Method for conformance checking based on token log

被引:0
作者
机构
[1] State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing
[2] School of Software, Nanjing University, Nanjing
[3] Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information, Ministry of Education, Nanjing University of Science and Technology, Nanjing
[4] Department of Computer Science & Technology, Nanjing University, Nanjing
[5] School of Computer, Hangzhou Dianzi University, Hangzhou
来源
Ge, Ji-Dong (gjd@nju.edu.cn) | 2015年 / Chinese Academy of Sciences卷 / 26期
关键词
Conformance checking; Petri-net; Process mining; ProM; S-invariant; T-invariant; Token Log;
D O I
10.13328/j.cnki.jos.004771
中图分类号
学科分类号
摘要
Logs used in conformance checking with process models are often the event logs. Conformity between the model and the log is often measured by counting the traces which could be reconstructed and the tasks which would be evoked but were not in the running trace through rerunning the model according to the task traces in the log. However the method is not sufficiently comprehensive. While checking the model consisting of many selections with its Event Log, the conformity will be very low due to the large number of evoked tasks that are not in the running task trace. Moreover, while checking the model mainly composed by parallel branches with the log only containing sequential task traces and sharing the same task set with the model, the conformity will be very high due to the fact that only a few tasks can't be executed normally while monitoring the real behavior. To overcome the weakness of the original method, a bidirectional checking method made up of checking the accuracy of the model and checking the completeness of the log, and a new kind of log named Token Log which can describe the property of its corresponding model, are proposed in this paper. With the Token Log, the new method for conformance checking is clearer, more concise and more accurate. © 2015, Institute of Software, the Chinese Academy of Sciences. All right reserved.
引用
收藏
页码:509 / 532
页数:23
相关论文
共 24 条
  • [1] Rozinat A., Van der Aalst W.M.P., Conformance checking of process based on monitoring real behavior, Information Systems, 33, 1, pp. 64-95, (2008)
  • [2] Van der Aalst W.M.P., Adriansyah A., Van Dongen B., Replaying history on process models for conformance checking and performance analysis, WIREs Data Mining and Knowledge Discovery, 2, 2, pp. 182-192, (2012)
  • [3] Van der Aalst W.M.P., Weijters A.J.M.M., Process mining: A research agenda, Computers in Industry, 53, 3, pp. 231-244, (2004)
  • [4] Van der Aalst W.M.P., Process discovery: Capturing the invisible, Computational Intelligence Magazine, 5, 1, pp. 28-41, (2010)
  • [5] La Rosa M., Reijers H.A., Van Der Aalst W.M.P., Dijkman R.M., Mendling J., Dumas M., Garcia-Banuelos L., APROMORE: An advanced process model repository, Expert Systems with Applications, 38, 6, pp. 7029-7040, (2011)
  • [6] Yan Z., Dijkman R., Grefen P., Fast business process similarity search with feature-based similarity estimation, Proc. of the Move to Meaningful Internet Systems: OTM 2010, pp. 60-77, (2010)
  • [7] Murata T., Petri nets: Properties, analysis and applications, Proc. of the IEEE, 77, 4, pp. 541-580, (1989)
  • [8] Van der Aalst W.M.P., Weijters A.J.M.M., Maruster L., Workflow mining: Discovering process models from Event Logs, IEEE Trans. on Knowledge and Data Engineering, 16, 9, pp. 1128-1142, (2004)
  • [9] Van der Aalst W.M.P., Dumas M., Ouyang C., Rozinat A., Verbeek E., Conformance checking of service behavior, ACM Trans. on Internet Technology, 8, 3, (2008)
  • [10] Van der Aalst W.M.P., Rubin V., Verbeek H.M.W., Van Dongen B.F., Kindler E., Gunther C.W., Process mining: A two-step approach to balance between underfitting and overfitting, Software & Systems Modeling, 9, 1, pp. 87-111, (2010)