Activity Mining for Discovering Software Process Models
|
|
|
- Madeleine Summers
- 10 years ago
- Views:
Transcription
1 Activity Mining for Discovering Software Process Models Ekkart Kindler, Vladimir Rubin, Wilhelm Schäfer Software Engineering Group, University of Paderborn, Germany [kindler, vroubine, Abstract: Current enterprises spend much effort in obtaining precise models of their software engineering processes in order to improve the process capability of their organization and to move one step forward in the CMM. The manual design of process models, however, is complicated, time-consuming, error-prone and the results are rapidly becoming out-dated; capabilities of humans in detecting discrepancies between the actual process and its model are limited. Thus, automatic techniques for deriving process models are very important. In this paper, we present an approach that exploits the user interaction with a document version management system for the automatic derivation of process models 1 Introduction Obtaining precise descriptive models of the software engineering processes is an important task for many enterprises. Today, process engineers and managers are solving this problem manually. This is complicated, time-consuming, error-prone and the results are rapidly becoming obsolete. In addition, one usually does not start from scratch when defining an explicit process model; rather existing more or less informally executed processes must be taken into account. Therefore, tool support is needed for deriving the process models. Since a document version management system is an essential part in today s software engineering environment even when no precise definitions of the processes exist, we suggest using it as a source of input information for an automatic approach. In this paper, we present the algorithms and models for automatically deriving process models from versioning information, which we call incremental workflow mining. Our approach helps semi-automatically achieving the third level of the Capability Maturity Model (CMM) [Hum89] once the second level is reached. An initial step for deriving the software process model is discovering the activities (a unit of work carried out by employees). Here, the essential part of an activity are the input and output documents and the users executing it a document-oriented understanding of an activity. We call the algorithm for discovering activities activity mining. After detecting the sequence and parallel relations among activities, the merging algorithm discovers the structure of the process model in form of a Petri net. This model can be analyzed and verified using the wide range of Petri techniques; later it can be shown to the user in an understandable format. As soon as new audit information is available, the set of activities 175
2 and the process model are refined and shown to the user again. This allows us to have an up-to-date model all the time. Consequently, we call our approach incremental. The basic ideas of our approach were presented in our paper [KRS05b]; here, we do not deal with such steps as model analysis and model transformation to the user-oriented format. Rather, we sketch the idea of the mining and merging algorithms. For a detailed presentation of these algorithms we refer to an extended version of this paper [KRS05a]. 2 Related Work The research in the area of software process mining started with new approaches to the grammar inference problem forevent logs [CW98]. The other work from the software domain are in the area of mining from software repositories [MSR05]; like in our approach, they use SCM systems and especially CVS as a source of input information, but for measuring the project activity, detecting and predicting changes in code, advising newcomers to an open-source project and detecting the social dependencies between the developers. The first application of process mining to the workflow domain was presented by Agrawal in 1998 [AGL98]. This approach models business processes as annotated activity graphs and is restricted to sequential patterns. The approach of Herbst and Karagiannis [HK99] uses machine learning techniques for acquisition and adaptation of workflow models. The foundational approach to workflow mining was presented by van der Aalst et al. [WvdA01]. Within this approach, formal causality relations between events in logs and the α-mining algorithm for discovering workflow models with its improvements are presented. In addition to the software process and business process domains, the research concerning discovering the sequential patterns in the area of data mining is important here [AS95]. In comparison to the classical approaches, we do not have logs of activities and, so, must discover the activities first. We make use of our document-oriented view on the activities, i.e. the process is derived from the inputs and outputs of the activities. We suggest coming up with the model early and refining it when additional information is available. 3 Versioning Log Next, we discuss the input information for our incremental workflow mining approach. Software Configuration Management (SCM) systems (e.g. CVS, SourceSafe, ClearCase) and Product Data Management (PDM) systems (e.g. Metaphase, Teamcenter) provide some information on the on-going work. This information contains data about checkouts and checkins (commits) of documents. In this paper, we deal only with checkin information since not all SCM systems enforce or support checkouts; checkins to the system are more accurate. An example of a versioning log is shown in Table 1. We use a log format that is independent from particular SCM systems, but includes the typically available information. 176
