The document describes techniques for simplifying process models mined from event logs to make them more readable and understandable for users. It involves unfolding the mined model based on the event log to represent concurrency explicitly, then refolding and merging equivalent nodes. Implied places that do not restrict behavior can be removed. The resulting model has less complexity but the same behavior as the original model. Experimental results on benchmark logs show the techniques can significantly reduce model complexity while maintaining precision.
Repairing Process Models to Match RealityDirk Fahland
The document discusses repairing process models to improve conformance to event logs. It presents an approach for repairing models that involves aligning the log and model, identifying sublogs of events that cannot be replayed, and using these to add optional/remove activities or add subprocesses to the model. The approach was implemented in ProM and evaluated on a case study, showing it can effectively repair models while maintaining a low distance to the original model.
Business Process Configuration in the Cloud: How to Support and Analyze Multi...Wil van der Aalst
Process mining can help analyze multi-tenant processes in the cloud in three key ways:
1) It allows for cross-organizational process mining by analyzing event logs from different organizations using cloud-based systems.
2) It supports the use of configurable process models to deal with process variability across organizations and account for different configurations in the cloud.
3) Process mining techniques like discovery, conformance checking, and extension can provide insights into processes and configurations in the cloud to detect deviations, bottlenecks, and suggest improvements.
Distributed Process Discovery and Conformance CheckingWil van der Aalst
The document discusses process discovery and conformance checking. It begins with an introduction to different roles of process models and examples of process discovery on real event logs. It then covers topics like replay, conformance checking, and analyzing models based on criteria like fitness and simplicity. Process discovery algorithms discussed include state-based regions and language-based regions approaches. The document explains how conformance checking involves replaying traces and calculating alignments between event logs and models.
Process Mining: Understanding and Improving Desire Lines in Big DataWil van der Aalst
We are pleased to announce the lecture: “Process Mining: Understanding and Improving Desire Lines in Big Data”
in honour of doctor honoris causa Wil van der Aalst.
Wednesday May 30th - 10.00 a.m. - 12 a.m.,
Hasselt University, campus Diepenbeek (Agoralaan, building D) - auditorium H5
The Faculty of Business Economics of Hasselt University is pleased to invite you to the lecture
“Process Mining: Understanding and Improving Desire Lines in Big Data”.
This lecture is organised to honour prof. dr. Wil van der Aalst, on whom the degree of ‘doctor honoris causa’ will be conferred by Hasselt University, Faculty of Business Economics (promotor prof. Koen Vanhoof). Professor van der Aalst is a full professor of Information Systems at the Technische Universiteit Eindhoven (TU/e). Currently he is also an adjunct professor at Queensland University of Technology (QUT).His research interests include workflow management, process mining, Petri nets, business process management, process modeling, and process analysis. Many of his ideas have influenced researchers, software developers and standardization committees working on process support.
Process Mining - Chapter 12 - Analyzing Spaghetti ProcessesWil van der Aalst
Slides supporting the book "Process Mining: Discovery, Conformance, and Enhancement of Business Processes" by Wil van der Aalst. See also http://springer.com/978-3-642-19344-6 (ISBN 978-3-642-19344-6) and the website http://www.processmining.org/book/start providing sample logs.
Slides supporting the book "Process Mining: Discovery, Conformance, and Enhancement of Business Processes" by Wil van der Aalst. See also http://springer.com/978-3-642-19344-6 (ISBN 978-3-642-19344-6) and the website http://www.processmining.org/book/start providing sample logs.
The document discusses threads and multithreading. It covers thread models like many-to-one, one-to-one, and many-to-many. It also discusses different types of threads like user threads and kernel threads. Finally, it summarizes common thread libraries like Pthreads, Windows threads, and Java threads.
Dokumen ini menganalisis dan menerapkan algoritma process mining Alpha, Alpha+, dan Alpha++ untuk merekonstruksi proses bisnis dari log event yang ada. Implementasi dilakukan secara manual dan menggunakan perangkat lunak ProM. Algoritma Alpha++ mampu mendeteksi ketergantungan implisit yang tidak dapat dideteksi algoritma Alpha dan Alpha+."
Repairing Process Models to Match RealityDirk Fahland
The document discusses repairing process models to improve conformance to event logs. It presents an approach for repairing models that involves aligning the log and model, identifying sublogs of events that cannot be replayed, and using these to add optional/remove activities or add subprocesses to the model. The approach was implemented in ProM and evaluated on a case study, showing it can effectively repair models while maintaining a low distance to the original model.
Business Process Configuration in the Cloud: How to Support and Analyze Multi...Wil van der Aalst
Process mining can help analyze multi-tenant processes in the cloud in three key ways:
1) It allows for cross-organizational process mining by analyzing event logs from different organizations using cloud-based systems.
2) It supports the use of configurable process models to deal with process variability across organizations and account for different configurations in the cloud.
3) Process mining techniques like discovery, conformance checking, and extension can provide insights into processes and configurations in the cloud to detect deviations, bottlenecks, and suggest improvements.
