Process Mining: An iterative algorithm using the Theory of Regions Kristian Bisgaard Lassen Boudewijn van Dongen Wil van.

Slides:



Advertisements
Similar presentations
Introduction to Algorithms Quicksort
Advertisements

On 1-soundness and Soundness of Workflow Nets Lu Ping, Hu Hao and Lü Jian Department of Computer Science Nanjing University
Lecture 24 MAS 714 Hartmut Klauck
Context-Sensitive Interprocedural Points-to Analysis in the Presence of Function Pointers Presentation by Patrick Kaleem Justin.
A university for the world real R © 2009, Chapter 3 Advanced Synchronization Moe Wynn Wil van der Aalst Arthur ter Hofstede.
Representing and Querying Correlated Tuples in Probabilistic Databases
Deterministic Negotiations: Concurrency for Free Javier Esparza Technische Universität München Joint work with Jörg Desel and Philipp Hoffmann.
MXML A Meta model for process mining data
IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 19, NO. 12, DECEMBER /10/4.
Data Conformance Checking using Optimal Alignments Felix Mannhardt, Massimiliano de Leoni, Hajo A. Reijers.
Aligning Event Logs and Process Models for Multi- perspective Conformance Checking: An Approach Based on ILP Massimiliano de Leoni Wil M. P. van der Aalst.
Models vs. Reality dr.ir. B.F. van Dongen Assistant Professor Eindhoven University of Technology
Boudewijn van Dongen /t Multi-phase process mining Building instance graphs.
/faculteit technologie management Genetic Process Mining Ana Karla Medeiros Ton Weijters Wil van der Aalst Eindhoven University of Technology Department.
Process Mining in CSCW Systems All truths are easy to understand once they are discovered; the point is to discover them. Galileo Galilei ( )
Tutorial 6 & 7 Symbol Table
Validating Streaming XML Documents Luc Segoufin & Victor Vianu Presented by Harel Paz.
Business Alignment Using Process Mining as a Tool for Delta Analysis Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology Department of Information.
1 Validation and Verification of Simulation Models.
/faculteit technologie management Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance Wil van der Aalst.
1 Ivan Lanese Computer Science Department University of Bologna Italy Concurrent and located synchronizations in π-calculus.
Discovering Coordination Patterns using Process Mining Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology Department of Information and Technology.
Boudewijn van Dongen June 22, 2004 /t Process Mining, the basics.
Process Mining: Discovering processes from event logs All truths are easy to understand once they are discovered; the point is to discover them. Galileo.
Let's Go All the Way: From Requirements via Colored Workflow Nets to a BPEL Implementation of a New Bank System Wil M. P. van der Aalst Jens Bæk Jørgensen.
History-Dependent Petri Nets Kees van Hee, Alexander Serebrenik, Natalia Sidorova, Wil van der Aalst ?
Process Mining for Ubiquitous Mobile Systems An Overview and a Concrete Algorithm Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology Department.
A university for the world real R © 2009, Chapter 17 Process Mining and Simulation Moe Wynn Anne Rozinat Wil van der Aalst Arthur.
Insuring Sensitive Processes through Process Mining Jorge Munoz-Gama Isao Echizen Jorge Munoz-Gama and Isao Echizen.
Knowledge and Memory: How we conceptualize information.
Jorge Muñoz-Gama Universitat Politècnica de Catalunya (Barcelona, Spain) Algorithms for Process Conformance and Process Refinement.
Process Mining: Discovering processes from event logs All truths are easy to understand once they are discovered; the point is to discover them. Galileo.
EVENT-BASED REAL-TIME DECOMPOSED CONFORMANCE ANALYSIS Seppe vanden Broucke, Jorge Munoz-Gama, Josep Carmona, Bart Baesens, and Jan Vanthienen CoopIS 2014.
Planning with Conceptual Models Mined from User Behavior By Thomas J. Walsh and Michael L. Littman Rutgers University Department of Computer Science {thomaswa,
DECOMPOSED CONFORMANCE Jorge Munoz-Gama, Josep Carmona and W.M.P van der Aalst.
Memory and Analogy in Game-Playing Agents Jonathan Rubin & Ian Watson University of Auckland Game AI Group
Formal Specification of Intrusion Signatures and Detection Rules By Jean-Philippe Pouzol and Mireille Ducassé 15 th IEEE Computer Security Foundations.
Process-oriented System Analysis Process Mining. BPM Lifecycle.
Decision Mining in Prom A. Rozinat and W.M.P. van der Aalst Joosung, Ko.
1 Work Package 2 Identification and Formalization of Knowledge  “(The report proposes) a generic technique for defining programming model specific abstractions.
Decomposing Data-aware Conformance Checking Massimiliano de Leoni, Jorge Munoz-Gama, Josep Carmona, Wil van der Aalst PAGE 0.
Behavioral Comparison of Process Models Based on Canonically Reduced Event Structures Paolo Baldan Marlon Dumas Luciano García Abel Armas.
"Decomposing Alignment- based Conformance Checking of Data-aware Process Models" Massimiliano de Leoni, Jorge Muñoz-Gama, Josep Carmona, Wil van der Aalst.
International Conference on Fuzzy Systems and Knowledge Discovery, p.p ,July 2011.
Decomposing Replay Problems: A Case Study Eric Verbeek and Wil van der Aalst.
/faculteit technologie management PN-1 Petri nets refresher Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology, Faculty of Technology Management,
Transformation Strategies between Block-Oriented and Graph-Oriented Process Modeling Languages Jan MendlingVienna University of Economics (WU Wien) Kristian.
Discriminative n-gram language modeling Brian Roark, Murat Saraclar, Michael Collins Presented by Patty Liu.
Maikel Leemans Wil M.P. van der Aalst. Process Mining in Software Systems 2 System under Study (SUS) Functional perspective Focus: User requests Functional.
Process Mining – Concepts and Algorithms Review of literature on process mining techniques for event log data.
Discovering Models for State-based Processes M.L. van Eck, N. Sidorova, W.M.P. van der Aalst.
Visualization in Process Mining
Multi-phase Process Mining: Building Instance Graphs
30 januari 2018 Mining Social Networks Uncovering interaction patterns in business processes Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology.
7 mei 2018 Process Mining in CSCW Systems All truths are easy to understand once they are discovered; the point is to discover them. Galileo Galilei.
Profiling based unstructured process logs
David Redlich, Thomas Molka, Wasif Gilani, Awais Rashid, Gordon Blair
Chapter 15 QUERY EXECUTION.
A General Framework for Correlating Business Process Characteristics
Decomposed Process Mining: The ILP Case
Towards a Generic On Line Auditing Tool (OLAT)
Learning Analytics: Process & Theory
Multi-phase process mining
Evaluation of Relational Operations: Other Techniques
Petri nets refresher Prof.dr.ir. Wil van der Aalst
CENG 351 Data Management and File Structures
3 mei 2019 Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance Wil van der Aalst Ana Karla A. de Medeiros.
Business Alignment Using Process Mining as a Tool for Delta Analysis
5 juli 2019 Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance Wil van der Aalst Ana Karla A. de Medeiros.
19 augustus 2019 Mining Social Networks Uncovering interaction patterns in business processes Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology.
Presentation transcript:

