Mining variable fragments from process event logs

被引:19
作者
Pourmasoumi, Asef [1 ]
Kahani, Mohsen [1 ]
Bagheri, Ebrahim [2 ]
机构
[1] Ferdowsi Univ Mashhad, Web Technol Lab, Mashhad, Iran
[2] Ryerson Univ, Dept Elect & Comp Engn, Toronto, ON, Canada
关键词
Process fragments; Morphological fragments; Event logs; Cross organizational mining; Reusable fragments; MODEL;
D O I
10.1007/s10796-016-9662-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many peer-organizations are now using process-aware information systems for managing their organizational processes. Most of these peer-organizations have shared processes, which include many commonalities and some degrees of variability. Analyzing and mining the commonalities of these processes can have many benefits from the reusability point of view. In this paper, we propose an approach for extracting common process fragments from a collection of event logs. To this end, we first analyze the process fragment literature from a theoretical point of view, based on which we present a new process fragment definition, called morphological fragments to support composability and flexibility. Then we propose a novel algorithm for extracting such morphological fragments directly from process event logs. This algorithm is capable of eliciting common fragments from a family of processes that may not have been executed within the same application/organization. We also propose supporting algorithms for detecting and categorizing morphological fragments for the purpose of reusability. Our empirical studies show that our approach is able to support reusability and flexibility in process fragment identification.
引用
收藏
页码:1423 / 1443
页数:21
相关论文
共 50 条
  • [41] Analysis of Event Logs: Behavioral Graphs
    Slaninova, Katerina
    Vymetal, Dominik
    Martinovic, Jan
    WEB INFORMATION SYSTEMS ENGINEERING - WISE 2014 WORKSHOPS, 2015, 9051 : 42 - 56
  • [42] DyLoPro: Profiling the Dynamics of Event Logs
    Wuyts, Brecht
    Weytjens, Hans
    vanden Broucke, Seppe
    De Weerdt, Jochen
    BUSINESS PROCESS MANAGEMENT, BPM 2023, 2023, 14159 : 146 - 162
  • [43] A deep learning approach for predicting critical events using event logs
    Huang, Congfang
    Deep, Akash
    Zhou, Shiyu
    Veeramani, Dharmaraj
    QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, 2021, 37 (05) : 2214 - 2234
  • [44] Multi-Step Attack Pattern Detection on Normalized Event Logs
    Jaeger, David
    Ussath, Martin
    Cheng, Feng
    Meinel, Christoph
    2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud), 2015, : 390 - 398
  • [45] Performance Analysis: Discovering Semi-Markov Models From Event Logs
    Kalenkova, Anna
    Mitchell, Lewis
    Roughan, Matthew
    IEEE ACCESS, 2025, 13 : 38035 - 38053
  • [46] Building User Journey Games from Multi-party Event Logs
    Kobialka, Paul
    Mannhardt, Felix
    Tarifa, Silvia Lizeth Tapia
    Johnsen, Einar Broch
    PROCESS MINING WORKSHOPS, ICPM 2022, 2023, 468 : 71 - 83
  • [47] Learning Bayesian network from event logs using mutual information test
    Sutrisnowati, Riska Asriana
    Bae, Hyerim
    Park, Jaehun
    Ha, Byung-Hyun
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON SERVICE-ORIENTED COMPUTING AND APPLICATIONS (SOCA), 2013, : 356 - 360
  • [48] Semantics-based event log aggregation for process mining and analytics
    Amit V. Deokar
    Jie Tao
    Information Systems Frontiers, 2015, 17 : 1209 - 1226
  • [49] Deriving Event Graphs through Process Mining for Runtime Change Management
    Zhang, H.
    Liu, Y.
    Li, C.
    Jiao, R.
    MODELLING AND MANAGEMENT OF ENGINEERING PROCESSES, 2010, : 127 - +
  • [50] Optimal event log sanitization for privacy-preserving process mining
    Fahrenkrog-Petersen, Stephan A.
    van der Aa, Han
    Weidlich, Matthias
    DATA & KNOWLEDGE ENGINEERING, 2023, 145