Distributed Process Discovery and Conformance CheckingWil van der Aalst
The document discusses process discovery and conformance checking. It begins with an introduction to different roles of process models and examples of process discovery on real event logs. It then covers topics like replay, conformance checking, and analyzing models based on criteria like fitness and simplicity. Process discovery algorithms discussed include state-based regions and language-based regions approaches. The document explains how conformance checking involves replaying traces and calculating alignments between event logs and models.
Process Mining: Understanding and Improving Desire Lines in Big DataWil van der Aalst
We are pleased to announce the lecture: “Process Mining: Understanding and Improving Desire Lines in Big Data”
in honour of doctor honoris causa Wil van der Aalst.
Wednesday May 30th - 10.00 a.m. - 12 a.m.,
Hasselt University, campus Diepenbeek (Agoralaan, building D) - auditorium H5
The Faculty of Business Economics of Hasselt University is pleased to invite you to the lecture
“Process Mining: Understanding and Improving Desire Lines in Big Data”.
This lecture is organised to honour prof. dr. Wil van der Aalst, on whom the degree of ‘doctor honoris causa’ will be conferred by Hasselt University, Faculty of Business Economics (promotor prof. Koen Vanhoof). Professor van der Aalst is a full professor of Information Systems at the Technische Universiteit Eindhoven (TU/e). Currently he is also an adjunct professor at Queensland University of Technology (QUT).His research interests include workflow management, process mining, Petri nets, business process management, process modeling, and process analysis. Many of his ideas have influenced researchers, software developers and standardization committees working on process support.
Process Mining - Chapter 12 - Analyzing Spaghetti ProcessesWil van der Aalst
Slides supporting the book "Process Mining: Discovery, Conformance, and Enhancement of Business Processes" by Wil van der Aalst. See also http://springer.com/978-3-642-19344-6 (ISBN 978-3-642-19344-6) and the website http://www.processmining.org/book/start providing sample logs.
Slides supporting the book "Process Mining: Discovery, Conformance, and Enhancement of Business Processes" by Wil van der Aalst. See also http://springer.com/978-3-642-19344-6 (ISBN 978-3-642-19344-6) and the website http://www.processmining.org/book/start providing sample logs.
The document discusses threads and multithreading. It covers thread models like many-to-one, one-to-one, and many-to-many. It also discusses different types of threads like user threads and kernel threads. Finally, it summarizes common thread libraries like Pthreads, Windows threads, and Java threads.
Dokumen ini menganalisis dan menerapkan algoritma process mining Alpha, Alpha+, dan Alpha++ untuk merekonstruksi proses bisnis dari log event yang ada. Implementasi dilakukan secara manual dan menggunakan perangkat lunak ProM. Algoritma Alpha++ mampu mendeteksi ketergantungan implisit yang tidak dapat dideteksi algoritma Alpha dan Alpha+."
Process mining chapter_07_conformance_checkingMuhammad Ajmal
The document summarizes the key aspects and goals of conformance checking in process mining. Conformance checking involves replaying event logs on process models to detect deviations. It can identify problems like missing or remaining tokens, as well as extract timing information. Diagnostics from replay can detect non-conformance at the trace and log levels, and quantify differences to understand problems in detail. Conformance checking is important for auditing, compliance, and aligning systems and processes.
Process Mining - Chapter 8 - Mining Additional PerspectivesWil van der Aalst
Slides supporting the book "Process Mining: Discovery, Conformance, and Enhancement of Business Processes" by Wil van der Aalst. See also http://springer.com/978-3-642-19344-6 (ISBN 978-3-642-19344-6) and the website http://www.processmining.org/book/start providing sample logs.
Process mining chapter_08_mining_additional_perspectivesMuhammad Ajmal
This document discusses mining additional perspectives from event logs beyond the initial process model. It describes how event logs contain attributes relating to various perspectives like resources, time, cases, and costs. These additional attributes can be analyzed and visualized using techniques like social network analysis, resource behavior analysis, and decision mining to gain additional insights into the process. Classification techniques can also be applied to the event data to understand reasons for decisions, delays, or non-conformance in the process.
Process mining chapter_05_process_discoveryMuhammad Ajmal
The document discusses process discovery and introduces the α algorithm. It begins by defining key terms like process discovery, fitness, precision, generalization, and simplicity. It then walks through examples of event logs and the corresponding process models that could be discovered from them. The α algorithm is introduced and explained as a basic process discovery technique. Limitations of the α algorithm are also discussed, such as its inability to handle implicit places, loops, and non-local dependencies. The challenges of process discovery are summarized, including noise, incompleteness, and balancing between underfitting and overfitting models.
Slides supporting the book "Process Mining: Discovery, Conformance, and Enhancement of Business Processes" by Wil van der Aalst. See also http://springer.com/978-3-642-19344-6 (ISBN 978-3-642-19344-6) and the website http://www.processmining.org/book/start providing sample logs.
Process mining chapter_06_advanced_process_discovery_techniquesMuhammad Ajmal
The document discusses advanced process discovery techniques. It begins by describing the challenges of process discovery, including the need for models to be able to replay event logs while avoiding overfitting or underfitting the logs. It then provides examples of algorithmic techniques like the heuristic miner and genetic process mining. Region-based process mining is also introduced. The document discusses characteristics of different process discovery algorithms and provides examples to illustrate concepts like heuristic mining, genetic operations, and region-based mining.
