Decomposing Data-aware Conformance Checking Massimiliano de Leoni, Jorge Munoz-Gama, Josep Carmona, Wil van der Aalst PAGE 0.

Slides:



Advertisements
Similar presentations
From Local Patterns to Global Models: Towards Domain Driven Educational Process Mining Nikola Trčka Mykola Pechenizkiy.
Advertisements

Problems and Their Classes
Partial Order Reduction: Main Idea
Jorge Muñoz-Gama Josep Carmona
A university for the world real R © 2009, Chapter 3 Advanced Synchronization Moe Wynn Wil van der Aalst Arthur ter Hofstede.
CONFORMANCE CHECKING IN THE LARGE: PARTITIONING AND TOPOLOGY Jorge Munoz-Gama, Josep Carmona and Wil M.P. van der Aalst.
Fast Algorithms For Hierarchical Range Histogram Constructions
Timed Automata.
Regression Analysis Once a linear relationship is defined, the independent variable can be used to forecast the dependent variable. Y ^ = bo + bX bo is.
Formal Specification of Topological Relations Erika Asnina, Janis Osis and Asnate Jansone Riga Technical University The 10th International Baltic Conference.
Parallel Scheduling of Complex DAGs under Uncertainty Grzegorz Malewicz.
Aligning Event Logs And Declare Models for Conformance Checking Massimiliano de Leoni, Fabrizio Maggi Wil van der Aalst.
Best-First Search: Agendas
Partial Fractions MATH Precalculus S. Rook.
Data Conformance Checking using Optimal Alignments Felix Mannhardt, Massimiliano de Leoni, Hajo A. Reijers.
Aligning Event Logs and Process Models for Multi- perspective Conformance Checking: An Approach Based on ILP Massimiliano de Leoni Wil M. P. van der Aalst.
Models vs. Reality dr.ir. B.F. van Dongen Assistant Professor Eindhoven University of Technology
Advanced Topics in Algorithms and Data Structures Page 1 Parallel merging through partitioning The partitioning strategy consists of: Breaking up the given.
Synthesis of Embedded Software Using Free-Choice Petri Nets.
Ugo Montanari On the optimal approximation of descrete functions with low- dimentional tables.
1 Distributed Databases Chapter Two Types of Applications that Access Distributed Databases The application accesses data at the level of SQL statements.
/faculteit technologie management Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance Wil van der Aalst.
Chapter 11: Limitations of Algorithmic Power
Process Mining: An iterative algorithm using the Theory of Regions Kristian Bisgaard Lassen Boudewijn van Dongen Wil van.
Copyright 2008 Koren ECE666/Koren Part.6a.1 Israel Koren Spring 2008 UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering Digital Computer.
History-Dependent Petri Nets Kees van Hee, Alexander Serebrenik, Natalia Sidorova, Wil van der Aalst ?
Multiplying, Dividing, and Simplifying Radicals
4.2 Integer Exponents and the Quotient Rule
A university for the world real R © 2009, Chapter 23 Epilogue Wil van der Aalst Michael Adams Arthur ter Hofstede Nick Russell.
Insuring Sensitive Processes through Process Mining Jorge Munoz-Gama Isao Echizen Jorge Munoz-Gama and Isao Echizen.
Jorge Munoz-Gama Advisor: Josep Carmona December 2014 CONFORMANCE CHECKING AND DIAGNOSIS IN PROCESS MINING.
HIERARCHICAL CONFORMANCE CHECKING OF PROCESS MODELS BASED ON EVENT LOGS Jorge Munoz-Gama, Josep Carmona and Wil M.P. van der Aalst.
Database Systems Normal Forms. Decomposition Suppose we have a relation R[U] with a schema U={A 1,…,A n } – A decomposition of U is a set of schemas.
Business Process Management. Key Definitions Process model A formal way of representing how a business operates Illustrates the activities that are performed.
Jorge Muñoz-Gama Universitat Politècnica de Catalunya (Barcelona, Spain) Algorithms for Process Conformance and Process Refinement.
Chapter 5 Section 2 Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley.
Math 002 College Algebra Final Exam Review.
Ranking Queries on Uncertain Data: A Probabilistic Threshold Approach Wenjie Zhang, Xuemin Lin The University of New South Wales & NICTA Ming Hua,
Transit Priority Strategies for Multiple Routes under Headway-based Operations Shandong University, China & University of Maryland at College Park, USA.
EVENT-BASED REAL-TIME DECOMPOSED CONFORMANCE ANALYSIS Seppe vanden Broucke, Jorge Munoz-Gama, Josep Carmona, Bart Baesens, and Jan Vanthienen CoopIS 2014.
Jianmin Wang 1, Shaoxu Song 1, Xuemin Lin 2, Xiaochen Zhu 1, Jian Pei 3 1 Tsinghua University, China 2 University of New South Wales, Australia 3 Simon.
DECOMPOSED CONFORMANCE Jorge Munoz-Gama, Josep Carmona and W.M.P van der Aalst.
Dina Workshop Analysing Properties of Hybrid Systems Rafael Wisniewski Aalborg University.
Chapter 5 Section 2. Objectives 1 Copyright © 2012, 2008, 2004 Pearson Education, Inc. Use 0 as an exponent. Use negative numbers as exponents. Use the.
Pontificia Universidad Católica de Chile School of Engineering Department of Computer Science A feedback-based framework for process enhancement of causal.
On Reducing the Global State Graph for Verification of Distributed Computations Vijay K. Garg, Arindam Chakraborty Parallel and Distributed Systems Laboratory.
1 Lower Bounds Lower bound: an estimate on a minimum amount of work needed to solve a given problem Examples: b number of comparisons needed to find the.
Jianmin Wang 1, Shaoxu Song 1, Xiaochen Zhu 1, Xuemin Lin 2 1 Tsinghua University, China 2 University of New South Wales, Australia 1/23 VLDB 2013.
Efficiency of Alignment-based algorithms B.F. van Dongen Laziness! (Gu)estimation! Implementation effort?
Compliance Management Elham Ramezani 1. Enterprises are governed by regulations Compliance Report ✓ ✗ ✗ ✓ ✗ ✗ Laws & Regulations Diagnostic Information.
Process-oriented System Analysis Process Mining. BPM Lifecycle.
NP-Complete Problems. Running Time v.s. Input Size Concern with problems whose complexity may be described by exponential functions. Tractable problems.
Decision Mining in Prom A. Rozinat and W.M.P. van der Aalst Joosung, Ko.
Alignment-based Precision Checking A. Adriansyah 1, J. Munoz Gamma 2, J. Carmona 2, B.F. van Dongen 1, W.M.P. van der Aalst 1 Tallinn, 3 September 2012.
Behavioral Comparison of Process Models Based on Canonically Reduced Event Structures Paolo Baldan Marlon Dumas Luciano García Abel Armas.
"Decomposing Alignment- based Conformance Checking of Data-aware Process Models" Massimiliano de Leoni, Jorge Muñoz-Gama, Josep Carmona, Wil van der Aalst.
IT Applications for Decision Making. Operations Research Initiated in England during the world war II Make scientifically based decisions regarding the.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
© The McGraw-Hill Companies, Inc., Chapter 12 On-Line Algorithms.
Asynchronous Exclusive Selection Bogdan Chlebus, U. Colorado Darek Kowalski, U. Liverpool.
Decomposing Replay Problems: A Case Study Eric Verbeek and Wil van der Aalst.
Custom Computing Machines for the Set Covering Problem Paper Written By: Christian Plessl and Marco Platzner Swiss Federal Institute of Technology, 2002.
11 -1 Chapter 12 On-Line Algorithms On-Line Algorithms On-line algorithms are used to solve on-line problems. The disk scheduling problem The requests.
1 Ch 12: More Advanced Linear Programming Concepts and Methods Applying Linear Programming to Those Investments in Which The Simplifying Assumptions of.
Discovering Models for State-based Processes M.L. van Eck, N. Sidorova, W.M.P. van der Aalst.
A General Framework for Correlating Business Process Characteristics
Decomposed Process Mining: The ILP Case
Verification and Validation Unit Testing
Chapter 11 Limitations of Algorithm Power
NP-Complete Problems.
Presentation transcript:

Decomposing Data-aware Conformance Checking Massimiliano de Leoni, Jorge Munoz-Gama, Josep Carmona, Wil van der Aalst PAGE 0

(a; {A = 3000;R = Michael; E = Pete}); (b; {V = OK;E = Sue}); (c; {I = 530;D = OK;E = Sue}); (f; {E = Pete}); Example: A Credit Institute PAGE 1 For such a credit amount, should be interest <450 «Sue» not authorized to perform b: is not Assistant Activity h hasn’t been executed: D cannot be OK (a; {A = 3000;R = Michael; E = Pete}); (b; {V = OK;E = Pete}); (c; {I = 530;D = OK;E = Sue}); (d, {I = 599; D = NOK; E = Sue}); (f; {E = Pete}); (a; {A = 3000;R = Michael; E = Pete}); (b; {V = OK;E = Pete}); (c; {I = 530;D = OK;E = Sue}); (d, {I = 599; D = NOK; E = Sue}); (f; {E = Pete}); (a; {A = 5001;R = Michael; E = Pete}); (b; {V = OK;E = Pete}); (c; {I = 530;D = NOK;E = Sue}); (f; {E = Pete}); (a; {A = 5001;R = Michael; E = Pete}); (b; {V = OK;E = Pete}); (c; {I = 530;D = NOK;E = Sue}); (f; {E = Pete}); Activity d should have occurred, since amount<5000

Petri Net with Data : Variables and Read/Write Operations PAGE 2 Variables Write Operations Read Operations

Binding A binding is a triplet (t,r,w) where t is the transition that fires r: V  U is the variables that are read along with the values −dom(r) is the set of read variables −r(v) is the value read for variable v w: V  U is the variables that are written along with the values −dom(w) is the set of read variables −w(v) is the value read for variable v PAGE 3

A Sequence of bindings PAGE 4 Necessary condition for a binding (t,r,w): dom(r) and dom(w) coincides with the expected read and write operations.

