SlideShare a Scribd company logo
1 of 51
User-Guided Discovery of 
Declarative Process Models 
Fabrizio Maria Maggi, Arjan Mooij, 
Wil van der Aalst
Environment with a lot of variability 
Department of Mathematics and Computer Science 23-09-14 PAGE 2
Environment with a lot of variability 
Department of Mathematics and Computer Science 23-09-14 PAGE 3
Environment with a lot of variability 
Department of Mathematics and Computer Science 23-09-14 PAGE 4
Environment with a lot of variability 
Department of Mathematics and Computer Science 23-09-14 PAGE 5
Environment with a lot of variability 
Department of Mathematics and Computer Science 23-09-14 PAGE 6
Discovery of Spaghetti-like models 
Department of Mathematics and Computer Science 23-09-14 PAGE 7
Discovery of Spaghetti-like models 
Department of Mathematics and Computer Science 23-09-14 PAGE 8
Declarative approaches 
Department of Mathematics and Computer Science 23-09-14 PAGE 9
Declarative process discovery 
• Avoid the discovery of spaghetti-like models 
• Traditional discovery techniques explicitly specify all 
possible behaviours (closed models) 
• Declarative process discovery: process behaviour 
described as a compact set of rules (open models) 
Department of Mathematics and Computer Science 23-09-14 PAGE 10
Declarative process discovery 
• Possibility to guide 
the discovery process 
towards specific 
properties of interest 
Department of Mathematics and Computer Science 23-09-14 PAGE 11
Declarative process discovery 
Department of Mathematics and Computer Science 23-09-14 PAGE 12
Declarative process discovery 
A is always 
eventually 
followed by 
B 
Department of Mathematics and Computer Science 23-09-14 PAGE 13
Declarative process discovery 
A is always 
eventually 
followed by 
B 
A or B 
always 
occur but 
never 
together 
Department of Mathematics and Computer Science 23-09-14 PAGE 14
Declarative process discovery 
A is always 
eventually 
followed by 
B 
A or B 
always 
occur but 
never 
together 
A and B 
never 
occur in 
sequence 
Department of Mathematics and Computer Science 23-09-14 PAGE 15
Declare 
• A is always eventually followed by B 
• RESPONSE 
• User-friendly graphical representation 
• Semantics specified through LTL (for finite 
traces) 
Department of Mathematics and Computer Science 23-09-14 PAGE 16
Core algorithm 
23-09-14 PAGE 17 
LOG
User-guided discovery 
Department of Mathematics and Computer Science 23-09-14 PAGE 18
Core algorithm 
• W = {(A C B C), (C B A C), (A C A C A C B)} 
Department of Mathematics and Computer Science 23-09-14 PAGE 19
Core algorithm 
• W = {(A C B C), (C B A C), (A C A C A C B)} 
Department of Mathematics and Computer Science 23-09-14 PAGE 20
Core algorithm 
• W = {(A C B C), (C B A C), (A C A C A C B)} 
Department of Mathematics and Computer Science 23-09-14 PAGE 21
Core algorithm 
• W = {(A C B C), (C B A C), (A C A C A C B)} 
Department of Mathematics and Computer Science 23-09-14 PAGE 22
Core algorithm 
• W = {(A C B C), (C B A C), (A C A C A C B)} 
Department of Mathematics and Computer Science 23-09-14 PAGE 23
Tuning the discovery process: PoE 
• Percentage of Events (PoE) avoids the discovery of less-relevant 