Process Mining - Chapter 6 - Advanced Process Discovery_techniquesWil van der Aalst
Slides supporting the book "Process Mining: Discovery, Conformance, and Enhancement of Business Processes" by Wil van der Aalst. See also http://springer.com/978-3-642-19344-6 (ISBN 978-3-642-19344-6) and the website http://www.processmining.org/book/start providing sample logs.
This slide tells you how to measure precision between process model and its recorded execution. Presented at BPI 2012, Tallinn, Estonia, by Arya Adriansyah. The technique is implemented in ProM 6.x, package ETConformance (see http://processmining.org).
Discovering Petri Nets: Evidence-Based Business Process ManagementWil van der Aalst
The document discusses process mining and the discovery of process models from event logs. It provides examples of simple process models that could be discovered from an event log containing traces of a request handling process. The models range from very simple models that underfit the data to very complex models that overfit the data. An ideal model balances fitness, precision, generalization, and simplicity. The document uses these examples to illustrate challenges in process discovery like avoiding underfitting or overfitting the event log.
Object-Centric Processes - from cases to objects and relations… and beyondDirk Fahland
Through this tutorial-style presentation, I want to broaden the uptake of object-centric process mining in research and in practice. It introduces to the concept of object-centric processes, and highlights the core thinking and concepts that underly object-centric processes and explain what makes them effective in analyzing complex real-world processes.
The first part of the talk looks back at key ideas from academic research that led to object-centric process mining.
The second part first explains the basic ideas and techniques of object-centric process mining and the new kinds of process analysis that are enabled by it. We then take a look under the hood of object-centric process mining and look at the key data structures and operations that make it work.
In the third part, we show how these key ideas work for use cases that go far beyond object-centric process mining.
The talk gives pointers to ready-to-use Python libraries and public datasets and tutorials so that you can directly start doing research, development, and analysis in an object-centric approach.
Slides of the tutorial on Multi-Dimensional Process Analysis shown at the BPM 2022 conference in Muenster, Germany.
Processes are complex phenomena that emerge from the interplay of human actors, materials, data, and machines. Process science develops effective methods and techniques for studying and improving processes. The BPM field has developed mature methods and techniques for studying and improving process executions from the control-flow perspective, and the limitations of control-flow focused thinking are well-known. Current research explores concepts from related disciplines to study behavioral phenomena “beyond” control-flow. However, it remains challenging to relate models and concepts of other behavioral phenomena to the dominant control-flow oriented paradigm.
This tutorial introduces several recently developed simple models that naturally describe behavior beyond control-flow, but are inherently compatible with control-flow oriented thinking. We discuss the Performance Spectrum to study performance patterns and their propagation over time, Event Knowledge Graphs to study networks of behavior over data objects and actors, and Proclets as a formal model for reasoning over control-flow, data object, queue and actor behavior. For each model, we discuss which phenomena can be studied, which insights can be gained, which tools are available, and to which other fields they relate.
https://doi.org/10.1007/978-3-031-16103-2_3
Artifacts and Databases - the Need for Event Relation Graphs and Synchronous ...Dirk Fahland
This was a work-in progress presentation given in Nov 2010 (uploaded here for historic records). It was part of the ACSI EU project for process mining over processes with multiple objects. The slides discuss an example of an order process over multiple objects and propose how to model this data in a graph (event relation graph) that is stored in a database and supported by a relational algebra over behavior (e.g. to join event traces of multiple objects into a case). The final part of the presentation discusses the synchronous proclet model ultimately formalized in https://doi.org/10.1007/978-3-030-21571-2_1
Describing, Discovering, and Understanding Multi-Dimensional ProcessesDirk Fahland
Processes are a key application area for formal models of concurrency. The most adopted model-driven techniques are centered around
describing and analyzing the control-flow of a well-structured process instance in isolation - within this single dimension one could argue the case to be "solved".
Unaddressed challenges in modeling and analysis arise where processes are not well-structured or not isolated from each other. In both cases a single process model can no longer adequately describe process behavior.
Taking recorded event data from such processes as a starting point, I will outline and develop a number of challenges and characteristics of such processes that can be observed in practice. I will discuss how the
behavior of such processes can be classified along different dimensions and outline a few fundamental concepts that complement concepts from Petri nets and allow to adequately describe behavior of
such processes.
Process Mining: Past, Present, and Open Challenges (AIST 2017 Keynote)Dirk Fahland
Since the first algorithms for automatically discovering process models from event logs have been proposed in the late 1990ies the problem of obtaining insights into processes by mining from event logs gained growing attention. By now, the field has grown into a maturing discipline and industry has begun adopting process mining in regular operations, supported by several commercial process mining solutions are available on the market.
In the early days of process mining, several algorithms for constructively discovering a process model from an event log were proposed, each algorithm pursuing unique principles for constructing a model. This first generation of process discovery techniques, which includes for instance the alpha-algorithm, paved the ground for process mining as research discipline. As these algorithms were applied in practice, new research challenges showed up, sparking new results in both pre-processing event data and evaluating process models on event logs. In particular the latter deepened the understanding of the challenges in process mining and established a reliable feedback mechanism in process mining in the form of conformance checking. This feedback mechanism enabled researching a second generation of process mining techniques addressing a large variety of problems such as quality guarantees for discovered models, including the data perspective in discovered models, or discovering temporal logic constraints. In particular, the inductive miner family was seen as a new milestone as it provided a systematic way to develop process discovery algorithms with reliable results. Yet again, as these more capable techniques are being applied to the growing and more detailed event data recorded in practice, further unsolved challenges arise.
