesh Chandra Bose mailto:[email protected] August 2010 1 Introduction This document shows how to use ProM 6 to
Feature. Applications of Business Process Analytics and Mining for Internal Control. World
Feature Filip Caron is a doctoral researcher in the Department of Decision Sciences and Information Management, Information Systems Group, at the Katholieke Universiteit Leuven (Flanders, Belgium). Jan
BPMN PATTERNS USED IN MANAGEMENT INFORMATION SYSTEMS
BPMN PATTERNS USED IN MANAGEMENT INFORMATION SYSTEMS Gabriel Cozgarea 1 Adrian Cozgarea 2 ABSTRACT: Business Process Modeling Notation (BPMN) is a graphical standard in which controls and activities can
Decision Mining in Business Processes
Decision Mining in Business Processes A. Rozinat and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands {a.rozinat,w.m.p.v.d.aalst}@tm.tue.nl
The Graphical Method: An Example
The Graphical Method: An Example Consider the following linear program: Maximize 4x 1 +3x 2 Subject to: 2x 1 +3x 2 6 (1) 3x 1 +2x 2 3 (2) 2x 2 5 (3) 2x 1 +x 2 4 (4) x 1, x 2 0, where, for ease of reference,
Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models?
Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models? Ludmila Penicina Institute of Applied Computer Systems, Riga Technical University, 1 Kalku, Riga, LV-1658,
Modelling Workflow with Petri Nets. CA4 BPM PetriNets
Modelling Workflow with Petri Nets 1 Workflow Management Issues Georgakopoulos,Hornick, Sheth Process Workflow specification Workflow Implementation =workflow application Business Process Modelling/ Reengineering
Supporting the BPM life-cycle with FileNet
Supporting the BPM life-cycle with FileNet Mariska Netjes, Hajo A. Reijers, Wil M.P. van der Aalst Eindhoven University of Technology, Department of Technology Management, PO Box 513, NL-5600 MB Eindhoven,
Mining of Agile Business Processes
Artificial Intelligence for Business Agility Papers from the AAAI 2011 Spring Symposium (SS-11-03) Mining of Agile Business Processes Simon Brander 1, Knut Hinkelmann 1, Andreas Martin 1, Barbara Thönssen
Using Process Mining to Bridge the Gap between BI and BPM
Using Process Mining to Bridge the Gap between BI and BPM Wil van der alst Eindhoven University of Technology, The Netherlands Process mining techniques enable process-centric analytics through automated
Installing Windows On A Macintosh Or Linux Using A Virtual Machine
Installing Windows On A Macintosh Or Linux Using A Virtual Machine At Shaw Programs, the software we develop is made using Microsoft Access. As with all Microsoft Software it requires Windows in order
Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts
Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts Marian Benner, Matthias Book, Tobias Brückmann, Volker Gruhn, Thomas Richter, Sema Seyhan paluno The Ruhr Institute
A Framework for Software Product Line Engineering
Günter Böckle Klaus Pohl Frank van der Linden 2 A Framework for Software Product Line Engineering In this chapter you will learn: o The principles of software product line subsumed by our software product
A Mind Map Based Framework for Automated Software Log File Analysis
2011 International Conference on Software and Computer Applications IPCSIT vol.9 (2011) (2011) IACSIT Press, Singapore A Mind Map Based Framework for Automated Software Log File Analysis Dileepa Jayathilake
PLG: a Framework for the Generation of Business Process Models and their Execution Logs
PLG: a Framework for the Generation of Business Process Models and their Execution Logs Andrea Burattin and Alessandro Sperduti Department of Pure and Applied Mathematics University of Padua, Italy {burattin,sperduti}@math.unipd.it
Towards a Software Framework for Automatic Business Process Redesign Marwa M.Essam 1, Selma Limam Mansar 2 1
ACEEE Int. J. on Communication, Vol. 02, No. 03, Nov 2011 Towards a Software Framework for Automatic Business Process Redesign Marwa M.Essam 1, Selma Limam Mansar 2 1 Faculty of Information and Computer
ProM Framework Tutorial
ProM Framework Tutorial Authors: Ana Karla Alves de Medeiros ([email protected]) A.J.M.M. (Ton) Weijters ([email protected]) Technische Universiteit Eindhoven Eindhoven, The Netherlands February
FlowSpy: : exploring Activity-Execution Patterns from Business Processes
FlowSpy: : exploring Activity-Execution Patterns from Business Processes Cristian Tristão 1, Duncan D. Ruiz 2, Karin Becker 3 [email protected], [email protected], [email protected] 1 Departamento de
Workflow Management Models and ConDec
A Declarative Approach for Flexible Business Processes Management M. Pesic and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology, P.O.Box 513, NL-5600 MB, Eindhoven,
Arti Tyagi Sunita Choudhary
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Usage Mining
of Business Process Modelling at Suncorp
Project Report No. 1 A Study of the Use of Business Process Modelling at Suncorp - Initial Insights - Naif Hassan Alzubidi Jan Recker Eike Bernhard A Study of the Use of Business Process Modelling at Suncorp.
