Process Discovery under Precedence Constraints

被引:32
作者
Greco, Gianluigi [1 ]
Guzzo, Antonella [2 ]
Lupia, Francesco [2 ]
Pontieri, Luigi [3 ]
机构
[1] Univ Calabria, Dipartimento Matemat & Informat, I-87036 Arcavacata Di Rende, CS, Italy
[2] Univ Calabria, Dipartimento DIMES, I-87036 Arcavacata Di Rende, CS, Italy
[3] CNR, ICAR, I-87036 Arcavacata Di Rende, CS, Italy
关键词
Algorithms; Process mining; graph analysis; computational complexity; MINING PROCESS MODELS; CONFORMANCE CHECKING; WORKFLOW MODELS; HISTORY;
D O I
10.1145/2710020
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Process discovery has emerged as a powerful approach to support the analysis and the design of complex processes. It consists of analyzing a set of traces registering the sequence of tasks performed along several enactments of a transactional system, in order to build a process model that can explain all the episodes recorded over them. An approach to accomplish this task is presented that can benefit from the background knowledge that, in many cases, is available to the analysts taking care of the process (re-) design. The approach is based on encoding the information gathered from the log and the (possibly) given background knowledge in terms of precedence constraints, that is, of constraints over the topology of the resulting process models. Mining algorithms are eventually formulated in terms of reasoning problems over precedence constraints, and the computational complexity of such problems is thoroughly analyzed by tracing their tractability frontier. Solution algorithms are proposed and their properties analyzed. These algorithms have been implemented in a prototype system, and results of a thorough experimental activity are discussed.
引用
收藏
页码:1 / 39
页数:39
相关论文
共 66 条
[1]   Conformance Checking using Cost-Based Fitness Analysis [J].
Adriansyah, A. ;
van Dongen, B. F. ;
van der Aalst, W. M. P. .
15TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE (EDOC 2011), 2011, :55-64
[2]  
Agrawal R, 1998, LECT NOTES COMPUT SC, V1377, P469
[3]   Verifiable agent interaction in abductive logic programming:: The SCIFF framework [J].
Alberti, Marco ;
Chesani, Federico ;
Gavanelli, Marco ;
Lamma, Evelina ;
Mello, Paola ;
Torroni, Paolo .
ACM TRANSACTIONS ON COMPUTATIONAL LOGIC, 2008, 9 (04)
[4]  
Anastasiou N., 2011, 5th International ICST Conference on Performance Evaluation Methodologies and Tools Communications, VALUETOOLS '11, Paris, France, May 16-20, 2011, P91, DOI [DOI 10.4108/ICST.VALUETOOLS.2011.245715, 10.4108/icst.valuetools.2011.245715]
[5]  
[Anonymous], 2011, P 17 ACM SIGKDD INT
[6]  
[Anonymous], 2001, Proceedings of the 13th Belgium-Netherlands Conference on Artificial Intelligence (BNAIC 2001)
[7]  
Attie P. C., 1996, Distributed Systems Engineering, V3, P222, DOI 10.1088/0967-1846/3/4/003
[8]  
Bellodi E, 2010, LECT NOTES ARTIF INT, V6291, P292, DOI 10.1007/978-3-642-15280-1_28
[9]  
Bonner A. J., 1999, Proceedings of the Eighteenth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, P294, DOI 10.1145/303976.304005
[10]  
Burattin A, 2011, LECT NOTES BUS INF P, V66, P214