In the first part of my talk I will draw an arc from the early days of process mining to the current state of the art in process mining – highlighting central techniques and their impact on later developments. In the second part of my talk, I will then turn to what kinds of event data and challenges are being found in practice today, how existing process mining techniques fail to address them, and thus which open challenges and opportunities the process mining field offers also for researchers from other domains.
Where did I go wrong? Explaining errors in process modelsDirk Fahland
This presentation shows how to reduce diagnostic information returned by general purpose model checkers (counter example paths) to essential parts that help understanding the error. The presentation has been given at the 12th International Conference on Business Process Management (BPM'14), September 2014 in Eindhoven.
Mining Branch-Time Scenarios From Execution LogsDirk Fahland
This presentation was given at the International Conference on Automated Software Engineering (ASE 2013) in Palo Alto, November 2013.
We describe a technique for automatically extracting specifications from execution traces of an application. The particular specification that we extract are scenarios in the form of conditional existential Live-Sequence Charts (LSC), which are similar to UML Sequence Diagrams.
The technique is implemented in a tool and was evaluated on two real-life event logs.
From Live Sequence Chart Specifications to Distributed ComponentsDirk Fahland
This document proposes a method to synthesize a decentralized system from a specification of Live Sequence Charts (LSCs). It introduces distributed LSCs (dLSCs) which use partial orders and local states instead of global states. A two-step process first synthesizes a Petri net structure from LSC main charts, then adds guards to tokens based on LSC precharts. This extracts autonomous components while preserving behaviors. A prototype tool demonstrates the approach on an emergency management example. Future work includes code generation and increasing dLSC expressiveness.
LSC Revisited - From Scenarios to Distributed ComponentsDirk Fahland
Scenario-based techniques such as Message Sequence Charts
(MSC) and Live Sequence Charts (LSC) are a technique to specify
behavior of complex, distributed systems in an intuitive manner,
particularly at early stages of system design. Despite its intuitive
nature, the technique poses some challenges. The most prominent is to
automatically synthesize an operational system model (a statechart or
a Petri net) from a given specification; the model can then serve as a
blue print for implementation in hard- and software. While MSC are
essentially too weak to specify complex systems, LSCs are too strong:
synthesis of components of a distributed system fails.
In my talk, I will reconsider the semantics of LSC-style scenarios
regarding expressive power, ability to specify distributed behaviors
and solving the synthesis problem. I will show that by changing the
interpretation of LSC from linear time to simple branching time
semantics, one obtains a simple, yet very expressive and intuitive
scenario-based specification language. By choosing partial orders
instead of sequential runs as semantic domain, one can faithfully
specify the behaviors of a distributed system. We call this notation
distributed LSC (dLSC). As the main result, I will present a complete
technique for synthesizing Petri net components from any given dLSC
specification, in polynomial time.
Remote seminar talk held in the Advanced Software Tools Research Seminar of S. Maoz and A. Yehudai at Tel Aviv University, January 7, 2013.
This talk was given by Dirk Fahland and Hajo A. Reijers at the BPM Roundtable at TU Eindhoven in July 2011. We presented first insights into how people model and the modeling outcome.
Behavioral Conformance of Artifact-Centric Process ModelsDirk Fahland
A talk help by Boudewijn van Dongen at the 14th International Conference on Business Information Systems (BIS 2011) in Poznan, Poland, June 2011. We present the problem of checking whether an artifact-centric process model conforms to process behavior observed in reality.
Many-to-Many: Interactions in Artifact-Centric ChoreographiesDirk Fahland
A talk given by Dirk Fahland at the 3rd Central European Workshop on Services and their Composition (ZEUS'11) in Karlsruhe, February 22, 2011. The talk explains behavioral phenomena in services choreographies where several service instances interact with each other.
Process mining chapter_07_conformance_checkingMuhammad Ajmal
The document summarizes the key aspects and goals of conformance checking in process mining. Conformance checking involves replaying event logs on process models to detect deviations. It can identify problems like missing or remaining tokens, as well as extract timing information. Diagnostics from replay can detect non-conformance at the trace and log levels, and quantify differences to understand problems in detail. Conformance checking is important for auditing, compliance, and aligning systems and processes.
Process Mining - Chapter 8 - Mining Additional PerspectivesWil van der Aalst
Slides supporting the book "Process Mining: Discovery, Conformance, and Enhancement of Business Processes" by Wil van der Aalst. See also http://springer.com/978-3-642-19344-6 (ISBN 978-3-642-19344-6) and the website http://www.processmining.org/book/start providing sample logs.
Process mining chapter_08_mining_additional_perspectivesMuhammad Ajmal
This document discusses mining additional perspectives from event logs beyond the initial process model. It describes how event logs contain attributes relating to various perspectives like resources, time, cases, and costs. These additional attributes can be analyzed and visualized using techniques like social network analysis, resource behavior analysis, and decision mining to gain additional insights into the process. Classification techniques can also be applied to the event data to understand reasons for decisions, delays, or non-conformance in the process.