constraints referring to event classes which rarely 
occur in the log 
• This parameter has also a positive effect on the execution 
time of the algorithm 
Department of Mathematics and Computer Science 23-09-14 PAGE 24
PoE parameter 
• W = {(A C B C), (C B A C), (A C A C A C B)} 
Department of Mathematics and Computer Science 23-09-14 PAGE 25
PoE parameter 
• W = {(A C B C), (C B A C), (A C A C A C B)} 
− f(A) = 5/15 
− f(B) = 3/15 
− f(C) = 7/15 
Department of Mathematics and Computer Science 23-09-14 PAGE 26
PoE parameter 
• W = {(A C B C), (C B A C), (A C A C A C B)} 
− f(A) = 5/15 
− f(B) = 3/15 
− f(C) = 7/15 
Department of Mathematics and Computer Science 23-09-14 PAGE 27
PoE parameter 
• W = {(A C B C), (C B A C), (A C A C A C B)} 
− f(A) = 5/15 
− f(B) = 3/15 
− f(C) = 7/15 
Department of Mathematics and Computer Science 23-09-14 PAGE 28
PoE parameter 
• W = {(A C B C), (C B A C), (A C A C A C B)} 
− f(A) = 5/15 
− f(B) = 3/15 
− f(C) = 7/15 
Department of Mathematics and Computer Science 23-09-14 PAGE 29
Tuning the discovery process: PoI 
• Percentage of Instances (PoI) specifies that a constraint can 
still be discovered even if it does not hold for all process 
instances of the log 
• This parameter is useful in case of noisy logs, where rules 
are violated in exceptional cases, but hold for most cases 
Department of Mathematics and Computer Science 23-09-14 PAGE 30
PoI parameter 
• W = {(A C B C), (C B A C), (A C A C A C B)} 
Department of Mathematics and Computer Science 23-09-14 PAGE 31
PoI parameter 
• W = {(A C B C), (C B A C), (A C A C A C B)} 
2/3 3/3 
1/3 2/3 
1/3 1/3 
Department of Mathematics and Computer Science 23-09-14 PAGE 32
PoI parameter 
• W = {(A C B C), (C B A C), (A C A C A C B)} 
2/3 3/3 
1/3 2/3 
1/3 1/3 
Department of Mathematics and Computer Science 23-09-14 PAGE 33
Truncated semantics for DECLARE constraints 
• W = {(A C D B C D A E F B A), 
(C A D B C A D C B F D A D B C A D E F), 
(A C B D A E B F A E F)} 
Department of Mathematics and Computer Science 23-09-14 PAGE 34
Truncated semantics for DECLARE constraints 
• W = {(A C D B C D A E F B A), 
(C A D B C A D C B F D A D B C A D E F), 
(A C B D A E B F A E F)} 
Department of Mathematics and Computer Science 23-09-14 PAGE 35
Truncated semantics for DECLARE constraints 
• Relevant when logs are not complete 
• Literature on Truncated Semantics 
• C. Eisner, D. Fisman, J. Havlicek, A. Mcisaac, Y. Lustig, and D. V. 
Campenhout, “Reasoning with Temporal Logic on Truncated 
Paths,” in In CAV Proceedings, LNCS 2725, pp. 27–40, 2003 
Department of Mathematics and Computer Science 23-09-14 PAGE 36
Truncated semantics for DECLARE constraints 
• After every prefix, four evaluations of a constraint 
− Satisfied : independent of future 
− Temporarily satisfied : satisfied if this is the end of the log 
− Temporarily violated : violated if this is the end of the log 
− Violated : independent of future 
• Three kinds of semantics: 
• Weak: temporarily xxx  satisfied 
• Neutral: temporarily xxx  xxx 
• Strong: temporarily xxx  violated 
Department of Mathematics and Computer Science 23-09-14 PAGE 37
Truncated semantics for DECLARE constraints 
