DECOMPOSED CONFORMANCE Jorge Munoz-Gama, Josep Carmona and W.M.P van der Aalst.

Slides:



Advertisements
Similar presentations
Talk for a minute. see next notes section End.
Advertisements

On 1-soundness and Soundness of Workflow Nets Lu Ping, Hu Hao and Lü Jian Department of Computer Science Nanjing University
Size-estimation framework with applications to transitive closure and reachability Presented by Maxim Kalaev Edith Cohen AT&T Bell Labs 1996.
Hardware and Petri nets Symbolic methods for analysis and verification.
Partitioning and Divide-and-Conquer Strategies Data partitioning (or Domain decomposition) Functional decomposition.
Jorge Muñoz-Gama Josep Carmona
A university for the world real R © 2009, Chapter 3 Advanced Synchronization Moe Wynn Wil van der Aalst Arthur ter Hofstede.
CONFORMANCE CHECKING IN THE LARGE: PARTITIONING AND TOPOLOGY Jorge Munoz-Gama, Josep Carmona and Wil M.P. van der Aalst.
Fast Algorithms For Hierarchical Range Histogram Constructions
Advanced Topics in Algorithms and Data Structures Lecture 7.2, page 1 Merging two upper hulls Suppose, UH ( S 2 ) has s points given in an array according.
Modularity and community structure in networks
Software Design Process A Process is a set of related and (sequenced) tasks that transforms a set of input to a set of output. Inputs Outputs Design Process.
Blending and Rhyming Words
Cruz, Angeleen Joy A. BSED3-ENG
Aligning Event Logs And Declare Models for Conformance Checking Massimiliano de Leoni, Fabrizio Maggi Wil van der Aalst.
Data Conformance Checking using Optimal Alignments Felix Mannhardt, Massimiliano de Leoni, Hajo A. Reijers.
Models vs. Reality dr.ir. B.F. van Dongen Assistant Professor Eindhoven University of Technology
Block-Structured Process Discovery: Filtering Infrequent Behaviour Sander Leemans Dirk Fahland Wil van der Aalst Eindhoven University of Technology.
1 Flexible Subtyping Relations for Component- Oriented Formalisms and their Verification David Hurzeler PhD Examination, 9/11/2004.
1cs542g-term Notes. 2 Meshing goals  Robust: doesn’t fail on reasonable geometry  Efficient: as few triangles as possible Easy to refine later.
Synthesis of Embedded Software Using Free-Choice Petri Nets.
Using Interfaces to Analyze Compositionality Haiyang Zheng and Rachel Zhou EE290N Class Project Presentation Dec. 10, 2004.
1 Computing Nash Equilibrium Presenter: Yishay Mansour.
Architectural Design Principles. Outline  Architectural level of design The design of the system in terms of components and connectors and their arrangements.
/faculteit technologie management Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance Wil van der Aalst.
Process Mining: An iterative algorithm using the Theory of Regions Kristian Bisgaard Lassen Boudewijn van Dongen Wil van.
Building Phylogenies Parsimony 2.
History-Dependent Petri Nets Kees van Hee, Alexander Serebrenik, Natalia Sidorova, Wil van der Aalst ?
Application of Graph Theory to OO Software Engineering Alexander Chatzigeorgiou, Nikolaos Tsantalis, George Stephanides Department of Applied Informatics.
Unraveling Unstructured Process Models Marlon Dumas University of Tartu, Estonia Joint work with Artem Polyvyanyy and Luciano García-Bañuelos Invited Talk,
Maintenance Tools for ACM Project A C M C l a s s, S J T U D o n g X i e.
Insuring Sensitive Processes through Process Mining Jorge Munoz-Gama Isao Echizen Jorge Munoz-Gama and Isao Echizen.
Domain decomposition in parallel computing Ashok Srinivasan Florida State University COT 5410 – Spring 2004.