Process mining chapter_05_process_discoveryMuhammad Ajmal
The document discusses process discovery and introduces the α algorithm. It begins by defining key terms like process discovery, fitness, precision, generalization, and simplicity. It then walks through examples of event logs and the corresponding process models that could be discovered from them. The α algorithm is introduced and explained as a basic process discovery technique. Limitations of the α algorithm are also discussed, such as its inability to handle implicit places, loops, and non-local dependencies. The challenges of process discovery are summarized, including noise, incompleteness, and balancing between underfitting and overfitting models.
Slides supporting the book "Process Mining: Discovery, Conformance, and Enhancement of Business Processes" by Wil van der Aalst. See also http://springer.com/978-3-642-19344-6 (ISBN 978-3-642-19344-6) and the website http://www.processmining.org/book/start providing sample logs.
Process mining chapter_06_advanced_process_discovery_techniquesMuhammad Ajmal
The document discusses advanced process discovery techniques. It begins by describing the challenges of process discovery, including the need for models to be able to replay event logs while avoiding overfitting or underfitting the logs. It then provides examples of algorithmic techniques like the heuristic miner and genetic process mining. Region-based process mining is also introduced. The document discusses characteristics of different process discovery algorithms and provides examples to illustrate concepts like heuristic mining, genetic operations, and region-based mining.
Process Mining - Chapter 6 - Advanced Process Discovery_techniquesWil van der Aalst
Slides supporting the book "Process Mining: Discovery, Conformance, and Enhancement of Business Processes" by Wil van der Aalst. See also http://springer.com/978-3-642-19344-6 (ISBN 978-3-642-19344-6) and the website http://www.processmining.org/book/start providing sample logs.
This slide tells you how to measure precision between process model and its recorded execution. Presented at BPI 2012, Tallinn, Estonia, by Arya Adriansyah. The technique is implemented in ProM 6.x, package ETConformance (see http://processmining.org).
Discovering Petri Nets: Evidence-Based Business Process ManagementWil van der Aalst
The document discusses process mining and the discovery of process models from event logs. It provides examples of simple process models that could be discovered from an event log containing traces of a request handling process. The models range from very simple models that underfit the data to very complex models that overfit the data. An ideal model balances fitness, precision, generalization, and simplicity. The document uses these examples to illustrate challenges in process discovery like avoiding underfitting or overfitting the event log.
Object-Centric Processes - from cases to objects and relations… and beyondDirk Fahland
Through this tutorial-style presentation, I want to broaden the uptake of object-centric process mining in research and in practice. It introduces to the concept of object-centric processes, and highlights the core thinking and concepts that underly object-centric processes and explain what makes them effective in analyzing complex real-world processes.
The first part of the talk looks back at key ideas from academic research that led to object-centric process mining.
The second part first explains the basic ideas and techniques of object-centric process mining and the new kinds of process analysis that are enabled by it. We then take a look under the hood of object-centric process mining and look at the key data structures and operations that make it work.
In the third part, we show how these key ideas work for use cases that go far beyond object-centric process mining.
The talk gives pointers to ready-to-use Python libraries and public datasets and tutorials so that you can directly start doing research, development, and analysis in an object-centric approach.
Slides of the tutorial on Multi-Dimensional Process Analysis shown at the BPM 2022 conference in Muenster, Germany.
Processes are complex phenomena that emerge from the interplay of human actors, materials, data, and machines. Process science develops effective methods and techniques for studying and improving processes. The BPM field has developed mature methods and techniques for studying and improving process executions from the control-flow perspective, and the limitations of control-flow focused thinking are well-known. Current research explores concepts from related disciplines to study behavioral phenomena “beyond” control-flow. However, it remains challenging to relate models and concepts of other behavioral phenomena to the dominant control-flow oriented paradigm.
This tutorial introduces several recently developed simple models that naturally describe behavior beyond control-flow, but are inherently compatible with control-flow oriented thinking. We discuss the Performance Spectrum to study performance patterns and their propagation over time, Event Knowledge Graphs to study networks of behavior over data objects and actors, and Proclets as a formal model for reasoning over control-flow, data object, queue and actor behavior. For each model, we discuss which phenomena can be studied, which insights can be gained, which tools are available, and to which other fields they relate.
https://doi.org/10.1007/978-3-031-16103-2_3
Artifacts and Databases - the Need for Event Relation Graphs and Synchronous ...Dirk Fahland
This was a work-in progress presentation given in Nov 2010 (uploaded here for historic records). It was part of the ACSI EU project for process mining over processes with multiple objects. The slides discuss an example of an order process over multiple objects and propose how to model this data in a graph (event relation graph) that is stored in a database and supported by a relational algebra over behavior (e.g. to join event traces of multiple objects into a case). The final part of the presentation discusses the synchronous proclet model ultimately formalized in https://doi.org/10.1007/978-3-030-21571-2_1
Describing, Discovering, and Understanding Multi-Dimensional ProcessesDirk Fahland
Processes are a key application area for formal models of concurrency. The most adopted model-driven techniques are centered around
describing and analyzing the control-flow of a well-structured process instance in isolation - within this single dimension one could argue the case to be "solved".