• W = {(A C D B C D A E F B A), 
(C A D B C A D C B F D A D B C A D E F), 
(A C B D A E B F A E F)} 
Department of Mathematics and Computer Science 23-09-14 PAGE 38
Truncated semantics for DECLARE constraints 
• W = {(A C D B C D A E F B A), 
(C A D B C A D C B F D A D B C A D E F), 
(A C B D A E B F A E F)} 
(Weak semantics) 
Department of Mathematics and Computer Science 23-09-14 PAGE 39
Vacuity detection in DECLARE discovery 
• W = {(C B C B E F ), 
(C B C B C F B C B E F), (C B E F E F)} 
Department of Mathematics and Computer Science 23-09-14 PAGE 40
Vacuity detection in DECLARE discovery 
• W = {(C B C B E F ), 
(C B C B C F B C B E F), (C B E F E F)} 
Department of Mathematics and Computer Science 23-09-14 PAGE 41
Vacuity detection in DECLARE discovery 
• Literature on Vacuity Detection 
• O. Kupferman and M. Y. Vardi, “Vacuity Detection in Temporal 
Model Checking,” International Journal STTT, vol. 4, pp. 224–233, 
2003 
Department of Mathematics and Computer Science 23-09-14 PAGE 42
Vacuity detection in DECLARE discovery 
• A constraint is vacuously satisfied if the constraint 
is not really “activated” 
• Instead of checking the validity of a constraint c we 
check the validity of witness(c) to be sure that the 
constraint is non-vacuously satisfied 
Department of Mathematics and Computer Science 23-09-14 PAGE 43
Vacuity detection in DECLARE discovery 
c 
Department of Mathematics and Computer Science 23-09-14 PAGE 44
Vacuity detection in DECLARE discovery 
witness(c) 
Department of Mathematics and Computer Science 23-09-14 PAGE 45
Vacuity detection in DECLARE discovery 
• W = {(C B C B E F ), 
(C B C B C F B C B E F), (C B E F E F)} 
Department of Mathematics and Computer Science 23-09-14 PAGE 46
Vacuity detection in DECLARE discovery 
• W = {(C B C B E F ), 
(C B C B C F B C B E F), (C B E F E F)} 
Department of Mathematics and Computer Science 23-09-14 PAGE 47
Conclusion 
• Novel approach to discover declarative models from 
logs that allows users to guide the discovery 
process towards specific properties 
• Results on truncated semantics can be used to 
obtain significant results in the case that only partial 
logs are available 
• Vacuity detection to identify the percentage of 
process instances where a constraint is really 
activated 
Department of Mathematics and Computer Science 23-09-14 PAGE 48
Present and future work 
• Better performance of the discovery algorithm 
• equivalent combinations 
• combination of event classes occurring in the same 
trace 
Department of Mathematics and Computer Science 23-09-14 PAGE 49
Present and future work 
• Application of the approach to several case studies 
• Given a constraint and a process instance where it is 
non-vacuously satisfied  how many times it has 
been “activated” in the process instance 
• Given a constraint and a process instance where it is 
violated  level of “healthiness” of the process 
instance based on the number of violations 
Department of Mathematics and Computer Science 23-09-14 PAGE 50
Visit the website 
http://www.win.tue.nl/declare/declare-miner/ 
Department of Mathematics and Computer Science 23-09-14 PAGE 51