3 Table 1: Versioning Log Document Date Author Comment design :30 de status: initial code :00 de status: generated review :00 se status: pending testres :00 qa status: initial, type: manual design :00 de status: initial code :00 dev status: generated testres :00 dev status: initial, type: manual review :45 se status: pending design :00 de status: initial review :00 se status: pending code :00 dev status: generated testres :45 dev status: initial, type: manual A versioning log consists of records (rows). A record is produced for each checkin of a document during different executions of different software processes; a record contains information on the document name, the time, the author and the comment. In the log of Table 1, we have one process, let s call it Design Change ; during this process, some software module is designed, code is generated and tested and the design is reviewed. There are three executions of this process: the first four records belong to the first execution, the second four to the second execution, and the third four to the third one. The set of records that belong to the same execution of one process is called an execution log. For the algorithms presented in this paper, we make the following assumptions about the versioning log: First, different execution logs have the same naming conventions. E.g. the document containing the design is called design in all the execution logs. Second, the document name and the comment together are the unique identifier of the record. So, there is no documents with the same name and the same comment within one execution log. Third, there are no two records with the same timestamp in the same execution log. For the rest of the paper, we assume that we have only one process and know which records belong to which execution log; we can ignore the comments and deal only with document names; the timestamps are mapped to natural numbers, representing their order. 4 Activity Mining Next, we present the algorithm for discovering the activities. As mentioned earlier, an activity is a logical unit of work defined by the sets of its input and output documents and by the set of resources allowed to execute it. The activity mining algorithm goes through the logs looking for the output of the activities. Every document committed to the system is the output of some activity. For the log given in Table 1, the document code is produced by some activity (e.g. programming). For each activity, we can also get the resource who committed the document. E.g. the 177
4 document code was committed by de in the first execution log and by dev in the second and the third one. The important problem here is finding the input of each activity, since this information is not given in the logs explicitly. For now, we assume that all documents that were always committed to the system earlier than the output of the activity belong to its input. E.g. for the activity producing code, the document design was committed earlier in all the execution logs, thus it is the input of the activity; the document review was also committed earlier, but only in the third log, thus it does not belong to the input set. Thus, the activity producing code is the following tuple ({design}, {code}, {dev, de}). Thefirst set is the input of the activity, the second is the output, and the third is the set of resources. For details on the activity mining algorithm, we refer to the extended paper [KRS05a]. 5 Merging The merging algorithm generates the software process model from the set of activities. Since the set of activities obtained by activity mining contains the essence of the versioning log needed for deriving the process model, we do not deal with the log anymore. First, we define three relationsonthe set ofactivities: sequence, parallel split, andparallel join. The sequence relation contains the pairs of activities that follow each other, i.e. the input of the second activity must contain the input and the output of the first one. The parallel split relation contains the activities which have the same input, but produce different output; these activities are concurrent. The parallel join relation contains activities that are followed by an activity that needs the input and the output of both activities. The merging algorithm generates the control, the informational and the organizational aspects of the process model