Process mining with token carried data

被引:14
作者
Li, Chuanyi [1 ,2 ]
Ge, Jidong [1 ,2 ]
Huang, Liguo [3 ]
Hu, Haiyang [2 ,4 ]
Wu, Budan [2 ]
Yang, Hongji [5 ]
Hu, Hao [1 ]
Luo, Bin [1 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Software Inst, Nanjing 210093, Jiangsu, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[3] So Methodist Univ, Dept Comp Sci & Engn, Dallas, TX 75275 USA
[4] Hangzhou Dianzi Univ, Sch Comp, Hangzhou 310018, Peoples R China
[5] Bath Spa Univ, CCC, London, England
基金
美国国家科学基金会;
关键词
Process mining; Process discovery; Workflow net; Petri net; Token; Token log; DISCOVERING PROCESS MODELS;
D O I
10.1016/j.ins.2015.08.050
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Process mining is to discover, monitor and improve real processes by extracting the knowledge from logs which are available in today's information systems. The existing process mining algorithms are based on the event logs where only the executions of tasks are recorded. In order to reduce the pre-processing efforts and strengthen the mining ability of the existing process mining algorithms, we have proposed a novel perspective to employ the data carried by tokens recorded in token log which tracks the changes of process resources for process mining in this study. The feasibility of the token logs is proved and the results of pairwise t-tests show that there is no big difference between the efforts that are taken by the same workflow system to generate the token log and the event log. Besides, a process mining algorithm (tau) based on the new log is proposed in this paper. With algorithm tau, the mining efficiency as well as the mining capability is improved compared to the traditional event-log-based mining algorithms. We have also developed three plug-ins on top of the existing workflow engine, process modeling and mining platforms (YAWL, PIPE and ProM) for proving the feasibility of token log and realizing the token log generation and algorithm tau. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:558 / 576
页数:19
相关论文
共 34 条
[1]  
[Anonymous], 1995, WORKFLOW REFERENCE M
[2]   New Region-Based Algorithms for Deriving Bounded Petri Nets [J].
Carmona, Josep ;
Cortadella, Jordi ;
Kishinevsky, Mike .
IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (03) :371-384
[3]  
Cook J. E., 1998, ACM Transactions on Software Engineering and Methodology, V7, P215, DOI 10.1145/287000.287001
[4]  
de Mederios A., 2004, TECHNICAL REPORT
[5]  
Dijkman R, 2009, LECT NOTES COMPUT SC, V5701, P48, DOI 10.1007/978-3-642-03848-8_5
[6]   Classification and evaluation of timed running schemas for workflow based on process mining [J].
Duan, Hua ;
Zeng, Qingtian ;
Wang, Huaiqing ;
Sun, Sherry X. ;
Xu, Dongming .
JOURNAL OF SYSTEMS AND SOFTWARE, 2009, 82 (03) :400-410
[7]  
Gorunescu F, 2011, INTEL SYST REF LIBR, P1, DOI 10.1007/978-3-642-19721-5
[8]   Integrating machine learning and workflow management to support acquisition and adaptation of workflow models [J].
Herbst, J ;
Karagiannis, D .
NINTH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 1998, :745-752
[9]   Service net algebra based on logic Petri nets [J].
Hu, Qiang ;
Du, Yuyue ;
Yu, ShuXia .
INFORMATION SCIENCES, 2014, 268 :271-289
[10]   Secure interoperation design in multi-domains environments based on colored Petri nets [J].
Huang, Hejiao ;
Kirchner, Helene .
INFORMATION SCIENCES, 2013, 221 :591-606