More Related Content

Similar to User-Guided Discovery of Declarative Process Models

Day 5 application of graph ,biconnectivity fdp on ds
Day 5 application of graph ,biconnectivity fdp on dsDay 5 application of graph ,biconnectivity fdp on ds
Day 5 application of graph ,biconnectivity fdp on dsGUNASUNDARISAPIIICSE
 
Logic
LogicLogic
LogicHamxi
 
Data Structures and Algorithm - Week 8 - Minimum Spanning Trees
Data Structures and Algorithm - Week 8 - Minimum Spanning TreesData Structures and Algorithm - Week 8 - Minimum Spanning Trees
Data Structures and Algorithm - Week 8 - Minimum Spanning TreesFerdin Joe John Joseph PhD
 
Formal estimation of worst case communication latency in a network on chip fi...
Formal estimation of worst case communication latency in a network on chip fi...Formal estimation of worst case communication latency in a network on chip fi...
Formal estimation of worst case communication latency in a network on chip fi...Vinita Palaniveloo
 
Griffin: Grouping Suspicious Memory-Access Patterns to Improve Understanding...
Griffin: Grouping Suspicious Memory-Access Patterns to Improve Understanding...Griffin: Grouping Suspicious Memory-Access Patterns to Improve Understanding...
Griffin: Grouping Suspicious Memory-Access Patterns to Improve Understanding...Sangmin Park
 
CAD -- CUSUM Anomaly Detection
CAD -- CUSUM Anomaly DetectionCAD -- CUSUM Anomaly Detection
CAD -- CUSUM Anomaly DetectionFarkas Kinga
 
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...Victor Asanza
 
Numerical inflation: simulation of observational parameters
Numerical inflation: simulation of observational parametersNumerical inflation: simulation of observational parameters
Numerical inflation: simulation of observational parametersMilan Milošević
 
Reachability Analysis via Net Structure
Reachability Analysis via Net StructureReachability Analysis via Net Structure
Reachability Analysis via Net StructureUniversität Rostock
 
Discrete-event simulation: best practices and implementation details in Pytho...
Discrete-event simulation: best practices and implementation details in Pytho...Discrete-event simulation: best practices and implementation details in Pytho...
Discrete-event simulation: best practices and implementation details in Pytho...Carlos Natalino da Silva
 
Reproducible Linear Algebra from Application to Architecture
Reproducible Linear Algebra from Application to ArchitectureReproducible Linear Algebra from Application to Architecture
Reproducible Linear Algebra from Application to ArchitectureJason Riedy
 
Improving Genetic Algorithm (GA) based NoC mapping algorithm using a formal ...
Improving Genetic Algorithm (GA)  based NoC mapping algorithm using a formal ...Improving Genetic Algorithm (GA)  based NoC mapping algorithm using a formal ...
Improving Genetic Algorithm (GA) based NoC mapping algorithm using a formal ...Vinita Palaniveloo
 
Double-constrained RPCA based on Saliency Maps for Foreground Detection in Au...
Double-constrained RPCA based on Saliency Maps for Foreground Detection in Au...Double-constrained RPCA based on Saliency Maps for Foreground Detection in Au...
Double-constrained RPCA based on Saliency Maps for Foreground Detection in Au...ActiveEon
 
Reducing Structural Bias in Technology Mapping
Reducing Structural Bias in Technology MappingReducing Structural Bias in Technology Mapping
Reducing Structural Bias in Technology Mappingsatrajit
 
Compressed learning for time series classification
Compressed learning for time series classificationCompressed learning for time series classification
Compressed learning for time series classification學翰 施
 

Similar to User-Guided Discovery of Declarative Process Models (20)

Day 5 application of graph ,biconnectivity fdp on ds
Day 5 application of graph ,biconnectivity fdp on dsDay 5 application of graph ,biconnectivity fdp on ds
Day 5 application of graph ,biconnectivity fdp on ds
 
Logic
LogicLogic
Logic
 
Data Structures and Algorithm - Week 8 - Minimum Spanning Trees
Data Structures and Algorithm - Week 8 - Minimum Spanning TreesData Structures and Algorithm - Week 8 - Minimum Spanning Trees
Data Structures and Algorithm - Week 8 - Minimum Spanning Trees
 
Formal estimation of worst case communication latency in a network on chip fi...
Formal estimation of worst case communication latency in a network on chip fi...Formal estimation of worst case communication latency in a network on chip fi...
Formal estimation of worst case communication latency in a network on chip fi...
 
Griffin: Grouping Suspicious Memory-Access Patterns to Improve Understanding...
Griffin: Grouping Suspicious Memory-Access Patterns to Improve Understanding...Griffin: Grouping Suspicious Memory-Access Patterns to Improve Understanding...
Griffin: Grouping Suspicious Memory-Access Patterns to Improve Understanding...
 
CAD -- CUSUM Anomaly Detection
CAD -- CUSUM Anomaly DetectionCAD -- CUSUM Anomaly Detection
CAD -- CUSUM Anomaly Detection
 
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...
 