as a Petri net, see Fig. 1. The exact algorithm is precisely defined in our technical report [KRS05a]. The control aspect algorithm identifies the order on the activities. For each activity, it generates a transition. E.g., for the activity producing code, it generates transition t code.for each activity, which is not followed by parallel activities, it also generates one output place and an arc between them, e.g. for the code activity, it generate p code and (t code,p code ). If an activity is followed by parallel activities, we introduce a parallel split pattern,which consists of a set of places one for each parallel branch; a transition of the activity is connected to all the places. E.g. the activities producing code and review are in parallel split relation; therefore, we connect transition of the preceding activity, which produces design, to these places. Then, the places are connected to the corresponding transitions. Next, we connect all activities that are in sequence relation, except for the ones in parallel split relation. For example, we connect the place p code to transition t testres. The last step is connecting the parallel join pattern. Here, we connect the output places of activities that belong to the parallel join relation with the transition of activities that needs the documents produced by all of these activities as input. For example, an activity which produces the end document needs the documents of its predecessors for input. For the informational aspect of the processmodel, we create one place for each document. 178
5 Pdesign Pcode Ptestres Preview Pend Informational Aspect P2,3 3 T {code} P{code} T {testres} P{testres} Control Aspect Pstart T {design} P2,3 2 T {review} P{review} T{end} P{end} Organizational Aspect Pde Pdev Pqa Pse P Figure 1: The Process Model Since each activity produces a document, we can connect the corresponding transitions to these document places. For the organizational aspect of the process model, we create one place for each existing user and put a token to each of these places to show that the user is available. If an activity can be executed only by one user, we create an edge from the user place to the corresponding transition and back. If an activity can be executed by one of several users, we introduce a special exclusive choice construct between these users. 6 Conclusion and Future Work The activity mining and merging algorithms were implemented in Prolog as a part of the incremental workflow mining research prototype. The declarative semantics of Prolog was especially valuable for implementing these algorithms. A special clause generates the resulting Petri net, which can be already shown to the user. In our approach, we do mining from different perspectives, we start with deriving the information from the logs of the SCM system. Our approach has the following benefits: First, it does not need information on the existing activities; rather, we can mine this information from the versioning logs. Second, after deriving the set of activities from the versioning log, we do not deal with logs anymore. Third, our approach can be used incrementally, since we do not have to deal with all the logs after getting the new execution log again. Finally, our algorithms produce a multi-perspective process model, which reflects the real process carried out in a company. Consequently, the approach helps gradually improving the management of the software processes of a company along with incrementally improving the process models. 179
6 In this paper, we presented algorithms which work under rather restrictive assumptions on the versioning log. Future extensions will relax these assumptions: several documents can be committed at the same time, there can be several commits of the same document within one execution log. Additionally, we must identify the types of documents, the roles of users and we must generate meaningful names for the activities. This can be achieved by exploiting checkout information of SCM systems or information of the additional tools and by interacting with the user. For discovering not only software processes, but system engineering processes in general, we shall deal with similar audit information that can be obtained from Product Data Management (PDM) systems or other types of configuration and change management systems. Altogether, our approach supports mining process models from ad-hoc executions without having predefined information on them. This way, our approach supports increasing the repeatability of the processes, in terms of workflow terminology the ad-hoc processes become administrative. In terms of the CMM, this means automatic support for increasing the maturity level of some enterprise from repeatable to defined. References [AGL98] [AS95] [CW98] [HK99] [Hum89] R. Agrawal, D. Gunopulos, and F. Leymann. Mining Process Models from Workflow Logs. In Proceedings of the 6th International Conference on Extending Database Technology, pp Springer, R. Agrawal and R. Srikant. Mining sequential patterns. In P. S. Yu and A. S. P. Chen, eds., Eleventh International Conference on Data Engineering, pp. 3 14, Taipei, Taiwan, IEEE Computer Society Press. J. E. Cook and A. L. Wolf. Discovering Models of Software Processes from Event-Based Data. ACM Trans. Softw. Eng. Methodol., 7(3): , J. Herbst and D. Karagiannis. An Inductive approach to the Acquisition and Adaptation of Workflow Models. citeseer.ist.psu.edu/herbst99inductive.html, W. S. Humphrey. Managing the software process. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, [KRS05a] E. Kindler, V. Rubin, and W. Schäfer. Activity Mining and Discovering Software Process Models. Technical Report tr-ri , University of Paderborn, [KRS05b] E. Kindler, V. Rubin, and W. Schäfer. Incremental WorkflowMiningbased on Document Versioning Information. In M. Li, B. Boehm, and L. J. Osterweil, editors, Proc. of the Software Process Workshop 2005, Beijing, China, LNCS Springer, May [MSR05] MSR 2005 International Workshop on Mining Software Repositories, New York, NY, USA, ACM Press. [WvdA01] A.J.M.M. Weijters and W.M.P. van der Aalst. Process mining: discovering workflow models from event-based data. In Proceedings of the 13th Belgium-Netherlands Conference on Artificial Intelligence (BNAIC 2001), pp ,
Process Mining Framework for Software Processes
Process Mining Framework for Software Processes Vladimir Rubin 1,2, Christian W. Günther 1, Wil M.P. van der Aalst 1, Ekkart Kindler 2, Boudewijn F. van Dongen 1, and Wilhelm Schäfer 2 1 Eindhoven University
EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES. Nataliya Golyan, Vera Golyan, Olga Kalynychenko
380 International Journal Information Theories and Applications, Vol. 18, Number 4, 2011 EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES Nataliya Golyan, Vera Golyan, Olga Kalynychenko
Process Modelling from Insurance Event Log
Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R
Business Process Modeling
Business Process Concepts Process Mining Kelly Rosa Braghetto Instituto de Matemática e Estatística Universidade de São Paulo [email protected] January 30, 2009 1 / 41 Business Process Concepts Process
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Research Motivation In today s modern digital environment with or without our notice we are leaving our digital footprints in various data repositories through our daily activities,
The Research on the Usage of Business Process Mining in the Implementation of BPR
2007 IFIP International Conference on Network and Parallel Computing - Workshops The Research on Usage of Business Process Mining in Implementation of BPR XIE Yi wu 1, LI Xiao wan 1, Chen Yan 2 (1.School
Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis
Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis Derek Foo 1, Jin Guo 2 and Ying Zou 1 Department of Electrical and Computer Engineering 1 School of Computing 2 Queen
Model Discovery from Motor Claim Process Using Process Mining Technique
International Journal of Scientific and Research Publications, Volume 3, Issue 1, January 2013 1 Model Discovery from Motor Claim Process Using Process Mining Technique P.V.Kumaraguru *, Dr.S.P.Rajagopalan
Towards a Software Framework for Automatic Business Process Redesign Marwa M.Essam 1, Selma Limam Mansar 2 1
ACEEE Int. J. on Communication, Vol. 02, No. 03, Nov 2011 Towards a Software Framework for Automatic Business Process Redesign Marwa M.Essam 1, Selma Limam Mansar 2 1 Faculty of Information and Computer
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining Liqiang Geng 1, Scott Buffett 1, Bruce Hamilton 1, Xin Wang 2, Larry Korba 1, Hongyu Liu 1, and Yunli Wang 1 1 IIT,
EMiT: A process mining tool
EMiT: A process mining tool B.F. van Dongen and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands. [email protected]
SOFTWARE PROCESS MINING
SOFTWARE PROCESS MINING DR. VLADIMIR RUBIN LEAD IT ARCHITECT & CONSULTANT @ DR. RUBIN IT CONSULTING LEAD RESEARCH FELLOW @ PAIS LAB / HSE ANNOTATION Nowadays, in the era of social, mobile and cloud computing,
Towards an Evaluation Framework for Process Mining Algorithms
Towards an Evaluation Framework for Process Mining Algorithms A. Rozinat, A.K. Alves de Medeiros, C.W. Günther, A.J.M.M. Weijters, and W.M.P. van der Aalst Eindhoven University of Technology P.O. Box 513,
Process Mining by Measuring Process Block Similarity
Process Mining by Measuring Process Block Similarity Joonsoo Bae, James Caverlee 2, Ling Liu 2, Bill Rouse 2, Hua Yan 2 Dept of Industrial & Sys Eng, Chonbuk National Univ, South Korea jsbae@chonbukackr
Configuring IBM WebSphere Monitor for Process Mining
Configuring IBM WebSphere Monitor for Process Mining H.M.W. Verbeek and W.M.P. van der Aalst Technische Universiteit Eindhoven Department of Mathematics and Computer Science P.O. Box 513, 5600 MB Eindhoven,
B. Majeed British Telecom, Computational Intelligence Group, Ipswich, UK
The current issue and full text archive of this journal is available at wwwemeraldinsightcom/1463-7154htm A review of business process mining: state-of-the-art and future trends A Tiwari and CJ Turner