Unaddressed challenges in modeling and analysis arise where processes are not well-structured or not isolated from each other. In both cases a single process model can no longer adequately describe process behavior.
Taking recorded event data from such processes as a starting point, I will outline and develop a number of challenges and characteristics of such processes that can be observed in practice. I will discuss how the
behavior of such processes can be classified along different dimensions and outline a few fundamental concepts that complement concepts from Petri nets and allow to adequately describe behavior of
such processes.
Process Mining: Past, Present, and Open Challenges (AIST 2017 Keynote)Dirk Fahland
Since the first algorithms for automatically discovering process models from event logs have been proposed in the late 1990ies the problem of obtaining insights into processes by mining from event logs gained growing attention. By now, the field has grown into a maturing discipline and industry has begun adopting process mining in regular operations, supported by several commercial process mining solutions are available on the market.
In the early days of process mining, several algorithms for constructively discovering a process model from an event log were proposed, each algorithm pursuing unique principles for constructing a model. This first generation of process discovery techniques, which includes for instance the alpha-algorithm, paved the ground for process mining as research discipline. As these algorithms were applied in practice, new research challenges showed up, sparking new results in both pre-processing event data and evaluating process models on event logs. In particular the latter deepened the understanding of the challenges in process mining and established a reliable feedback mechanism in process mining in the form of conformance checking. This feedback mechanism enabled researching a second generation of process mining techniques addressing a large variety of problems such as quality guarantees for discovered models, including the data perspective in discovered models, or discovering temporal logic constraints. In particular, the inductive miner family was seen as a new milestone as it provided a systematic way to develop process discovery algorithms with reliable results. Yet again, as these more capable techniques are being applied to the growing and more detailed event data recorded in practice, further unsolved challenges arise.
In the first part of my talk I will draw an arc from the early days of process mining to the current state of the art in process mining – highlighting central techniques and their impact on later developments. In the second part of my talk, I will then turn to what kinds of event data and challenges are being found in practice today, how existing process mining techniques fail to address them, and thus which open challenges and opportunities the process mining field offers also for researchers from other domains.
Where did I go wrong? Explaining errors in process modelsDirk Fahland
This presentation shows how to reduce diagnostic information returned by general purpose model checkers (counter example paths) to essential parts that help understanding the error. The presentation has been given at the 12th International Conference on Business Process Management (BPM'14), September 2014 in Eindhoven.
Mining Branch-Time Scenarios From Execution LogsDirk Fahland
This presentation was given at the International Conference on Automated Software Engineering (ASE 2013) in Palo Alto, November 2013.
We describe a technique for automatically extracting specifications from execution traces of an application. The particular specification that we extract are scenarios in the form of conditional existential Live-Sequence Charts (LSC), which are similar to UML Sequence Diagrams.
The technique is implemented in a tool and was evaluated on two real-life event logs.
From Live Sequence Chart Specifications to Distributed ComponentsDirk Fahland
This document proposes a method to synthesize a decentralized system from a specification of Live Sequence Charts (LSCs). It introduces distributed LSCs (dLSCs) which use partial orders and local states instead of global states. A two-step process first synthesizes a Petri net structure from LSC main charts, then adds guards to tokens based on LSC precharts. This extracts autonomous components while preserving behaviors. A prototype tool demonstrates the approach on an emergency management example. Future work includes code generation and increasing dLSC expressiveness.
LSC Revisited - From Scenarios to Distributed ComponentsDirk Fahland
Scenario-based techniques such as Message Sequence Charts
(MSC) and Live Sequence Charts (LSC) are a technique to specify
behavior of complex, distributed systems in an intuitive manner,
particularly at early stages of system design. Despite its intuitive
nature, the technique poses some challenges. The most prominent is to
automatically synthesize an operational system model (a statechart or
a Petri net) from a given specification; the model can then serve as a
blue print for implementation in hard- and software. While MSC are
essentially too weak to specify complex systems, LSCs are too strong:
synthesis of components of a distributed system fails.
In my talk, I will reconsider the semantics of LSC-style scenarios
regarding expressive power, ability to specify distributed behaviors
and solving the synthesis problem. I will show that by changing the
interpretation of LSC from linear time to simple branching time
semantics, one obtains a simple, yet very expressive and intuitive
scenario-based specification language. By choosing partial orders
instead of sequential runs as semantic domain, one can faithfully
specify the behaviors of a distributed system. We call this notation
distributed LSC (dLSC). As the main result, I will present a complete
technique for synthesizing Petri net components from any given dLSC
specification, in polynomial time.
Remote seminar talk held in the Advanced Software Tools Research Seminar of S. Maoz and A. Yehudai at Tel Aviv University, January 7, 2013.
This talk was given by Dirk Fahland and Hajo A. Reijers at the BPM Roundtable at TU Eindhoven in July 2011. We presented first insights into how people model and the modeling outcome.
Behavioral Conformance of Artifact-Centric Process ModelsDirk Fahland
A talk help by Boudewijn van Dongen at the 14th International Conference on Business Information Systems (BIS 2011) in Poznan, Poland, June 2011. We present the problem of checking whether an artifact-centric process model conforms to process behavior observed in reality.