Finding Dense Subgraphs
Finding Dense SubgraphsFinding Dense Subgraphs
Finding Dense Subgraphs
 
Numerical inflation: simulation of observational parameters
Numerical inflation: simulation of observational parametersNumerical inflation: simulation of observational parameters
Numerical inflation: simulation of observational parameters
 
MUMS: Transition & SPUQ Workshop - Gradient-Free Construction of Active Subsp...
MUMS: Transition & SPUQ Workshop - Gradient-Free Construction of Active Subsp...MUMS: Transition & SPUQ Workshop - Gradient-Free Construction of Active Subsp...
MUMS: Transition & SPUQ Workshop - Gradient-Free Construction of Active Subsp...
 
Reachability Analysis via Net Structure
Reachability Analysis via Net StructureReachability Analysis via Net Structure
Reachability Analysis via Net Structure
 
RBF2.ppt
RBF2.pptRBF2.ppt
RBF2.ppt
 
20130523 05 - Cyclomatic complexity
20130523 05 - Cyclomatic complexity20130523 05 - Cyclomatic complexity
20130523 05 - Cyclomatic complexity
 
Discrete-event simulation: best practices and implementation details in Pytho...
Discrete-event simulation: best practices and implementation details in Pytho...Discrete-event simulation: best practices and implementation details in Pytho...
Discrete-event simulation: best practices and implementation details in Pytho...
 
Reproducible Linear Algebra from Application to Architecture
Reproducible Linear Algebra from Application to ArchitectureReproducible Linear Algebra from Application to Architecture
Reproducible Linear Algebra from Application to Architecture
 
Improving Genetic Algorithm (GA) based NoC mapping algorithm using a formal ...
Improving Genetic Algorithm (GA)  based NoC mapping algorithm using a formal ...Improving Genetic Algorithm (GA)  based NoC mapping algorithm using a formal ...
Improving Genetic Algorithm (GA) based NoC mapping algorithm using a formal ...
 
Double-constrained RPCA based on Saliency Maps for Foreground Detection in Au...
Double-constrained RPCA based on Saliency Maps for Foreground Detection in Au...Double-constrained RPCA based on Saliency Maps for Foreground Detection in Au...
Double-constrained RPCA based on Saliency Maps for Foreground Detection in Au...
 
Real time traffic management - challenges and solutions
Real time traffic management - challenges and solutionsReal time traffic management - challenges and solutions
Real time traffic management - challenges and solutions
 
Reducing Structural Bias in Technology Mapping
Reducing Structural Bias in Technology MappingReducing Structural Bias in Technology Mapping
Reducing Structural Bias in Technology Mapping
 
Compressed learning for time series classification
Compressed learning for time series classificationCompressed learning for time series classification
Compressed learning for time series classification
 

Recently uploaded

Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 

Recently uploaded (20)

Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 

User-Guided Discovery of Declarative Process Models

  • 1. User-Guided Discovery of Declarative Process Models Fabrizio Maria Maggi, Arjan Mooij, Wil van der Aalst
  • 2. Environment with a lot of variability Department of Mathematics and Computer Science 23-09-14 PAGE 2
  • 3. Environment with a lot of variability Department of Mathematics and Computer Science 23-09-14 PAGE 3
  • 4. Environment with a lot of variability Department of Mathematics and Computer Science 23-09-14 PAGE 4
  • 5. Environment with a lot of variability Department of Mathematics and Computer Science 23-09-14 PAGE 5
  • 6. Environment with a lot of variability Department of Mathematics and Computer Science 23-09-14 PAGE 6
  • 7. Discovery of Spaghetti-like models Department of Mathematics and Computer Science 23-09-14 PAGE 7
  • 8. Discovery of Spaghetti-like models Department of Mathematics and Computer Science 23-09-14 PAGE 8
  • 9. Declarative approaches Department of Mathematics and Computer Science 23-09-14 PAGE 9
  • 10. Declarative process discovery • Avoid the discovery of spaghetti-like models • Traditional discovery techniques explicitly specify all possible behaviours (closed models) • Declarative process discovery: process behaviour described as a compact set of rules (open models) Department of Mathematics and Computer Science 23-09-14 PAGE 10
  • 11. Declarative process discovery • Possibility to guide the discovery process towards specific properties of interest Department of Mathematics and Computer Science 23-09-14 PAGE 11
  • 12. Declarative process discovery Department of Mathematics and Computer Science 23-09-14 PAGE 12
  • 13. Declarative process discovery A is always eventually followed by B Department of Mathematics and Computer Science 23-09-14 PAGE 13
  • 14. Declarative process discovery A is always eventually followed by B A or B always occur but never together Department of Mathematics and Computer Science 23-09-14 PAGE 14
  • 15. Declarative process discovery A is always eventually followed by B A or B always occur but never together A and B never occur in sequence Department of Mathematics and Computer Science 23-09-14 PAGE 15
  • 16. Declare • A is always eventually followed by B • RESPONSE • User-friendly graphical representation • Semantics specified through LTL (for finite traces) Department of Mathematics and Computer Science 23-09-14 PAGE 16
  • 17. Core algorithm 23-09-14 PAGE 17 LOG
  • 18. User-guided discovery Department of Mathematics and Computer Science 23-09-14 PAGE 18
  • 19. Core algorithm • W = {(A C B C), (C B A C), (A C A C A C B)} Department of Mathematics and Computer Science 23-09-14 PAGE 19
  • 20. Core algorithm • W = {(A C B C), (C B A C), (A C A C A C B)} Department of Mathematics and Computer Science 23-09-14 PAGE 20
  • 21. Core algorithm • W = {(A C B C), (C B A C), (A C A C A C B)} Department of Mathematics and Computer Science 23-09-14 PAGE 21
  • 22. Core algorithm • W = {(A C B C), (C B A C), (A C A C A C B)} Department of Mathematics and Computer Science 23-09-14 PAGE 22
  • 23. Core algorithm • W = {(A C B C), (C B A C), (A C A C A C B)} Department of Mathematics and Computer Science 23-09-14 PAGE 23
  • 24. Tuning the discovery process: PoE • Percentage of Events (PoE) avoids the discovery of less-relevant constraints referring to event classes which rarely occur in the log • This parameter has also a positive effect on the execution time of the algorithm Department of Mathematics and Computer Science 23-09-14 PAGE 24
  • 25. PoE parameter • W = {(A C B C), (C B A C), (A C A C A C B)} Department of Mathematics and Computer Science 23-09-14 PAGE 25
  • 26. PoE parameter • W = {(A C B C), (C B A C), (A C A C A C B)} − f(A) = 5/15 − f(B) = 3/15 − f(C) = 7/15 Department of Mathematics and Computer Science 23-09-14 PAGE 26
  • 27. PoE parameter • W = {(A C B C), (C B A C), (A C A C A C B)} − f(A) = 5/15 − f(B) = 3/15 − f(C) = 7/15 Department of Mathematics and Computer Science 23-09-14 PAGE 27
  • 28. PoE parameter • W = {(A C B C), (C B A C), (A C A C A C B)} − f(A) = 5/15 − f(B) = 3/15 − f(C) = 7/15 Department of Mathematics and Computer Science 23-09-14 PAGE 28
  • 29. PoE parameter • W = {(A C B C), (C B A C), (A C A C A C B)} − f(A) = 5/15 − f(B) = 3/15 − f(C) = 7/15 Department of Mathematics and Computer Science 23-09-14 PAGE 29
  • 30. Tuning the discovery process: PoI • Percentage of Instances (PoI) specifies that a constraint can still be discovered even if it does not hold for all process instances of the log • This parameter is useful in case of noisy logs, where rules are violated in exceptional cases, but hold for most cases Department of Mathematics and Computer Science 23-09-14 PAGE 30
  • 31. PoI parameter • W = {(A C B C), (C B A C), (A C A C A C B)} Department of Mathematics and Computer Science 23-09-14 PAGE 31