Semantic Analysis of Flow Patterns in Business Process Modeling
Semantic Analysis of Flow Patterns in Business Process Modeling Pnina Soffer 1, Yair Wand 2, and Maya Kaner 3 1 University of Haifa, Carmel Mountain 31905, Haifa 31905, Israel 2 Sauder School of Business,
Dotted Chart and Control-Flow Analysis for a Loan Application Process
Dotted Chart and Control-Flow Analysis for a Loan Application Process Thomas Molka 1,2, Wasif Gilani 1 and Xiao-Jun Zeng 2 Business Intelligence Practice, SAP Research, Belfast, UK The University of Manchester,
PLG: a Framework for the Generation of Business Process Models and their Execution Logs
PLG: a Framework for the Generation of Business Process Models and their Execution Logs Andrea Burattin and Alessandro Sperduti Department of Pure and Applied Mathematics University of Padua, Italy {burattin,sperduti}@math.unipd.it
From Workflow Design Patterns to Logical Specifications
AUTOMATYKA/ AUTOMATICS 2013 Vol. 17 No. 1 http://dx.doi.org/10.7494/automat.2013.17.1.59 Rados³aw Klimek* From Workflow Design Patterns to Logical Specifications 1. Introduction Formal methods in software
Implementing Heuristic Miner for Different Types of Event Logs
Implementing Heuristic Miner for Different Types of Event Logs Angelina Prima Kurniati 1, GunturPrabawa Kusuma 2, GedeAgungAry Wisudiawan 3 1,3 School of Compuing, Telkom University, Indonesia. 2 School
Eventifier: Extracting Process Execution Logs from Operational Databases
Eventifier: Extracting Process Execution Logs from Operational Databases Carlos Rodríguez 1, Robert Engel 2, Galena Kostoska 1, Florian Daniel 1, Fabio Casati 1, and Marco Aimar 3 1 University of Trento,
Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts
Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts Marian Benner, Matthias Book, Tobias Brückmann, Volker Gruhn, Thomas Richter, Sema Seyhan paluno The Ruhr Institute
Mercy Health System. St. Louis, MO. Process Mining of Clinical Workflows for Quality and Process Improvement
Mercy Health System St. Louis, MO Process Mining of Clinical Workflows for Quality and Process Improvement Paul Helmering, Executive Director, Enterprise Architecture Pete Harrison, Data Analyst, Mercy
UML Representation Proposal for XTT Rule Design Method
UML Representation Proposal for XTT Rule Design Method Grzegorz J. Nalepa 1 and Krzysztof Kluza 1 Institute of Automatics, AGH University of Science and Technology, Al. Mickiewicza 30, 30-059 Kraków, Poland
Software Configuration Management. Wingsze Seaman COMP250SA February 27, 2008
Software Configuration Management Wingsze Seaman COMP250SA February 27, 2008 Outline CM and SCM Definitions SCM History CMMI and SCM SCM Tools SCM/Dynamic Systems SCM/Software Architecture Resources 2
The ProM framework: A new era in process mining tool support
The ProM framework: A new era in process mining tool support B.F. van Dongen, A.K.A. de Medeiros, H.M.W. Verbeek, A.J.M.M. Weijters, and W.M.P. van der Aalst Department of Technology Management, Eindhoven
Handling Big(ger) Logs: Connecting ProM 6 to Apache Hadoop
Handling Big(ger) Logs: Connecting ProM 6 to Apache Hadoop Sergio Hernández 1, S.J. van Zelst 2, Joaquín Ezpeleta 1, and Wil M.P. van der Aalst 2 1 Department of Computer Science and Systems Engineering
REQUIREMENTS FOR THE WORKFLOW-BASED SUPPORT OF RELEASE MANAGEMENT PROCESSES IN THE AUTOMOTIVE SECTOR
REQUIREMENTS FOR THE WORKFLOW-BASED SUPPORT OF RELEASE MANAGEMENT PROCESSES IN THE AUTOMOTIVE SECTOR Ulrich Bestfleisch, Joachim Herbst DaimlerChrysler AG Research and Technology Data and Process Management
Process Mining Using BPMN: Relating Event Logs and Process Models
Noname manuscript No. (will be inserted by the editor) Process Mining Using BPMN: Relating Event Logs and Process Models Anna A. Kalenkova W. M. P. van der Aalst Irina A. Lomazova Vladimir A. Rubin Received:
Process Analysis and Organizational Mining in Production Automation Systems Engineering
Process Analysis and Organizational Mining in Production Automation Systems Engineering Wikan Danar Sunindyo Thomas Moser Dietmar Winkler Stefan Biffl Christian Doppler Laboratory for Software Engineering
Process Mining and Monitoring Processes and Services: Workshop Report
Process Mining and Monitoring Processes and Services: Workshop Report Wil van der Aalst (editor) Eindhoven University of Technology, P.O.Box 513, NL-5600 MB, Eindhoven, The Netherlands. [email protected]
Mining of Agile Business Processes
Artificial Intelligence for Business Agility Papers from the AAAI 2011 Spring Symposium (SS-11-03) Mining of Agile Business Processes Simon Brander 1, Knut Hinkelmann 1, Andreas Martin 1, Barbara Thönssen
Modelling Workflow with Petri Nets. CA4 BPM PetriNets
Modelling Workflow with Petri Nets 1 Workflow Management Issues Georgakopoulos,Hornick, Sheth Process Workflow specification Workflow Implementation =workflow application Business Process Modelling/ Reengineering
Process Mining. ^J Springer. Discovery, Conformance and Enhancement of Business Processes. Wil M.R van der Aalst Q UNIVERS1TAT.