Many-to-Many: Interactions in Artifact-Centric ChoreographiesDirk Fahland
A talk given by Dirk Fahland at the 3rd Central European Workshop on Services and their Composition (ZEUS'11) in Karlsruhe, February 22, 2011. The talk explains behavioral phenomena in services choreographies where several service instances interact with each other.
Artifacts - Processes with Multiple InstancesDirk Fahland
How Artifacts allow to describe processes where multiple instances of data objects interact with each other. A talk given by Dirk Fahland in the group of David Harel at the Weizmann Institute of Science.
SATTA MATKA DPBOSS KALYAN MATKA RESULTS KALYAN CHART KALYAN MATKA MATKA RESULT KALYAN MATKA TIPS SATTA MATKA MATKA COM MATKA PANA JODI TODAY BATTA SATKA MATKA PATTI JODI NUMBER MATKA RESULTS MATKA CHART MATKA JODI SATTA COM INDIA SATTA MATKA MATKA TIPS MATKA WAPKA ALL MATKA RESULT LIVE ONLINE MATKA RESULT KALYAN MATKA RESULT DPBOSS MATKA 143 MAIN MATKA KALYAN MATKA RESULTS KALYAN CHART
Adani Group's Active Interest In Increasing Its Presence in the Cement Manufa...Adani case
Time and again, the business group has taken up new business ventures, each of which has allowed it to expand its horizons further and reach new heights. Even amidst the Adani CBI Investigation, the firm has always focused on improving its cement business.
SATTA MATKA DPBOSS KALYAN MATKA RESULTS KALYAN CHART KALYAN MATKA MATKA RESULT KALYAN MATKA TIPS SATTA MATKA MATKA COM MATKA PANA JODI TODAY BATTA SATKA MATKA PATTI JODI NUMBER MATKA RESULTS MATKA CHART MATKA JODI SATTA COM INDIA SATTA MATKA MATKA TIPS MATKA WAPKA ALL MATKA RESULT LIVE ONLINE MATKA RESULT KALYAN MATKA RESULT DPBOSS MATKA 143 MAIN MATKA KALYAN MATKA RESULTS KALYAN CHART INDIA MATKA KALYAN SATTA MATKA 420 INDIAN MATKA SATTA KING MATKA FIX JODI FIX FIX FIX SATTA NAMBAR MATKA INDIA SATTA BATTA
Efficient PHP Development Solutions for Dynamic Web ApplicationsHarwinder Singh
Unlock the full potential of your web projects with our expert PHP development solutions. From robust backend systems to dynamic front-end interfaces, we deliver scalable, secure, and high-performance applications tailored to your needs. Trust our skilled team to transform your ideas into reality with custom PHP programming, ensuring seamless functionality and a superior user experience.
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Final ank Satta Matka Dpbos Final ank Satta Matta Matka 143 Kalyan Matka Guessing Final Matka Final ank Today Matka 420 Satta Batta Satta 143 Kalyan Chart Main Bazar Chart vip Matka Guessing Dpboss 143 Guessing Kalyan night
Best Competitive Marble Pricing in Dubai - ☎ 9928909666Stone Art Hub
Stone Art Hub offers the best competitive Marble Pricing in Dubai, ensuring affordability without compromising quality. With a wide range of exquisite marble options to choose from, you can enhance your spaces with elegance and sophistication. For inquiries or orders, contact us at ☎ 9928909666. Experience luxury at unbeatable prices.
The Role of White Label Bookkeeping Services in Supporting the Growth and Sca...YourLegal Accounting
Effective financial management is important for expansion and scalability in the ever-changing US business environment. White Label Bookkeeping services is an innovative solution that is becoming more and more popular among businesses. These services provide a special method for managing financial duties effectively, freeing up companies to concentrate on their main operations and growth plans. We’ll look at how White Label Bookkeeping can help US firms expand and develop in this blog.
The Steadfast and Reliable Bull: Taurus Zodiac Signmy Pandit
Explore the steadfast and reliable nature of the Taurus Zodiac Sign. Discover the personality traits, key dates, and horoscope insights that define the determined and practical Taurus, and learn how their grounded nature makes them the anchor of the zodiac.
SATTA MATKA DPBOSS KALYAN MATKA RESULTS KALYAN CHART KALYAN MATKA MATKA RESULT KALYAN MATKA TIPS SATTA MATKA MATKA COM MATKA PANA JODI TODAY BATTA SATKA MATKA PATTI JODI NUMBER MATKA RESULTS MATKA CHART MATKA JODI SATTA COM INDIA SATTA MATKA MATKA TIPS MATKA WAPKA ALL MATKA RESULT LIVE ONLINE MATKA RESULT KALYAN MATKA RESULT DPBOSS MATKA 143 MAIN MATKA KALYAN MATKA RESULTS KALYAN CHART
Prescriptive analytics BA4206 Anna University PPTFreelance
Business analysis - Prescriptive analytics Introduction to Prescriptive analytics
Prescriptive Modeling
Non Linear Optimization
Demonstrating Business Performance Improvement
During the budget session of 2024-25, the finance minister, Nirmala Sitharaman, introduced the “solar Rooftop scheme,” also known as “PM Surya Ghar Muft Bijli Yojana.” It is a subsidy offered to those who wish to put up solar panels in their homes using domestic power systems. Additionally, adopting photovoltaic technology at home allows you to lower your monthly electricity expenses. Today in this blog we will talk all about what is the PM Surya Ghar Muft Bijli Yojana. How does it work? Who is eligible for this yojana and all the other things related to this scheme?