Jorge Munoz-Gama Advisor: Josep Carmona December 2014 CONFORMANCE CHECKING AND DIAGNOSIS IN PROCESS MINING.
HIERARCHICAL CONFORMANCE CHECKING OF PROCESS MODELS BASED ON EVENT LOGS Jorge Munoz-Gama, Josep Carmona and Wil M.P. van der Aalst.
Have you learnt the material? Checking test Made by Natalie Bogomaz LB Start.
Jorge Muñoz-Gama Universitat Politècnica de Catalunya (Barcelona, Spain) Algorithms for Process Conformance and Process Refinement.
EVENT-BASED REAL-TIME DECOMPOSED CONFORMANCE ANALYSIS Seppe vanden Broucke, Jorge Munoz-Gama, Josep Carmona, Bart Baesens, and Jan Vanthienen CoopIS 2014.
SOFTWARE DESIGN.
Approximation Algorithms Department of Mathematics and Computer Science Drexel University.
Pontificia Universidad Católica de Chile School of Engineering Department of Computer Science A feedback-based framework for process enhancement of causal.
Efficiency of Alignment-based algorithms B.F. van Dongen Laziness! (Gu)estimation! Implementation effort?
1 Efficient Obstacle-Avoiding Rectilinear Steiner Tree Construction Chung-Wei Lin, Szu-Yu Chen, Chi-Feng Li, Yao-Wen Chang, Chia-Lin Yang National Taiwan.
Decision Mining in Prom A. Rozinat and W.M.P. van der Aalst Joosung, Ko.
Physics Jeopardy!. $100 $200 $300 $400 $500 Newton’s Laws EnergyMomentum Circular Motion GravitationThermo.
Space-Efficient Online Computation of Quantile Summaries SIGMOD 01 Michael Greenwald & Sanjeev Khanna Presented by ellery.
Alignment-based Precision Checking A. Adriansyah 1, J. Munoz Gamma 2, J. Carmona 2, B.F. van Dongen 1, W.M.P. van der Aalst 1 Tallinn, 3 September 2012.
Decomposing Data-aware Conformance Checking Massimiliano de Leoni, Jorge Munoz-Gama, Josep Carmona, Wil van der Aalst PAGE 0.
"Decomposing Alignment- based Conformance Checking of Data-aware Process Models" Massimiliano de Leoni, Jorge Muñoz-Gama, Josep Carmona, Wil van der Aalst.
Domain decomposition in parallel computing Ashok Srinivasan Florida State University.
Einsteinium By: Carrington Austin 99 Es 252. Properties and Uses There are no properties, Einsteinium is too small There are no properties, Einsteinium.
WELCOME TO PARENTS’ NIGHT: SAT-10 FORUM READING & Math.
Decomposing Replay Problems: A Case Study Eric Verbeek and Wil van der Aalst.
© A B C D 78 A1A2A3A4 B1 B2 B3B4 C1C2 C3C4 D1D2D3D4 A5A6A7A8 B5B6B7B8 C5C6C7C8 D5D6D7D8 Questions: Ships Remaining: © 2012.
Smith’s Aerospace © P. Bailey & K. Vander Linden, 2005 Procedural Activity Patrick Bailey Keith Vander Linden Calvin College.
R-customizers Goal: define relation between graph and its customizers, study domains of adaptive programs, merging of interface class graphs.
BITS Pilani Pilani Campus Data Structure and Algorithms Design Dr. Maheswari Karthikeyan Lecture1.
Diagnostic Information for Control-Flow Analysis of Workflow Graphs (aka Free-Choice Workflow Nets) Cédric Favre(1,2), Hagen Völzer(1), Peter Müller(2)
Process Mining – Concepts and Algorithms Review of literature on process mining techniques for event log data.
End BBBB HHHH EEEE CCCC AAAA JJJJ FFFF GGGG DDDD IIII LLLL RRRR OOOO MMMM KKKK TTTT PPPP QQQQ NNNN SSSS.
1 Queensland University of Technology, Brisbane, Australia
Efficient implementations of Alignment-based algorithms
Approximating the MST Weight in Sublinear Time
Consistency Methods for Temporal Reasoning
Decomposed Process Mining: The ILP Case
Searching Similar Segments over Textual Event Sequences
Authors: Barry Smyth, Mark T. Keane, Padraig Cunningham
Introduction to Requirements Modeling
JORGE MUNOZ-GAMA and JOSEP CARMONA
Presentation transcript:

DECOMPOSED CONFORMANCE Jorge Munoz-Gama, Josep Carmona and W.M.P van der Aalst

About Myself Jorge Munoz-Gama Barcelona Universitat Politecnica de Catalunya (UPC) Advisor: Josep Carmona Studies Bachelor in Computer Science (2009) Master in Computation (2010) PhD in Computation ( expected Oct. 2014) TUE (2012 and 2013) and NII (2012) Conformance Checking and Diagnosis in Process Mining Topics Precision within Conformance Arya, Wil and Boudewijn Decomposed Conformance Wil and Eric 2

Abstract Wordle 3

Outline Diagnosis using SESE + RPST SESE / RPST Benefits and limitations Valid Decomposition using SESE + RPST Valid Decomposition Transform SESE into Valid Decomposition Alignments and Fitness from Valid Decomposition Stitching Check Divide and Conquer Algorithm 4

Diagnosis using SESE+RPST

Conformance Diagnosis in the Large 6

Process Diagnosis like a Map 7

8

Decomposition Goals Intuitive structural decomposition Low decoupling Sub-processes within the main process SESE Hierarchy between components Nested components RPST 9 * Artem Polyvyanyy: Structuring Process Models. PhD Thesis. University of Potsdam (Germany), January 2012

Structure instead of Behavior 10

Interior, Boundary, Entry, and Exit nodes Given a subgraph and a node of it: Interior node: connected only to nodes of the subgraph. Boundary node: not interior Entry node: boundary where no incoming edge in subgraph or all outgoing edges in Exit node: boundary where no outgoing edge in subgraph or all incoming edges in 11

SESE, Canonical SESE and RPST SESE : set of edges which subgraph has a Single Entry node and a Single Exit node Canonical SESE: not overlap with any other SESE Refined Process Structure Tree (RPST) containing the Canonical SESEs Unique Modular 12

Example of SESE and RPST 13

Conformance and Markings The analysis is strongly depended on the markings 14 A B C A B C D E

Best Effort Analysis Best Effort Analysis oriented to understanding, diagnosis and testing Include artificial place when the entry (or exit) is a transition Short-circuited the component to allow repetitions Heuristic based on invariants of the whole net Use of the particularities of the net Safe, Sound, Bounded, … But at this point there are not guarantees for the general case 15

Implementation 16 Package JorgeMunozGama

Implementation 17 Package JorgeMunozGama

Published Work 9 Sep 2010Process Conformance and Refinement 18 Hierarchical Conformance Checking of Process Models Based on Event Logs J. Munoz-Gama, J. Carmona and W. van der Aalst Petri Nets 2013

Valid Decomposition using SESE+RPST

Hierarchy is not Decomposition Hierarchy aids in the diagnosis But does not make conformance computation faster Actually, the conformance is computed much more times Possible to limit to some range of levels or to focus on particular part Not guarantees for the general case Can we achieve a decomposition of the conformance problem? That reduces the time? With guarantees on the fitness result? 20

Partitioning the RPST Any cut in the RPST is partitioning on the edges 21 Algorithm to cut by the size of the component (k-partitioning)

Properties of the Partitioning It is faster … … but what about the guarantees? Decomposed Perfectly Fitting Checking: A model/log is perfectly fitting if and only if all the components are perfectly fitting 22

SESE and Decomposed Perfectly Fitting SESEs (per se) do not satisfy the Decomposed Perfectly Fitting Checking property 23 1 token in p => abcdef fits S but not S2 2 tokens in p => abdecf fits S1 and S2 but not S

Valid Decomposition Each place appears in precisely one of the subnets Each edge appears in precisely one of the subnets Transitions may appear in multiple subnets Invisible transitions must appear in precisely one subnet Duplicate transitions must appear in precisely one subnet 24 * Wil M.P. van der Aalst: Decomposing Petri Nets for Process Mining: A Generic Approach. BPMCenter.org, 2012 Valid Decompositions satisfy Decomposed Perfectly Fitting Checking property !

SESE to Valid Decomposition Create a ‘bridge’ for each shared place 25

Results (1) 1 Net – 1h 15min 7 Subnets – 2min 26

Results (2) 27

Topology 28

Topology and NFCC and NFN Non Fitting Connected Components (NFCC) 29 Non Fitting Net (NFN)

Topology Algorithms on Large 30

DivideAndConquer Package 31

DecomposedConformance Package 32

Published Work 9 Sep 2010Process Conformance and Refinement 33 Conformance Checking in the Large: Partitioning and Topology J. Munoz-Gama, J. Carmona and W. van der Aalst Business Process Management (BPM) 2013