  • 32. PoI parameter • W = {(A C B C), (C B A C), (A C A C A C B)} 2/3 3/3 1/3 2/3 1/3 1/3 Department of Mathematics and Computer Science 23-09-14 PAGE 32
  • 33. PoI parameter • W = {(A C B C), (C B A C), (A C A C A C B)} 2/3 3/3 1/3 2/3 1/3 1/3 Department of Mathematics and Computer Science 23-09-14 PAGE 33
  • 34. Truncated semantics for DECLARE constraints • W = {(A C D B C D A E F B A), (C A D B C A D C B F D A D B C A D E F), (A C B D A E B F A E F)} Department of Mathematics and Computer Science 23-09-14 PAGE 34
  • 35. Truncated semantics for DECLARE constraints • W = {(A C D B C D A E F B A), (C A D B C A D C B F D A D B C A D E F), (A C B D A E B F A E F)} Department of Mathematics and Computer Science 23-09-14 PAGE 35
  • 36. Truncated semantics for DECLARE constraints • Relevant when logs are not complete • Literature on Truncated Semantics • C. Eisner, D. Fisman, J. Havlicek, A. Mcisaac, Y. Lustig, and D. V. Campenhout, “Reasoning with Temporal Logic on Truncated Paths,” in In CAV Proceedings, LNCS 2725, pp. 27–40, 2003 Department of Mathematics and Computer Science 23-09-14 PAGE 36
  • 37. Truncated semantics for DECLARE constraints • After every prefix, four evaluations of a constraint − Satisfied : independent of future − Temporarily satisfied : satisfied if this is the end of the log − Temporarily violated : violated if this is the end of the log − Violated : independent of future • Three kinds of semantics: • Weak: temporarily xxx  satisfied • Neutral: temporarily xxx  xxx • Strong: temporarily xxx  violated Department of Mathematics and Computer Science 23-09-14 PAGE 37
  • 38. Truncated semantics for DECLARE constraints • W = {(A C D B C D A E F B A), (C A D B C A D C B F D A D B C A D E F), (A C B D A E B F A E F)} Department of Mathematics and Computer Science 23-09-14 PAGE 38
  • 39. Truncated semantics for DECLARE constraints • W = {(A C D B C D A E F B A), (C A D B C A D C B F D A D B C A D E F), (A C B D A E B F A E F)} (Weak semantics) Department of Mathematics and Computer Science 23-09-14 PAGE 39
  • 40. Vacuity detection in DECLARE discovery • W = {(C B C B E F ), (C B C B C F B C B E F), (C B E F E F)} Department of Mathematics and Computer Science 23-09-14 PAGE 40
  • 41. Vacuity detection in DECLARE discovery • W = {(C B C B E F ), (C B C B C F B C B E F), (C B E F E F)} Department of Mathematics and Computer Science 23-09-14 PAGE 41
  • 42. Vacuity detection in DECLARE discovery • Literature on Vacuity Detection • O. Kupferman and M. Y. Vardi, “Vacuity Detection in Temporal Model Checking,” International Journal STTT, vol. 4, pp. 224–233, 2003 Department of Mathematics and Computer Science 23-09-14 PAGE 42
  • 43. Vacuity detection in DECLARE discovery • A constraint is vacuously satisfied if the constraint is not really “activated” • Instead of checking the validity of a constraint c we check the validity of witness(c) to be sure that the constraint is non-vacuously satisfied Department of Mathematics and Computer Science 23-09-14 PAGE 43
  • 44. Vacuity detection in DECLARE discovery c Department of Mathematics and Computer Science 23-09-14 PAGE 44
  • 45. Vacuity detection in DECLARE discovery witness(c) Department of Mathematics and Computer Science 23-09-14 PAGE 45
  • 46. Vacuity detection in DECLARE discovery • W = {(C B C B E F ), (C B C B C F B C B E F), (C B E F E F)} Department of Mathematics and Computer Science 23-09-14 PAGE 46
  • 47. Vacuity detection in DECLARE discovery • W = {(C B C B E F ), (C B C B C F B C B E F), (C B E F E F)} Department of Mathematics and Computer Science 23-09-14 PAGE 47
  • 48. Conclusion • Novel approach to discover declarative models from logs that allows users to guide the discovery process towards specific properties • Results on truncated semantics can be used to obtain significant results in the case that only partial logs are available • Vacuity detection to identify the percentage of process instances where a constraint is really activated Department of Mathematics and Computer Science 23-09-14 PAGE 48
  • 49. Present and future work • Better performance of the discovery algorithm • equivalent combinations • combination of event classes occurring in the same trace Department of Mathematics and Computer Science 23-09-14 PAGE 49
  • 50. Present and future work • Application of the approach to several case studies • Given a constraint and a process instance where it is non-vacuously satisfied  how many times it has been “activated” in the process instance • Given a constraint and a process instance where it is violated  level of “healthiness” of the process instance based on the number of violations Department of Mathematics and Computer Science 23-09-14 PAGE 50
  • 51. Visit the website http://www.win.tue.nl/declare/declare-miner/ Department of Mathematics and Computer Science 23-09-14 PAGE 51