Each transition is associated with all valid bindings PAGE 5 TransitionGuard Credit Request -- Verify 0.1 * r(A) < w(I) < 0.2 * r(A) Assessment r(V) = true Register Negative Verification r(V) = false AND w(D) = false Inform Requester -- Register Loan Rejection r(D) = false Open Credit r(D) = true

Alignments PAGE 6 Move in both without incorrect write operations Move in both with incorrect write operations Move in log Move in process

Cost of alignments Each move is associated with a cost Cost of alignment is the sum of the costs of its moves : Cost of reading/writing a wrong value : Cost of “move on log” : Cost of not writing or reading a variable : Cost of “move on model”

Cost of alignments: some examples 8 10 An optimal alignment: an alignment with the lowest cost

Process: S – A – C – E – A – B - F Process: S {z=1, y=0} – A{x=10} – C{y=11} – E – A{x=3} – B{y=13} - F Finding optimal alignments: Approach 1 1.Computing the control-flow alignment using existing techniques (the «Arya» technique) PAGE 9 Log: S {z=10,y=0} – A{x=1} – C{y=11} – E – A{x=3} – B{y=13} - 2.Enriching the alignment with the data operations. The alignment is enriched, thus minimizing the cost of the alignment Naturally formulated as an Mixed Integer Linear Program M. de Leoni, W.M.P. van der Aalst: Aligning event logs and process models for multi-perspective conformance checking: An approach based on integer linear programming. Proceedings of BPM 2013

Finding optimal alignments: Approach 2 PAGE 10 Process: a b Log: (a; {A = 3000;R = Michael; E = Pete}); – (b; {V = NOK; E = Sue}); Process: (a; {A = 3000;R = Michael; E = Pete}); – (b; {V = NOK; E = Sue}); F. Mannhardt, M. de Leoni, H. Reijers, W.M.P. van der Aalst: Balanced Multi-Perspective Checking of Process Conformance. Computing Journal, Springer (under review)

Finding an optimal alignments: complexity Finding an optimal alignments is exponential on the size of the model, i.e. the number of activities and data variables. IDEA: Divide-and-conquer approach Petri Net with Data is decomposed into smaller fragments that are checked separetely. If the decomposition is valid −Any trace is fitting the entire model if and only if it fits all smaller fragments. PAGE 11 t1 t2 t3 t4 t6 t5 t1 t2 t3 t4 t6 t5

Valid decomposition without data The following can only appear in precisely one fragment: 1.Places 2.Invisible transitions 3.Visible transitions with the same label (name) 4.Arcs Visible transitions with unique label may appear in multiple fragments Each variable appears in precisely one fragment Each transition shared among fragments may read/write different variables The union of the fragments is the entire model PAGE 12 W.M.P. van der Aalst: Decomposing petri nets for process mining: A generic approach. Distributed and Parallel Databases 31(4) (2013)

Valid decomposition with data The following can only appear in precisely one fragment: 1.Places 2.Invisible transitions 3.Visible transitions with the same label (name) 4.Arcs Visible transitions with unique label may appear in multiple fragments Each variable appears in precisely one fragment Each transition shared among fragments may read/write different variables The union of the fragments is the entire model PAGE 13

Instantation of Valid Decompositions Different strategies are possible. We propose two strategies extending what exists for the data-unaware case: Maximal Decomposition SESE-based decomposition PAGE 14

Maximal Decomposition Construction the smallest components that satisfy the Valid Decomposition Definition Variables and Places are mutually exclusive

SESE-based Algorithm PAGE 16

Example of the SESE-based Algorithm (k = 2) PAGE 17

Implementation Available in the package DataConformanceChecker PAGE 18

Experiments Generating different event logs with 5000 traces with a different average trace length This ensured by enforcing a larger number of credit renegotiations 20% of the transition firings are so as to not satisfy the guards PAGE 19

Results: an exponential reduction of the computation time PAGE 20

Projection on the model PAGE 21 #correct(t,DPN) = number of moves in both without incorrect write operations for t in the alignments between each log trace and DPN #total(t,DPN) = number of moves for t in the alignments of each log trace and DPN

Projection on the model based on decomposition is an approximation! PAGE 22 t1 t2 t3 t4 t6 t5 t1 t2 t3 t4 t6 t5 No decompositionDecomposition Move in both without incorrect write operations for t Move in both without incorrect write operations for t in all fragments containing t Move in both with incorrect write operations for t Move in log Move in move The same move for t in at least one of fragments containing t

Projection on the model (without decomposition) PAGE 23 With decomposition Without decomposition

Conclusion Finding an alignment is exponential in the model size To speed the computation: 1.Decompose the model in submodels 2.Alignment each trace with each submodel The decomposition needs to be valid: Any trace is fitting the entire model if and only if it fits all smaller fragments. A more extensive evaluation is needed Using real processes Synthetic data referring to models with dozens of transitions PAGE 24