Abstract
We define a new approach to discovering important workflows from event logs, referred to as abductive workflow mining, as the process of determining activity that would necessarily imply that certain predetermined critical activity should necessarily take place. Whenever critical activity is observed, one can inspect the abductive workflow to ascertain whether there was sufficient reason for the critical activity to occur. Initial theory surrounding the concept of abductive workflow is defined, and an initial method for discovering abductive workflows is presented. Preliminary experiments show that relatively small and concise abductive workflow models can be constructed, in comparison with constructing a complete model for the entire log.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Poole, D., Mackworth, A., Goebel, R.: Computational Intelligence: A Logical Approach. Oxford University Press, Inc., New York (1998)
ProM. The ProM framework (2007), http://is.tm.tue.nl/~cgunther/dev/prom/
Wil, M.P., van der Aalst, V., Rubin, B.F., van Dongen1, E.: Kindler, and C.W. Günther. Process mining: A two-step approach using transition systems and regions. Technical report, Eindhoven University of Technology (2006)
van der Aalst, W.M.P., Weijters, A.J.M.M., Maruster, L.: Workflow mining: Discovering process mining models from event logs. IEEE Transactions on Knowledge and Data Engineering 16(9), 1128–1142 (2004)
van Dongen, B.F., Busi, N., Pinna, G.M., van der Aalst, W.M.P.: An iterative algorithm for applying the theory of regions in process mining. Technical report, Department of Technology Management, Eindhoven University of Technology (2006)
Weijters, A.J.M.M., van der Aalst, W.M.P.: Rediscovering workflow models from event-based data using little thumb. Integrated Computer-Aided Engineering 10(2), 151–162 (2003)
Wen, L., Wang, J., Sun, J.G.: Detecting implicit dependencies between tasks from event logs. In: Zhou, X., Li, J., Shen, H.T., Kitsuregawa, M., Zhang, Y. (eds.) APWeb 2006. LNCS, vol. 3841, pp. 591–603. Springer, Heidelberg (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Her Majesty the Queen in Right of Canada
About this paper
Cite this paper
Buffett, S., Hamilton, B. (2009). Abductive Workflow Mining. In: Ardagna, D., Mecella, M., Yang, J. (eds) Business Process Management Workshops. BPM 2008. Lecture Notes in Business Information Processing, vol 17. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00328-8_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-00328-8_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-00327-1
Online ISBN: 978-3-642-00328-8
eBook Packages: Computer ScienceComputer Science (R0)