Alignments and Fitness on Valid Decompositions

Adapted Cost Function 35 Cost involving the task # subnets having the task Theorem: The sum of the costs of all the subnets using the adapted cost function is a lower bound of the cost in overall alignment Upper bound on the fitness

Lower bound on the costs - Idea 36 AAAA SN SN1SN2SN3 BBBB C-C- DDDD EEEE FFFF GGGG -H-H IIII JJJJ KKKK LLLL AAAA BBBB DDDD EEEE KKKK LLLL C-C- AAAA C-C- FFFF GGGG -H-H IIII JJJJ A-A- CCCC FFFF GGGG HHHH IIII JJJJ

Stitching Check 37 SN1-SN2 SN2-SN3SN1-SN3 AAAA SN BBBB C-C- DDDD EEEE FFFF GGGG -H-H IIII JJJJ KKKK LLLL SN1 AAAA BBBB DDDD EEEE AAAA C-C- FFFF GGGG -H-H IIII JJJJ SN2 SN3 KKKK LLLL C-C- AAAA AAAA C-C- C-C- SN1 SN2 SN3 The order of the tasks matters

Stitching Check Theorem 38 Theorem: Given a trace, if it agrees on the stitching check, the sum of the costs using the adapted cost function is not a bound but the exact result. An optimal alignment for the whole trace can be constructed straightforward from the alignments of the subnets

Stitching Check Corollary 39 Corollary: if all the shared transitions are synchronous moves, is not a bound but exact. Interesting from a Diagnosis point of view Two optimal alignments: one with synchronous moves in the shared transitions, and the other no.

Two possible optimal alignments 40 B-B- AAAA -B-B CCCC DDDD EEEE FFFF -A-A BBBB A-A- CCCC DDDD EEEE FFFF

Two possible optimal alignments 41 B-B- AAAA -B-B -A-A BBBB A-A- BBBB DDDD EEEE BBBB CCCC EEEE EEEE FFFF BBBB DDDD EEEE BBBB CCCC EEEE EEEE FFFF They do not agree on B (not even in the # occurrences

Modified Alignment Algorithm Modify the alignment algorithm to prioritize solutions with synchronous moves for a given set of tasks (if exists) 42 Priority queue

Estimating Fitness If all traces in the log satisfy the stitching check the fitness is exact (unlikely) Just that one trace does not satisfy, the fitness is not formally guaranteed However, it must be experimentally accurate traces satisfy stitching check 1 trace not satisfy stitching check fitness The error is negligible

Fitness Interval Give the percentage of traces with exact value But also a confidence interval on the fitness 44 Lower Bound of trace Upper Bound of trace fitness fitness (if satisfy stitching check) 0 (if not satisfy stitching check) The bounds for the log are the average of the bounds per trace

Merging Subnets If they don’t agree, merge them 45

Stitching Matrix Stitching problems between subnets Blueprint for merging 46 SN1SN2SN3 SN SN SN L

Stitching Matrix Stitching problems between subnets Blueprint for merging 47 SN1SN2SN3 SN SN SN L

Decomposed Conformance Algorithm 48 dc (L,SN) L[ ], SN[ ] = decompose (L, SN) A[ ] = align (L[ ], SN[ ]) Lp, Ap[ ] = pass_stitching_check (L, A[ ]) Lf, Af[ ] = fail_stitching_check (L, A[ ]) while (not_final_condition) Ms = stitching_matrix (Af[ ]) L[ ] = project_log (Lf, SN[ ]) A[ ] = align (L[ ], SN[ ]) Lp, Ap[ ] = Lp, Ap[ ] + pass_stitching_check (L, A[ ]) Lf, Af[ ] = fail_stitching_check (L, A[ ]) SN[ ] = merge_subnets (Ms) compute_fitness (Ap[ ], Af[ ]) compute_alignments (Ap[ ])

Conclusions How SESE and RPST may help for diagnosis How to create Valid Decompositions from SESE Partitioning the Problem Bridging Topology and Topological Algorithms Estimating fitness from Valid Decompositions Stitching Check Fitness Interval Decomposed Conformance Algorithm 49

Future Work New approaches for creating Valid Decompositions Based on Transition-Separation Pairs SESE+Passages Study on the decomposed fitness When it’s more effective and when to stop More complex merging strategies Real-case scenarios Conformance Checking in Hierarchy 50

Thank You