Wil M.R van der Aalst Process Mining Discovery, Conformance and Enhancement of Business Processes Q UNIVERS1TAT m LIECHTENSTEIN Bibliothek ^J Springer Contents 1 Introduction I 1.1 Data Explosion I 1.2
Process mining challenges in hospital information systems
Proceedings of the Federated Conference on Computer Science and Information Systems pp. 1135 1140 ISBN 978-83-60810-51-4 Process mining challenges in hospital information systems Payam Homayounfar Wrocław
Umbrella: A New Component-Based Software Development Model
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Umbrella: A New Component-Based Software Development Model Anurag Dixit and P.C.
Nirikshan: Process Mining Software Repositories to Identify Inefficiencies, Imperfections, and Enhance Existing Process Capabilities
Nirikshan: Process Mining Software Repositories to Identify Inefficiencies, Imperfections, and Enhance Existing Process Capabilities Monika Gupta [email protected] PhD Advisor: Dr. Ashish Sureka Industry
EDIminer: A Toolset for Process Mining from EDI Messages
EDIminer: A Toolset for Process Mining from EDI Messages Robert Engel 1, R. P. Jagadeesh Chandra Bose 2, Christian Pichler 1, Marco Zapletal 1, and Hannes Werthner 1 1 Vienna University of Technology,
Chapter 2 Introduction to Business Processes, BPM, and BPM Systems
Chapter 2 Introduction to Business Processes, BPM, and BPM Systems This chapter provides a basic overview on business processes. In particular it concentrates on the actual definition and characterization
A Platform for Supporting Data Analytics on Twitter: Challenges and Objectives 1
A Platform for Supporting Data Analytics on Twitter: Challenges and Objectives 1 Yannis Stavrakas Vassilis Plachouras IMIS / RC ATHENA Athens, Greece {yannis, vplachouras}@imis.athena-innovation.gr Abstract.
USING PROCESS MINING FOR ITIL ASSESSMENT: A CASE STUDY WITH INCIDENT MANAGEMENT
USING PROCESS MINING FOR ITIL ASSESSMENT: A CASE STUDY WITH INCIDENT MANAGEMENT Diogo R. Ferreira 1,2, Miguel Mira da Silva 1,3 1 IST Technical University of Lisbon, Portugal 2 Organizational Engineering
Supporting the BPM lifecycle with FileNet
Supporting the BPM lifecycle with FileNet Mariska Netjes Hajo A. Reijers Wil. M.P. van der Aalst Outline Introduction Evaluation approach Evaluation of FileNet Conclusions Business Process Management Supporting
Article. Abstract. This is a pre-print version. For the printed version please refer to www.wisu.de
Article StB Prof. Dr. Nick Gehrke Nordakademie Chair for Information Systems Köllner Chaussee 11 D-25337 Elmshorn [email protected] Michael Werner, Dipl.-Wirt.-Inf. University of Hamburg Chair
ERP Event Log Preprocessing: Timestamps vs. Accounting Logic
ERP Event Log Preprocessing: Timestamps vs. Accounting Logic Niels Mueller-Wickop and Martin Schultz Chair for Information Systems, University of Hamburg, Hamburg, Germany {niels.mueller-wickop,martin.schultz}@wiso.uni-hamburg.de
A Research Article on Data Mining in Addition to Process Mining: Similarities and Dissimilarities
A Research Article on Data Mining in Addition to Process Mining: Similarities and Dissimilarities S. Sowjanya Chintalapati 1, Ch.G.V.N.Prasad 2, J. Sowjanya 3, R.Vineela 4 1, 3, 4 Assistant Professor,
Business Process Management: A personal view
Business Process Management: A personal view W.M.P. van der Aalst Department of Technology Management Eindhoven University of Technology, The Netherlands [email protected] 1 Introduction Business
Engineering Standards in Support of
The Application of IEEE Software and System Engineering Standards in Support of Software Process Improvement Susan K. (Kathy) Land Northrop Grumman IT Huntsville, AL [email protected] In Other Words Using
Software Configuration Management Plan
For Database Applications Document ID: Version: 2.0c Planning Installation & Acceptance Integration & Test Requirements Definition Design Development 1 / 22 Copyright 2000-2005 Digital Publications LLC.
WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS
WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS Biswajit Biswal Oracle Corporation [email protected] ABSTRACT With the World Wide Web (www) s ubiquity increase and the rapid development
STAR JPSS Algorithms Integration Team Configuration Management Plan Version 1.2
STAR JPSS Algorithms Integration Team Version 1.2 NOAA Center for Weather and Climate Prediction (NCWCP) NOAA/NESDIS/STAR 5830 University Research Ct College Park, MD 20740 Revisions Version Description
A Generic Import Framework For Process Event Logs
A Generic Import Framework For Process Event Logs Industrial Paper Christian W. Günther and Wil M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513,
A Test Case Generator for the Validation of High-Level Petri Nets
A Test Case Generator for the Validation of High-Level Petri Nets Jörg Desel Institut AIFB Universität Karlsruhe D 76128 Karlsruhe Germany E-mail: [email protected] Andreas Oberweis, Torsten
Using Semantic Lifting for improving Process Mining: a Data Loss Prevention System case study
Using Semantic Lifting for improving Process Mining: a Data Loss Prevention System case study Antonia Azzini, Chiara Braghin, Ernesto Damiani, Francesco Zavatarelli Dipartimento di Informatica Università
Test Coverage Criteria for Autonomous Mobile Systems based on Coloured Petri Nets
9th Symposium on Formal Methods for Automation and Safety in Railway and Automotive Systems Institut für Verkehrssicherheit und Automatisierungstechnik, TU Braunschweig, 2012 FORMS/FORMAT 2012 (http://www.forms-format.de)
CONFIOUS * : Managing the Electronic Submission and Reviewing Process of Scientific Conferences
CONFIOUS * : Managing the Electronic Submission and Reviewing Process of Scientific Conferences Manos Papagelis 1, 2, Dimitris Plexousakis 1, 2 and Panagiotis N. Nikolaou 2 1 Institute of Computer Science,
Selection of Optimal Discount of Retail Assortments with Data Mining Approach
Available online at www.interscience.in Selection of Optimal Discount of Retail Assortments with Data Mining Approach Padmalatha Eddla, Ravinder Reddy, Mamatha Computer Science Department,CBIT, Gandipet,Hyderabad,A.P,India.
Analysis of Service Level Agreements using Process Mining techniques
Analysis of Service Level Agreements using Process Mining techniques CHRISTIAN MAGER University of Applied Sciences Wuerzburg-Schweinfurt Process Mining offers powerful methods to extract knowledge from
Enterprise Integration: operational models of business processes and workflow systems *
Enterprise Integration: operational models of business processes and workflow systems. 1 Enterprise Integration: operational models of business processes and workflow systems * G.Bruno 1, C.Reyneri 2 and
WoPeD - An Educational Tool for Workflow Nets
WoPeD - An Educational Tool for Workflow Nets Thomas Freytag, Cooperative State University (DHBW) Karlsruhe, Germany [email protected] Martin Sänger, 1&1 Internet AG, Karlsruhe, Germany [email protected]
COMPUTER AUTOMATION OF BUSINESS PROCESSES T. Stoilov, K. Stoilova
COMPUTER AUTOMATION OF BUSINESS PROCESSES T. Stoilov, K. Stoilova Computer automation of business processes: The paper presents the Workflow management system as an established technology for automation
An Integrated Quality Assurance Framework for Specifying Business Information Systems
An Integrated Quality Assurance Framework for Specifying Business Information Systems Frank Salger 1, Stefan Sauer 2, Gregor Engels 1,2 1 Capgemini sd&m AG, Carl-Wery-Str. 42, D-81739 München, Germany
How To Cluster On A Search Engine
Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A REVIEW ON QUERY CLUSTERING
Feature. Applications of Business Process Analytics and Mining for Internal Control. World
Feature Filip Caron is a doctoral researcher in the Department of Decision Sciences and Information Management, Information Systems Group, at the Katholieke Universiteit Leuven (Flanders, Belgium). Jan
Database Scheme Configuration for a Product Line of MPC-TOOLS
Database Scheme Configuration for a Product Line of MPC-TOOLS Benjamin Klöpper, Tobias Rust, Bernhard Vedder, and Wilhelm Dangelmaier Heinz Nixdorf Institute, University of Paderborn, Fürstenallee 11,
Towards Cross-Organizational Process Mining in Collections of Process Models and their Executions
