Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/978-3-642-40176-3_10guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Aligning event logs and process models for multi-perspective conformance checking: an approach based on integer linear programming

Published: 26 August 2013 Publication History

Abstract

Modern organizations have invested in collections of descriptive and/or normative process models, but these rarely describe the actual processes adequately. Therefore, a variety of techniques for conformance checking have been proposed to pinpoint discrepancies between modeled and observed behavior. However, these techniques typically focus on the control-flow and abstract from data, resources and time. This paper describes an approach that aligns event log and model while taking all perspectives into account (i.e., also data, time and resources). This way it is possible to quantify conformance and analyze differences between model and reality. The approach was implemented using ProM and has been evaluated using both synthetic event logs and a real-life case study.

References

[1]
van der Aalst, W. M. P.: Process Mining - Discovery, Conformance and Enhancement of Business Processes. Springer (2011)
[2]
Rozinat, A., van der Aalst, W. M. P.: Conformance Checking of Processes Based on Monitoring Real Behavior. Information Systems 33, 64-95 (2008)
[3]
Weidlich, M., Polyvyanyy, A., Desai, N., Mendling, J.: Process Compliance Measurement based on Behavioural Profiles. In: Pernici, B. (ed.) CAiSE 2010. LNCS, vol. 6051, pp. 499- 514. Springer, Heidelberg (2010)
[4]
Cook, J., Wolf, A.: Software Process Validation: Quantitatively Measuring the Correspondence of a Process to a Model. ACM Transactions on Software Engineering and Methodology (TOSEM) 8, 147-176 (1999)
[5]
de Leoni, M., van der Aalst, W. M. P., van Dongen, B. F.: Data- and Resource-Aware Conformance Checking of Business Processes. In: Abramowicz, W., Kriksciuniene, D., Sakalauskas, V. (eds.) BIS 2012. LNBIP, vol. 117, pp. 48-59. Springer, Heidelberg (2012)
[6]
Sidorova, N., Stahl, C., Tr?cka, N.: Soundness Verification for Conceptual Workflow Nets With Data: Early Detection of Errors With the Most Precision Possible. Information Systems 36(7), 1026-1043 (2011)
[7]
de Leoni, M., van der Aalst, W. M. P.: Data-Aware Process Mining: Discovering Decisions in Processes Using Alignments. In: Proc. of the 28th ACM Symposium on Applied Computing (SAC 2013). ACM (2013)
[8]
de Leoni, M., van der Aalst, W. M. P.: Aligning Event Logs and Process Models for Multi-Perspective Conformance Checking: An Approach Based on Integer Linear Programming, BPM Center Report BPM-13-05 (2013)
[9]
Adriansyah, A., van Dongen, B. F., van der Aalst, W. M.: Conformance Checking Using Cost-Based Fitness Analysis. In: IEEE International Enterprise Distributed Object Computing Conference, pp. 55-64. IEEE Computer Society (2011)
[10]
Ly, L., Rinderle-Ma, S., Knuplesch, D., Dadam, P.: Monitoring business process compliance using compliance rule graphs. In: Meersman, R., Dillon, T., Herrero, P., Kumar, A., Reichert, M., Qing, L., Ooi, B.-C., Damiani, E., Schmidt, D.C., White, J., Hauswirth, M., Hitzler, P., Mohania, M. (eds.) OTM 2011, Part I. LNCS, vol. 7044, pp. 82-99. Springer, Heidelberg (2011)
[11]
Belardinelli, F., Lomuscio, A., Patrizi, F.: Verification of GSM-Based Artifact-Centric Systems through Finite Abstraction. In: Liu, C., Ludwig, H., Toumani, F., Yu, Q. (eds.) ICSOC 2012. LNCS, vol. 7636, pp. 17-31. Springer, Heidelberg (2012)
[12]
Jagadeesh Chandra Bose, R. P., van der Aalst, W. M. P.: Process Diagnostics Using Trace Alignment: Opportunities, Issues, and Challenges. Information Systems 37(2) (2012)
[13]
Montali, M.: Specification and Verification of Declarative Open Interaction Models. LNBIP, vol. 56. Springer, Heidelberg (2010)
[14]
Reynolds, P., Killian, C., Wiener, J. L., Mogul, J.C., Shah, M. A., Vahdat, A.: Pip: detecting the unexpected in distributed systems. In: Proceedings of the 3rd Conference on Networked Systems Design & Implementation, vol. 3, pp. 115-128. USENIX Association (2006)
[15]
Xu, W., Huang, L., Fox, A., Patterson, D., Jordan, M. I.: Detecting large-scale system problems by mining console logs. In: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, pp. 117-132. ACM (2009)

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
BPM'13: Proceedings of the 11th international conference on Business Process Management
August 2013
354 pages
ISBN:9783642401756
  • Editors:
  • Florian Daniel,
  • Jianmin Wang,
  • Barbara Weber

Sponsors

  • IBMR: IBM Research
  • BIZAGI: Bizagi

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 26 August 2013

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Conformance Checking with Model ProjectionsApplication and Theory of Petri Nets and Concurrency10.1007/978-3-031-61433-0_4(61-82)Online publication date: 26-Jun-2024
  • (2023)Data-aware conformance checking with SMTInformation Systems10.1016/j.is.2023.102230117:COnline publication date: 1-Jul-2023
  • (2023)Exact and Approximated Log Alignments for Processes with Inter-case DependenciesApplication and Theory of Petri Nets and Concurrency10.1007/978-3-031-33620-1_6(99-119)Online publication date: 25-Jun-2023
  • (2022)An Association Rule Mining-Based Framework for the Discovery of Anomalous Behavioral PatternsAdvanced Data Mining and Applications10.1007/978-3-031-22064-7_29(397-412)Online publication date: 30-Nov-2022
  • (2022)The SWORD is Mightier Than the Interview: A Framework for Semi-automatic WORkaround DetectionBusiness Process Management10.1007/978-3-031-16103-2_9(91-106)Online publication date: 11-Sep-2022
  • (2022)Aligning Event Logs to Resource-Constrained -Petri NetsApplication and Theory of Petri Nets and Concurrency10.1007/978-3-031-06653-5_17(325-345)Online publication date: 19-Jun-2022
  • (2021)A repairing missing activities approach with succession relation for event logsKnowledge and Information Systems10.1007/s10115-020-01524-663:2(477-495)Online publication date: 1-Feb-2021
  • (2021)How well did it recover? Impact-aware conformance checkingComputing10.1007/s00607-020-00857-y103:1(3-27)Online publication date: 1-Jan-2021
  • (2020)A Practice-Oriented, Control-Flow-Based Anomaly Detection Approach for Internal Process AuditsService-Oriented Computing10.1007/978-3-030-65310-1_39(533-543)Online publication date: 14-Dec-2020
  • (2019)Conformance checkingProceedings of the 11th International Conference on Subject-Oriented Business Process Management10.1145/3329007.3329014(1-10)Online publication date: 26-Jun-2019
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media