Process Mining: An iterative algorithm using the Theory of Regions Kristian Bisgaard Lassen Boudewijn van Dongen Wil van der Aalst

Overview 1.Introduction to Theory of Regions 2.Introduction to Process Mining 3.Applying Theory of Regions to Process Mining 4.Conclusion

Theory of Regions (for Transition Systems) A Region in a Transition System is a set of states, such that for all transitions in the system holds that: 1)If that transition enters the region, then all equally labeled transitions enter the region, 2)If that transition exists the region, then all equally labeled transitions exit the region, 3)If that transition does not cross the region, then no equally labeled transition crosses the region.

Theory of Regions (for Transition Systems) When all regions are found, a Petri net is built, where these regions correspond to places in the net. The resulting Petri net is such that its statespace is bisimilar to the transition system that served as input.

Process Mining: an overview

Log Files Information systems typically log all kinds of events. We use a XML format for storing event logs. The basic assumption is that the log contains information about specific tasks executed for specific process instances (cases, event-lists, audit trails). Any knowledge of the underlying process is not assumed.

Process Mining VS. Theory of Regions Process Mining -Event logs -Completeness unknown -Abstract representation required Theory of Regions -State-based models / (regular) languages -Complete information provided -Exact and compact representation required Big chunks of data, unable to fit in memory.Entire model needs to be present in memory. Completeness of information is very unlikely. Completeness of information is guaranteed by the input model. Main conceptual difference

Some existing Process Mining approaches

The goal: Applying Theory of Regions in the context of PM Assume an event log is A Transition System, such that each trace starts in a global state

Example Log Log: A,B,C,D A,C,B,D A,B,C,D A,C,B,D A,E,D Transition systems

Merging the initial state

Identifying regions

Making the algorithm iterative (i.e. linear in the log)

Future work, other approaches Several other approaches are possible: 1)Constructing a transition system for the whole log in a smart way: Rubin et al. propose 36 ways of doing so, but they require the entire transition system to be build in memory. Their approach however can handle “incomplete” information. 2)Considering the event log as a regular language and use language-based regions as proposed by Darondeau et al. and Lorenz et al.

Conclusions Using our approach, the Theory of Regions can be applied in the context of process mining, in such a way that the approach is linear in the number of cases in the log. Downsides remain the completeness assumption and the resulting model, since this is not an abstraction of the log, which is often required in process mining.