Towards Cross-Organizational Process Mining in Collections of Process Models and their Executions J.C.A.M. Buijs, B.F. van Dongen, W.M.P. van der Aalst Department of Mathematics and Computer Science, Eindhoven
How To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
Process mining: a research agenda
Computers in Industry 53 (2004) 231 244 Process mining: a research agenda W.M.P. van der Aalst *, A.J.M.M. Weijters Department of Technology Management, Eindhoven University of Technology, P.O. Box 513,
Discovering User Communities in Large Event Logs
Discovering User Communities in Large Event Logs Diogo R. Ferreira, Cláudia Alves IST Technical University of Lisbon, Portugal {diogo.ferreira,claudia.alves}@ist.utl.pt Abstract. The organizational perspective
Software Configuration Management. Context. Learning Objectives
Software Configuration Management Wolfgang Emmerich Professor of Distributed Computing University College London http://sse.cs.ucl.ac.uk Context Requirements Inception Elaboration Construction Transition
Continuous Integration. CSC 440: Software Engineering Slide #1
Continuous Integration CSC 440: Software Engineering Slide #1 Topics 1. Continuous integration 2. Configuration management 3. Types of version control 1. None 2. Lock-Modify-Unlock 3. Copy-Modify-Merge
Formal Verification Problems in a Bigdata World: Towards a Mighty Synergy
Dept. of Computer Science Formal Verification Problems in a Bigdata World: Towards a Mighty Synergy Matteo Camilli [email protected] http://camilli.di.unimi.it ICSE 2014 Hyderabad, India June 3,
FileNet s BPM life-cycle support
FileNet s BPM life-cycle support Mariska Netjes, Hajo A. Reijers, Wil M.P. van der Aalst Eindhoven University of Technology, Department of Technology Management, PO Box 513, NL-5600 MB Eindhoven, The Netherlands
Business Process Measurement in small enterprises after the installation of an ERP software.
Business Process Measurement in small enterprises after the installation of an ERP software. Stefano Siccardi and Claudia Sebastiani CQ Creativiquadrati snc, via Tadino 60, Milano, Italy http://www.creativiquadrati.it
Theme 1 Software Processes. Software Configuration Management
Theme 1 Software Processes Software Configuration Management 1 Roadmap Software Configuration Management Software configuration management goals SCM Activities Configuration Management Plans Configuration
CPN Tools 4: A Process Modeling Tool Combining Declarative and Imperative Paradigms
CPN Tools 4: A Process Modeling Tool Combining Declarative and Imperative Paradigms Michael Westergaard 1,2 and Tijs Slaats 3,4 1 Department of Mathematics and Computer Science, Eindhoven University of
Ontology-Based Discovery of Workflow Activity Patterns
Ontology-Based Discovery of Workflow Activity Patterns Diogo R. Ferreira 1, Susana Alves 1, Lucinéia H. Thom 2 1 IST Technical University of Lisbon, Portugal {diogo.ferreira,susana.alves}@ist.utl.pt 2
Reverse Engineering of Relational Databases to Ontologies: An Approach Based on an Analysis of HTML Forms
Reverse Engineering of Relational Databases to Ontologies: An Approach Based on an Analysis of HTML Forms Irina Astrova 1, Bela Stantic 2 1 Tallinn University of Technology, Ehitajate tee 5, 19086 Tallinn,
Facilitating Business Process Discovery using Email Analysis
Facilitating Business Process Discovery using Email Analysis Matin Mavaddat [email protected] Stewart Green Stewart.Green Ian Beeson Ian.Beeson Jin Sa Jin.Sa Abstract Extracting business process
BIS 3106: Business Process Management. Lecture Two: Modelling the Control-flow Perspective
BIS 3106: Business Process Management Lecture Two: Modelling the Control-flow Perspective Makerere University School of Computing and Informatics Technology Department of Computer Science SEM I 2015/2016
Optimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2
Optimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2 Department of Computer Engineering, YMCA University of Science & Technology, Faridabad,
A generic approach for data integration using RDF, OWL and XML
A generic approach for data integration using RDF, OWL and XML Miguel A. Macias-Garcia, Victor J. Sosa-Sosa, and Ivan Lopez-Arevalo Laboratory of Information Technology (LTI) CINVESTAV-TAMAULIPAS Km 6
Decision Mining in Business Processes
Decision Mining in Business Processes A. Rozinat and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands {a.rozinat,w.m.p.v.d.aalst}@tm.tue.nl
