"Decomposing Alignment- based Conformance Checking of Data-aware Process Models" Massimiliano de Leoni, Jorge Muñoz-Gama, Josep Carmona, Wil van der Aalst.

Slides:



Advertisements
Similar presentations
Problems and Their Classes
Advertisements

©G. Millbery 2003Data, Information, Knowledge and Processing Slide 1 Validation  Making sure that the data value entered is sensible and reasonable 
Lecture 24 MAS 714 Hartmut Klauck
1 Matching Polytope x1 x2 x3 Lecture 12: Feb 22 x1 x2 x3.
Jorge Muñoz-Gama Josep Carmona
A university for the world real R © 2009, Chapter 3 Advanced Synchronization Moe Wynn Wil van der Aalst Arthur ter Hofstede.
Weighted graphs Example Consider the following graph, where nodes represent cities, and edges show if there is a direct flight between each pair of cities.
CONFORMANCE CHECKING IN THE LARGE: PARTITIONING AND TOPOLOGY Jorge Munoz-Gama, Josep Carmona and Wil M.P. van der Aalst.
Evaluating Heuristics for the Fixed-Predecessor Subproblem of Pm | prec, p j = 1 | C max.
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
Rigorous Software Development CSCI-GA Instructor: Thomas Wies Spring 2012 Lecture 13.
Distributed Process Management
Aligning Event Logs And Declare Models for Conformance Checking Massimiliano de Leoni, Fabrizio Maggi Wil van der Aalst.
Data Conformance Checking using Optimal Alignments Felix Mannhardt, Massimiliano de Leoni, Hajo A. Reijers.
Aligning Event Logs and Process Models for Multi- perspective Conformance Checking: An Approach Based on ILP Massimiliano de Leoni Wil M. P. van der Aalst.
Models vs. Reality dr.ir. B.F. van Dongen Assistant Professor Eindhoven University of Technology
Beyond Process Mining: Discovering Business Rules From Event Logs Marlon Dumas University of Tartu, Estonia With contributions from Luciano García-Bañuelos,
Block-Structured Process Discovery: Filtering Infrequent Behaviour Sander Leemans Dirk Fahland Wil van der Aalst Eindhoven University of Technology.
Nearest Neighbor. Predicting Bankruptcy Nearest Neighbor Remember all your data When someone asks a question –Find the nearest old data point –Return.
Synthesis of Embedded Software Using Free-Choice Petri Nets.
Distributed Process Management
A Schedulability-Preserving Transformation of BDF to Petri Nets Cong Liu EECS 290n Class Project December 10, 2004.
1 Memory Management Chapter 7. 2 Memory Management Subdividing memory to accommodate multiple processes Memory needs to be allocated to ensure a reasonable.
/faculteit technologie management Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance Wil van der Aalst.
Chapter 11: Limitations of Algorithmic Power
Process Mining: An iterative algorithm using the Theory of Regions Kristian Bisgaard Lassen Boudewijn van Dongen Wil van.
1 Formal Engineering of Reliable Software LASER 2004 school Tutorial, Lecture1 Natasha Sharygina Carnegie Mellon University.
Presented by Alp Sardağ Algorithms for POMDP. Monahan Enumeration Phase Generate all vectors: Number of gen. Vectors = |A|M |  | where M vectors of previous.
Unraveling Unstructured Process Models Marlon Dumas University of Tartu, Estonia Joint work with Artem Polyvyanyy and Luciano García-Bañuelos Invited Talk,
1 Software Testing Techniques CIS 375 Bruce R. Maxim UM-Dearborn.
A university for the world real R © 2009, Chapter 23 Epilogue Wil van der Aalst Michael Adams Arthur ter Hofstede Nick Russell.
Insuring Sensitive Processes through Process Mining Jorge Munoz-Gama Isao Echizen Jorge Munoz-Gama and Isao Echizen.
Reverse Engineering State Machines by Interactive Grammar Inference Neil Walkinshaw, Kirill Bogdanov, Mike Holcombe, Sarah Salahuddin.
Jorge Munoz-Gama Advisor: Josep Carmona December 2014 CONFORMANCE CHECKING AND DIAGNOSIS IN PROCESS MINING.