3. Process Mining, Currently
readable
event process mining process process
log algorithm model model
PAGE 2
4. Post-Process the Model
readable
event process mining process
simplify process
log algorithm model model
can replay the entire log introduce:
post-processing can replay
operations on the the entire log
mined model
PAGE 3
5. …Based on Original Event Log
process mining process
algorithm model readable
event simplify process
log model
can replay the entire log introduce:
post-processing can replay
operations on the the entire log
mined model
PAGE 4
6. Analysis
process mining process
algorithm model readable
event simplify process
log model
discover ordering relations
infer behavior
behavior
observed executions generalized behavior
incomplete knowledge
PAGE 5
7. Idea: Re-Adjust Generalization
process mining process
algorithm model readable
event simplify process
log model
unfold model wrt. log
model
complexity
fold, simplify,
generalize
behavior
log
PAGE 6
9. Unfold Model wrt. a Log
A
ABDA
ABCBDA
ABCBC
log C B
D
mined
process model
PAGE 8
10. Unfold Model wrt. a Log
unfold
A
A
ABDA
ABCBDA
B ABCBC
log C B
D
A D
mined
process model
PAGE 9
11. Unfold Model wrt. a Log
unfold
A
A
ABDA
ABCBDA
B ABCBC
log C B
C D
B A D
mined
D
process model
A
PAGE 10
12. Unfold Model wrt. a Log
unfold
A
A
ABDA
ABCBDA
B ABCBC
log C B
C D
B A D
mined
D
process model
C
A
PAGE 11
13. Unfold Model wrt. a Log
unfold
A
A
ABDA
ABCBDA
B ABCBC
log C B
C D
B A D
mined
D B
process model
C
B A
unfolding
wrt. the log PAGE 12
14. Represents Concurrency
unfold
A
A
AEBDA
ABECBDA
B E ABCBC
log C B E
C D
B A D
mined
D
process model
C
A
unfolding
wrt. the log PAGE 13
15. Represents Concurrency
A
AEBDA
ABECBDA
B E ABCBC
log
C D
• is a process model
B A • contains only behavior in the log
• is acyclic
C D
• represents concurrency explicitly
• labeled
(several tasks with same label)
A
unfolding
wrt. the log PAGE 14
16. Represents Concurrency
A
AEBDA
ABECBDA
B E ABCBC
log
C D
unfold
B A
fold,
simplify,
C D
generalize
A
unfolding
wrt. the log PAGE 15
17. Fold an unfolded model
A
merge equivalent nodes
B E necessary condition on
equivalent transitions
C D • same label
B A
C D
A
PAGE 16
18. Fold an unfolded model
A
merge equivalent nodes
B E necessary condition on
equivalent transitions
C D • same label
• equivalent pre-/post-places
B A
C D
A
PAGE 17
19. Fold an unfolded model
A
merge equivalent nodes
B E necessary condition on
equivalent transitions
C D • same label
• equivalent pre-/post-places
B A
various equivalences possible
(see paper for some)
C D
A
PAGE 18
20. Fold an unfolded model
A
merge equivalent nodes
B E
A
C D
C B E
B A
D
C D
A A
PAGE 19
21. Unfolding and Refolding
unfold
A
fold
A
C B E
C B E
D
D
refolded vs. original model
• less behavior
(replays the log and more)
A
• simpler structure
PAGE 20
22. Next: Simplifying and Generalizing
readable
process
simplify
simplify process
model
model
unfold
complexity
fold
simplify,
generalize
behavior
log
PAGE 21
23. Implied Places
A
implied place
• does not restrict transitions
B fold
A
remove from folded model
C D • simpler model
C B • same behavior
B A
D
various techniques to find
C D implied places
A A
PAGE 22
24. Special: Implied Places and Folding
A A
p p
A
B C D C p
fold
D B C
unfolding wrt. log
folding may merge implied and non-implied places
remove p: simpler model,
more behavior (generalization)
let user decide
PAGE 23
25. Configurable Simplification
readable
process
simplify
simplify process
model
model
unfold
complexity
fold
configurable
simplify,
generalize
behavior
log
PAGE 24
31. Experimental Results
precision: traces allowed by model and not in log
1.0 = only log behavior allowed
rises/falls within limits (can be controlled)
PAGE 30
34. Lessons Learned
techniques to navigate the model/behavior space
use model and log together
use model unfoldings
break a rule and see what happens
unfold
model
complexity
fold
simplify,
generalize
behavior
log
PAGE 33
35. And next?
process mining process
algorithm model readable
event simplify process
log model
process views
most simple model covering 80% of the log
improve mining algorithms?
we showed: there is room for improvement
PAGE 34
36. Dirk Fahland
about.me/dirk.fahland
Simplifying
Mined Process Models