Log-based transactional workflow mining

被引:21
作者
Gaaloul, Walid [1 ]
Gaaloul, Khaled [3 ,4 ]
Bhiri, Sami [2 ]
Haller, Armin [2 ]
Hauswirth, Manfred [2 ]
机构
[1] GET INT, F-91011 Evry, France
[2] DERI NUIG, Galway, Ireland
[3] SAP CEC Karlsruhe, D-76131 Karlsruhe, Germany
[4] LORIA INRIA UMR 7503, F-54506 Vandoeuvre Les Nancy, France
基金
爱尔兰科学基金会;
关键词
Workflow mining; Transactional workflow; Workflow patterns; Workflow logs; Process mining; Business process analysis; Business process intelligence; Process reengineering; Execution reliability; Correction; PROCESS MODELS; VERIFICATION; SUPPORT; NETS;
D O I
10.1007/s10619-009-7040-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A continuous evolution of business process parameters, constraints and needs, hardly foreseeable initially, requires a continuous design from the business process management systems. In this article we are interested in developing a reactive design through process log analysis ensuring process re-engineering and execution reliability. We propose to analyse workflow logs to discover workflow transactional behaviour and to subsequently improve and correct related recovery mechanisms. Our approach starts by collecting workflow logs. Then, we build, by statistical analysis techniques, an intermediate representation specifying elementary dependencies between activities. These dependencies are refined to mine the transactional workflow model. The analysis of the discrepancies between the discovered model and the initially designed model enables us to detect design gaps, concerning particularly the recovery mechanisms. Thus, based on this mining step, we apply a set of rules on the initially designed workflow to improve workflow reliability.
引用
收藏
页码:193 / 240
页数:48
相关论文
共 76 条
  • [1] Modeling and analysis of workflows using Petri Nets
    Adam, NR
    Atluri, V
    Huang, WK
    [J]. JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 1998, 10 (02) : 131 - 158
  • [2] Agrawal R, 1998, LECT NOTES COMPUT SC, V1377, P469
  • [3] [Anonymous], P ACM SIGSOFT INT S
  • [4] ANSARI M, 1992, PROC INT CONF VERY L, P65
  • [5] Attie P. C., 1993, 19th International Conference on Very Large Data Bases Proceedings, P134
  • [6] Baïna K, 2004, BIOMED SCI INSTRUM, V3084, P290
  • [7] BAINA K, 2006, CAISE FORUM, V231
  • [8] BAINA K, 2005, 1 INT E BUS C IEBC 0
  • [9] Inheritance of behavior
    Basten, T
    van der Aalst, WMP
    [J]. JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2001, 47 (02): : 47 - 145
  • [10] Benatallah B, 2004, LECT NOTES COMPUT SC, V3288, P524