HIERARCHICAL CONFORMANCE CHECKING OF PROCESS MODELS BASED ON EVENT LOGS Jorge Munoz-Gama, Josep Carmona and Wil M.P. van der Aalst.
Chapter 10 Operating Systems *. 2 Chapter Goals Describe the main responsibilities of an operating system Define memory and process management Explain.
Jorge Muñoz-Gama Universitat Politècnica de Catalunya (Barcelona, Spain) Algorithms for Process Conformance and Process Refinement.
EVENT-BASED REAL-TIME DECOMPOSED CONFORMANCE ANALYSIS Seppe vanden Broucke, Jorge Munoz-Gama, Josep Carmona, Bart Baesens, and Jan Vanthienen CoopIS 2014.
Jianmin Wang 1, Shaoxu Song 1, Xuemin Lin 2, Xiaochen Zhu 1, Jian Pei 3 1 Tsinghua University, China 2 University of New South Wales, Australia 3 Simon.
DECOMPOSED CONFORMANCE Jorge Munoz-Gama, Josep Carmona and W.M.P van der Aalst.
Bill Payment Optimization Algorithms. Purpose To find and/or construct algorithms that will optimize the decision process of paying bills from an account.
Pontificia Universidad Católica de Chile School of Engineering Department of Computer Science A feedback-based framework for process enhancement of causal.
Jianmin Wang 1, Shaoxu Song 1, Xiaochen Zhu 1, Xuemin Lin 2 1 Tsinghua University, China 2 University of New South Wales, Australia 1/23 VLDB 2013.
Efficiency of Alignment-based algorithms B.F. van Dongen Laziness! (Gu)estimation! Implementation effort?
1 Efficient Rule Matching for Large Scale Systems Packet Classification – A Case Study Alok Tongaonkar Stony Brook University TexPoint fonts used in EMF.
1 Memory Management Chapter 7. 2 Memory Management Subdividing memory to accommodate multiple processes Memory needs to be allocated to ensure a reasonable.
Compliance Management Elham Ramezani 1. Enterprises are governed by regulations Compliance Report ✓ ✗ ✗ ✓ ✗ ✗ Laws & Regulations Diagnostic Information.
Extended Finite-State Machine Induction using SAT-Solver Vladimir Ulyantsev, Fedor Tsarev St. Petersburg National.
NP-Complete Problems. Running Time v.s. Input Size Concern with problems whose complexity may be described by exponential functions. Tractable problems.
Decision Mining in Prom A. Rozinat and W.M.P. van der Aalst Joosung, Ko.
Alignment-based Precision Checking A. Adriansyah 1, J. Munoz Gamma 2, J. Carmona 2, B.F. van Dongen 1, W.M.P. van der Aalst 1 Tallinn, 3 September 2012.
Decomposing Data-aware Conformance Checking Massimiliano de Leoni, Jorge Munoz-Gama, Josep Carmona, Wil van der Aalst PAGE 0.
Problem Reduction So far we have considered search strategies for OR graph. In OR graph, several arcs indicate a variety of ways in which the original.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
Decomposing Replay Problems: A Case Study Eric Verbeek and Wil van der Aalst.
Dynamic White-Box Testing What is code coverage? What are the different types of code coverage? How to derive test cases from control flows?
Verification vs. Validation Verification: "Are we building the product right?" The software should conform to its specification.The software should conform.
Resource Sharing in LegUp. Resource Sharing in High Level Synthesis Resource Sharing is a well-known technique in HLS to reduce circuit area by sharing.
Discovering Models for State-based Processes M.L. van Eck, N. Sidorova, W.M.P. van der Aalst.
YAWL in the Cloud: Supporting Process Sharing and Variability
On the Complexity of Buffer Allocation in Message Passing Systems
Intro to Theory of Computation
A General Framework for Correlating Business Process Characteristics
Decomposed Process Mining: The ILP Case
Binary Decision Diagrams
Solution Solution Checking Solutions of Inequalities
Chapter 11 Limitations of Algorithm Power
Introduction to verification
Presentation transcript:

"Decomposing Alignment- based Conformance Checking of Data-aware Process Models" Massimiliano de Leoni, Jorge Muñoz-Gama, Josep Carmona, Wil van der Aalst PAGE 0 This presentation includes adaptations of slides prepared by Jorge Muñoz-Gama

Process Mining 1

(a; {A = 3000;R = Michael; E = Pete}); (b; {V = OK;E = Sue}); (c; {I = 530;D = OK;E = Sue}); (f; {E = Pete}); Example: A Credit Institute PAGE 3 For such a credit amount, should be interest <450 «Sue» not authorized to perform b: is not Assistant Activity h hasn’t been executed: D cannot be OK (a; {A = 3000;R = Michael; E = Pete}); (b; {V = OK;E = Pete}); (c; {I = 530;D = OK;E = Sue}); (d, {I = 599; D = NOK; E = Sue}); (f; {E = Pete}); (a; {A = 3000;R = Michael; E = Pete}); (b; {V = OK;E = Pete}); (c; {I = 530;D = OK;E = Sue}); (d, {I = 599; D = NOK; E = Sue}); (f; {E = Pete}); (a; {A = 5001;R = Michael; E = Pete}); (b; {V = OK;E = Pete}); (c; {I = 530;D = NOK;E = Sue}); (f; {E = Pete}); (a; {A = 5001;R = Michael; E = Pete}); (b; {V = OK;E = Pete}); (c; {I = 530;D = NOK;E = Sue}); (f; {E = Pete}); Activity d should have occurred, since amount<5000

Conformance General Idea 4 Process Traces Log trace Nonconformity

Alignments Moves in both with incorrect write operations Move in log Move in process

Cost of alignments Each move is associated with a cost Cost of alignment is the sum of the costs of its moves : Cost of reading/writing a wrong value : Cost of “move on log” : Cost of not writing or reading a variable : Cost of “move on model” 2 2

Cost of alignments: some examples 8 10 An optimal alignment: an alignment with the lowest cost

Finding an optimal alignment Undecidable in the general case. If guards are restricted to be linear (in)equations, finding an optimal alignments is Decidable BUT Double Exponential on the size of the model, i.e. the number of activities and data variables. M. de Leoni, W. M. P. van der Aalst "Aligning Event Logs and Process Models for Multi-Perspective Conformance Checking: An Approach Based on Integer Linear Programming“. BPM 2013 F. Mannhardt, M. de Leoni, H. Reijers, W. M. P. van der Aalst. “Balanced Multi-Perspective Checking of Process Conformance”. Software Computing, Springer (Under Review). Also available as BPM Center Report BPM-14-07, BPMcenter.org, 2014.

Finding an optimal alignment: a divide-et-impera approach Beneficial since the problem is exponential!! t1 t2 t3 t4 t6 t5 t1 t2 t3 t4 t6 t5 Decomposed Perfectly Fitting Checking: A model/log is perfectly fitting if and only if all the components are perfectly fitting

Petri Net with Data : Variables and Read/Write Operations Variables Write Operations Read Operations

Each transition is associated with all valid bindings PAGE 11 TransitionGuard Credit Request -- Verify 0.1 * r(A) < w(I) < 0.2 * r(A) Assessment r(V) = true Register Negative Verification r(V) = false AND w(D) = false Inform Requester -- Register Loan Rejection r(D) = false Open Credit r(D) = true

Structural Decomposition 12

SESE (Single-Entry-Single-Exit) Decomposition 13 SESE: set of edges which graph has a Single Entry node and a Single Exit node Refined Process Structure Tree (RPST) containing non overlapping SESEs Unique Modular Linear Time <

SESE does not guarantee Decomposed Perfectly Fitting Checking / 1 Decomposed Perfectly Fitting Checking: A model/log is perfectly fitting if and only if all the components are perfectly fitting The problem is in the boundary places or variables No reflection on the log A partition with only transitions shared among components (neither places, nor variables, nor arcs) Transitions have reflection on the log

SESE does not guarantee Decomposed Perfectly Fitting Checking / 2 Create a ‘bridge’ for each shared place 15

Implementation Available in the package DataConformanceChecker

Experiments Generating different event logs with 5000 traces with a different average trace length This ensured by enforcing a larger number of credit renegotiations 20% of the transition firings are so as to not satisfy the guards

Example of the SESE-based Algorithm

Results: an exponential reduction of the computation time

Projection on the model #correct(t,DPN) = number of moves in both without incorrect write operations for t in the alignments between each log trace and DPN #total(t,DPN) = number of moves for t in the alignments of each log trace and DPN

Experiments with a real-life process Process enacted by a Dutch governmental agency to deal with unemployment benefits Checked the conformance against an event log consisting of 111 traces Process Model validated with process analysts of the agency Without Decomposition: seconds With Decomposition: seconds -99.9%

Conclusion Finding an alignment is exponential in the model size To speed the computation: 1.Decompose the model in submodels 2.Alignment each trace with each submodel The decomposition needs to be valid: Any trace is fitting the entire model if and only if it fits all smaller fragments.