Configuring IBM WebSphere Monitor for Process Mining
Configuring IBM WebSphere Monitor for Process Mining H.M.W. Verbeek and W.M.P. van der Aalst Technische Universiteit Eindhoven Department of Mathematics and Computer Science P.O. Box 513, 5600 MB Eindhoven,
MailEnable Installation Guide
MailEnable Installation Guide MailEnable Messaging Services for Microsoft Windows 2000/2003/2008 Installation Guide for: MailEnable Standard Edition MailEnable Professional Edition MailEnable Enterprise
Data Science. Research Theme: Process Mining
Data Science Research Theme: Process Mining Process mining is a relatively young research discipline that sits between computational intelligence and data mining on the one hand and process modeling and
Improving Interoperability in Mechatronic Product Developement. Dr. Alain Biahmou, Dr. Arnulf Fröhlich, Dr. Josip Stjepandic
International Conference on Product Lifecycle Management 1 Improving Interoperability in Mechatronic Product Developement Dr. Alain Biahmou, Dr. Arnulf Fröhlich, Dr. Josip Stjepandic PROSTEP AG Dolivostr.
Semantic Analysis of Business Process Executions
Semantic Analysis of Business Process Executions Fabio Casati, Ming-Chien Shan Software Technology Laboratory HP Laboratories Palo Alto HPL-2001-328 December 17 th, 2001* E-mail: [casati, shan] @hpl.hp.com
SOFTWARE PROCESS MINING
SOFTWARE PROCESS MINING DR. VLADIMIR RUBIN LEAD IT ARCHITECT & CONSULTANT @ DR. RUBIN IT CONSULTING LEAD RESEARCH FELLOW @ PAIS LAB / HSE ANNOTATION Nowadays, in the era of social, mobile and cloud computing,
Privacy-Aware Scheduling for Inter-Organizational Processes
Privacy-Aware Scheduling for Inter-Organizational Processes Christoph Hochreiner Distributed Systems Group, Vienna University of Technology, Austria [email protected] Abstract Due to the
Intelligent Process Management & Process Visualization. TAProViz 2014 workshop. Presenter: Dafna Levy
Intelligent Process Management & Process Visualization TAProViz 2014 workshop Presenter: Dafna Levy The Topics Process Visualization in Priority ERP Planning Execution BI analysis (Built-in) Discovering
Towards an Evaluation Framework for Process Mining Algorithms
Towards an Evaluation Framework for Process Mining Algorithms A. Rozinat, A.K. Alves de Medeiros, C.W. Günther, A.J.M.M. Weijters, and W.M.P. van der Aalst Eindhoven University of Technology P.O. Box 513,
Business Process Redesign and Modelling
Business Process Redesign and Modelling The Business Process Redesign the Process Handbook the key idea of the Process Handbook approach is that a richly structured online repository about business processes
PM 2 : a Process Mining Project Methodology
PM 2 : a Process Mining Project Methodology Maikel L. van Eck, Xixi Lu, Sander J.J. Leemans, and Wil M.P. van der Aalst Eindhoven University of Technology, The Netherlands {m.l.v.eck,x.lu,s.j.j.leemans,w.m.p.v.d.aalst}@tue.nl
Delta Analysis of Role-Based Access Control Models
Delta Analysis of Role-Based Access Control Models Maria Leitner University of Vienna, Austria Faculty of Computer Science [email protected] Abstract. Role-based Access Control (RBAC) is de facto
Business Process Discovery
Sandeep Jadhav Introduction Well defined, organized, implemented, and managed Business Processes are very critical to the success of any organization that wants to operate efficiently. Business Process
Johannes Sametinger. C. Doppler Laboratory for Software Engineering Johannes Kepler University of Linz A-4040 Linz, Austria
OBJECT-ORIENTED DOCUMENTATION C. Doppler Laboratory for Software Engineering Johannes Kepler University of Linz A-4040 Linz, Austria Abstract Object-oriented programming improves the reusability of software
Business Process Management: A personal view
Business Process Management: A personal view W.M.P. van der Aalst Department of Technology Management Eindhoven University of Technology, The Netherlands [email protected] 1 Introduction Business
Business Process Quality Metrics: Log-based Complexity of Workflow Patterns
Business Process Quality Metrics: Log-based Complexity of Workflow Patterns Jorge Cardoso Department of Mathematics and Engineering, University of Madeira, Funchal, Portugal [email protected] Abstract. We
RapidIO Network Management and Diagnostics
RapidIO Network Management and Diagnostics... Is now even easier! Release 1.1 Overview RapidIO Discovery and Diagnostic Basics Loopback Diagnostic Mode (NEW) Multiple Simultaneous Routing paths (New) Controlling
Discovering User Communities in Large Event Logs
Discovering User Communities in Large Event Logs Diogo R. Ferreira, Cláudia Alves IST Technical University of Lisbon, Portugal {diogo.ferreira,claudia.alves}@ist.utl.pt Abstract. The organizational perspective
ACCELERATING SELECT WHERE AND SELECT JOIN QUERIES ON A GPU
Computer Science 14 (2) 2013 http://dx.doi.org/10.7494/csci.2013.14.2.243 Marcin Pietroń Pawe l Russek Kazimierz Wiatr ACCELERATING SELECT WHERE AND SELECT JOIN QUERIES ON A GPU Abstract This paper presents
ICT Soft Logger. Solutions for soil, plant & environmental monitoring. www.ictinternational.com
Normally the MCC1 is used with the ICT Software to connect to an Instrument, configure the Instrument and download the data. However the MCC1 has other operating modes, one of which is the ICT Soft Logger.
Process Mining and Visual Analytics: Breathing Life into Business Process Models
Process Mining and Visual Analytics: Breathing Life into Business Process Models Wil M.P. van der Aalst 1, Massimiliano de Leoni 1, and Arthur H.M. ter Hofstede 1,2 1 Eindhoven University of Technology,