Editor's Notes

  1. a systems logs all transactions but doesn’t (completely) enforce a specific way of working. In such an environment, process mining could be used to gain insight into the actual process
  2. a systems logs all transactions but doesn’t (completely) enforce a specific way of working. In such an environment, process mining could be used to gain insight into the actual process
  3. Cite the background knowledge
  4. Cite the background knowledge
  5. a systems logs all transactions but doesn’t (completely) enforce a specific way of working. In such an environment, process mining could be used to gain insight into the actual process
  6. a systems logs all transactions but doesn’t (completely) enforce a specific way of working. In such an environment, process mining could be used to gain insight into the actual process
  7. a systems logs all transactions but doesn’t (completely) enforce a specific way of working. In such an environment, process mining could be used to gain insight into the actual process
  8. a systems logs all transactions but doesn’t (completely) enforce a specific way of working. In such an environment, process mining could be used to gain insight into the actual process
  9. Cite the background knowledge
  10. How do we represent a Petri net as a Logic Programming?
  11. How do we represent a Petri net as a Logic Programming?
  12. How do we represent a Petri net as a Logic Programming?
  13. How do we represent a Petri net as a Logic Programming?
  14. How do we represent a Petri net as a Logic Programming?
  15. How do we represent a Petri net as a Logic Programming?
  16. How do we represent a Petri net as a Logic Programming?
  17. How do we represent a Petri net as a Logic Programming?
  18. How do we represent a Petri net as a Logic Programming?
  19. How do we represent a Petri net as a Logic Programming?
  20. How do we represent a Petri net as a Logic Programming?
  21. How do we represent a Petri net as a Logic Programming?
  22. How do we represent a Petri net as a Logic Programming?
  23. How do we represent a Petri net as a Logic Programming?
  24. How do we represent a Petri net as a Logic Programming?
  25. How do we represent a Petri net as a Logic Programming?
  26. How do we represent a Petri net as a Logic Programming?
  27. .
  28. .
  29. How do we represent a Petri net as a Logic Programming?
  30. How do we represent a Petri net as a Logic Programming?
  31. How do we represent a Petri net as a Logic Programming?
  32. How do we represent a Petri net as a Logic Programming?
  33. How do we represent a Petri net as a Logic Programming?
  34. How do we represent a Petri net as a Logic Programming?
  35. How do we represent a Petri net as a Logic Programming?
  36. How do we represent a Petri net as a Logic Programming?
  37. How do we represent a Petri net as a Logic Programming?
  38. How do we represent a Petri net as a Logic Programming?
  39. How do we represent a Petri net as a Logic Programming?
  40. How do we represent a Petri net as a Logic Programming?
  41. How do we represent a Petri net as a Logic Programming?