Nothing Special   »   [go: up one dir, main page]

Skip to main content

Abductive Workflow Mining

  • Conference paper
Business Process Management Workshops (BPM 2008)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 17))

Included in the following conference series:

  • 2086 Accesses

Abstract

We define a new approach to discovering important workflows from event logs, referred to as abductive workflow mining, as the process of determining activity that would necessarily imply that certain predetermined critical activity should necessarily take place. Whenever critical activity is observed, one can inspect the abductive workflow to ascertain whether there was sufficient reason for the critical activity to occur. Initial theory surrounding the concept of abductive workflow is defined, and an initial method for discovering abductive workflows is presented. Preliminary experiments show that relatively small and concise abductive workflow models can be constructed, in comparison with constructing a complete model for the entire log.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Poole, D., Mackworth, A., Goebel, R.: Computational Intelligence: A Logical Approach. Oxford University Press, Inc., New York (1998)

    Google Scholar 

  2. ProM. The ProM framework (2007), http://is.tm.tue.nl/~cgunther/dev/prom/

  3. Wil, M.P., van der Aalst, V., Rubin, B.F., van Dongen1, E.: Kindler, and C.W. Günther. Process mining: A two-step approach using transition systems and regions. Technical report, Eindhoven University of Technology (2006)

    Google Scholar 

  4. van der Aalst, W.M.P., Weijters, A.J.M.M., Maruster, L.: Workflow mining: Discovering process mining models from event logs. IEEE Transactions on Knowledge and Data Engineering 16(9), 1128–1142 (2004)

    Article  Google Scholar 

  5. van Dongen, B.F., Busi, N., Pinna, G.M., van der Aalst, W.M.P.: An iterative algorithm for applying the theory of regions in process mining. Technical report, Department of Technology Management, Eindhoven University of Technology (2006)

    Google Scholar 

  6. Weijters, A.J.M.M., van der Aalst, W.M.P.: Rediscovering workflow models from event-based data using little thumb. Integrated Computer-Aided Engineering 10(2), 151–162 (2003)

    Google Scholar 

  7. Wen, L., Wang, J., Sun, J.G.: Detecting implicit dependencies between tasks from event logs. In: Zhou, X., Li, J., Shen, H.T., Kitsuregawa, M., Zhang, Y. (eds.) APWeb 2006. LNCS, vol. 3841, pp. 591–603. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Her Majesty the Queen in Right of Canada

About this paper

Cite this paper

Buffett, S., Hamilton, B. (2009). Abductive Workflow Mining. In: Ardagna, D., Mecella, M., Yang, J. (eds) Business Process Management Workshops. BPM 2008. Lecture Notes in Business Information Processing, vol 17. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00328-8_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-00328-8_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-00327-1

  • Online ISBN: 978-3-642-00328-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics