?
Checking Conformance of High-Level Business Process Models to Event Logs
P. 77-82.
Process mining is a new technology, that provides us a variety of methods to discover, monitor and improve real processes by extracting knowledge from event logs. The two most prominent process mining tasks are process discovery and conformance checking. Conformance checking deals with diagnosing and quantifying discrepancies between observed behavior, represented in event logs, and modeled behavior. We present a method for checking conformance of abstract models and low-level event logs.
Publication based on the results of:
Alexandra Kolosova, Irina Lomazova, , in : Analysis of Images, Social Networks and Texts. 8th International Conference, AIST 2019, Lecture Notes in Computer Science, Revised Selected Papers. Vol. 11832.: Cham : Springer, 2019. P. 401-410.
Added: October 24, 2019
Катаева В. М., Kalenkova A. A., , in : Proceedings of the 8th Spring/Summer Young Researchers’ Colloquium on Software Engineering (SYRCoSE 2014). : M. : -, 2014. P. 83-87.
This work is dedicated to one of the most urgent problems in the field of process mining. Process mining is a technique that offers plenty of methods for the discovery and analysis of business processes based on event logs. However, there is a lack of real process models and event logs, which can be used ...
Added: June 3, 2014
Kalenkova A. A., TU/e Eindhoven, 2018
Information systems in different domains, such as healthcare, tourism, banking, government and others, record operational behavior in the form of event logs. The process mining discipline offers dozens of techniques to discover, analyze, and visualize processes running in information systems, based on their event logs. The representational bias (the language for processes representation) plays an ...
Added: June 14, 2018
Begicheva A., Lomazova I. A., Modeling and Analysis of Information Systems 2015 Vol. 22 No. 3 P. 392-403
Process mining is a relatively new field of computer science, which deals with process discovery and analysis based on event logs. In this paper we consider the problem of models and event logs conformance checking. Conformance checking is intensively studied in the frame of process mining research, but only models and event logs of the ...
Added: August 5, 2015
Breyman A., Богословский Е. М., Прикаспийский журнал: управление и высокие технологии 2014 № 2 (26) С. 127-137
Event logs collected by modern information and technical systems usually contain enough data for automated process models discovery. A variety of algorithms was developed for process models discovery, conformance checking, log to model alignment, comparison of process models, etc., nevertheless a quick analysis of ad-hoc selected parts of a journal still have not get a ...
Added: February 27, 2014
K. Davydova, S. Shershakov, Proceedings of the Institute for System Programming of the RAS 2017 Vol. 29 No. 4 P. 155-174
In the paper we consider a method for mining so-called “hybrid” UML models, that refers to software process mining. Models are built from execution traces of information systems with service-oriented architecture (SOA), given in the form of event logs. While common reverse engineering techniques usually require the source code, which is often unavailable, our approach ...
Added: October 18, 2017
van der Aalst W., , in : Proceedings of the 2013 Federated Conference on Computer Science and Information Systems. Vol. 1: Annals of Computer Science and Information Systems.: Warsz. : Polskie Towarzystwo Informatyczne, 2013. P. 1-10.
Operational processes leave trails in the information systems supporting them. Such event data are the starting point for process mining – an emerging scientific discipline relating modeled and observed behavior. The relevance of process mining is increasing as more and more event data become available. The increasing volume of such data (“Big Data”) provides both ...
Added: November 14, 2013
Julio C. Carrasquel, Lomazova I. A., , in : 6th International Conference, TMPA 2021, Tomsk, Russia, November 25–27, 2021, Revised Selected Papers. Tools and Methods of Program Analysis. Vol. 1559: CCIS .: Springer, 2024. P. 94-106.
Trading systems are software platforms that support the exchange of securities (e.g., company shares) between participants. In this paper, we present a method to search for deviations in trading systems by checking conformance between colored Petri nets and event logs. Colored Petri nets (CPNs) are an extension of Petri nets, a formalism for modeling of ...
Added: January 31, 2024
Lyadova L. N., Платунов А. И., Информатизация и связь 2024 № 1 С. 84-89
Summary. The goal of the project is developing tools for generating and preprocessing event logs for process analysis using Process Mining methods. The implementation approach is based on low-code principles. Users should be able to develop their own rules for generating and processing event logs, including additional attributes, – event series. It is based on ...
Added: January 19, 2024
Julio C. Carrasquel, Lomazova I. A., , in : ICPM Doctoral Consortium 2019. Vol. 2432: CEUR Workshop Proceedings.: CEUR-WS.org, 2019. Ch. 4. P. 1-12.
This paper presents our research on trading and multi-agent systems. Trading systems support the processes of buying/selling financial instruments between traders, so the validation of their correctness is a crucial task. Conversely, multi-agent systems is a current topic of interest within the analysis of interactive processes. We use Petri nets as the formalism for system ...
Added: August 28, 2019
Mecheraoui K., Carrasquel Gamez J. C., Lomazova I. A., , in : Proceedings of the Conference on Modeling and Analysis of Complex Systems and Processes 2020 (MACSPro 2020). Vol. 2795.: CEUR Workshop Proceedings, 2020. P. 34-45.
This paper presents a compositional conformance checking approach between nested Petri nets and event logs of multi-agent systems. By projecting an event log onto model components, one can perform conformance checking between each projected log and the corresponding component. We formally demonstrate the validity of our approach proving that, to check fitness of a nested ...
Added: January 14, 2021
van der Aalst W., Kalenkova A. A., Verbeek H. M. et al., , in : Application and Theory of Petri Nets and Concurrency. 36th International Conference, PETRI NETS 2015, Brussels, Belgium, June 21-26, 2015, Proceedings. Issue 9115.: Switzerland : Springer, 2015. P. 287-308.
Process mining techniques aim to analyze and improve conformance and performance of processes using event data. Process discovery is the most prominent process-mining task: A process model is derived based on an event log. The process model should be able to capture causalities, choices, concurrency, and loops. Process discovery is very challenging because of trade-offs ...
Added: June 11, 2015
Zayakin Viktor, Lyadova Lyudmila, Smirnov M. et al., , in : 2022 IEEE 16th International Conference on Application of Information and Communication Technologies (AICT). : Washington : IEEE, 2022. P. 1-6.
The article presents an approach to the analyzing processes in different domains using data from various Internet sources (open databases, news feeds, social networks, etc.). This one is suitable to carry out cross-disciplinary research encompassing processes in various fields (for example, economics, medicine, politics, ecology, etc.) in which events can have mutual affects. The concept ...
Added: October 29, 2022
Mecheraoui K., Carrasquel Gamez J. C., Lomazova I. A., / Cornell University. Series Computer Science "arxiv.org". 2020.
This paper presents a compositional conformance checking approach between nested Petri nets and event logs of multi-agent systems. By projecting an event log onto model components, one can perform conformance checking between each projected log and the corresponding component. We formally demonstrate the validity of our approach proving that, to check fitness of a nested ...
Added: October 20, 2020
Viacheslav Lanin, Lyudmila Lyadova, Elena Zamyatina et al., , in : Proceedings of the 13th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management. Vol. 2: KEOD.: Lisbon : SciTePress, 2021. P. 234-239.
Added: October 2, 2021
Anton Platunov, Lyudmila Lyadova, Matta N. et al., , in : IC3K 2023: Proceedings of the 15th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management. Volume 2: KEOD, Rome - Italy, November 13 - 15, 2023. Vol. 2: KEOD.: Lisbon : SciTePress, 2023. P. 323-330.
Existing process mining methods allow to investigate processes in different domains. Besides mandatory event attributes like as identifier, activity, and timestamp, additional event attributes can be present in data sources. The analysing dynamics of changing the values of additional attributes allows to get important information on the system. The applications must be developed by programmers ...
Added: November 22, 2023
Skobtsov A., Kalenkova A. A., , in : Proceedings of the MACSPro Workshop 2019. Vol. 2478: CEUR Workshop Proceedings.: CEUR-WS.org, 2019.
Companies from various domains record their operational
behavior in a form of event logs. These event logs can be analyzed and
relevant process models representing the real companies’ behavior can be
discovered. One of the main advantages of the process discovery methods
is that they commonly produce models in a form of graphs which can be
easily visualized giving an ...
Added: October 13, 2019
Shugurov I., Mitsyuk A. A., Proceedings of the Institute for System Programming of the RAS 2016 Vol. 28 No. 3 P. 103-122
Process mining is a relatively new research field, offering methods of business processes analysis and improvement, which are based on studying their execution history (event logs). Conformance checking is one of the main sub-fields of process mining. Conformance checking algorithms are aimed to assess how well a given process model, typically represented by a Petri ...
Added: September 12, 2016
Müller R., Stahl C., van der Aalst W. et al., , in : Service-Oriented Computing. Vol. 8274: Lecture Notes in Computer Science.: Berlin, Heidelberg : Springer, 2013. P. 358-373.
Process discovery techniques can be used to derive a process model from observed example behavior (i.e., an event log). As the observed behavior is inherently incomplete and models may serve different purposes, four competing quality dimensions—fitness, precision, simplicity, and generalization—have to be balanced to produce a process model of high quality.
In this paper, we investigate ...
Added: March 21, 2014
Begicheva A., Lomazova I. A., Nesterov R., / Cornell University. Series Computer Science "arxiv.org". 2023.
Process mining is a field of computer science that deals with discovery and analysis of process models based on automatically generated event logs. Currently, many companies use this technology for optimization and improving their processes. However, a discovered process model may be too detailed, sophisticated and difficult for experts to understand. In this paper, we ...
Added: March 31, 2023
Skobtsov A., Kalenkova A. A., , in : 2019 IEEE 23rd International Enterprise Distributed Object Computing Workshop (EDOCW). : IEEE, 2019. P. 85-91.
Goal modeling is widely used to align stakeholders requirements with architectural models. In contrast to goal models which are usually defined by stakeholders, architectural models are not always defined explicitly, or systems may not be used as they were designed. To understand the real behavior of a system, process mining techniques can be applied. These ...
Added: October 13, 2019
Mitsyuk A. A., Shugurov I., Моделирование и анализ информационных систем 2014 Т. 21 № 4 С. 181-198
Process mining is a new emerging discipline related to process management, formal process models, and data mining. One of the main tasks of process mining is the model synthesis (discovery) based on the event logs. A wide range of algorithms for process model discovery, analysis, and enhancement are developed. The real-life event logs often contain ...
Added: October 20, 2014
Carrasquel Gamez J. C., Chuburov S., Lomazova I. A., , in : Tools and Methods of Program Analysis. 5th International Conference, TMPA 2019, Tbilisi, Georgia, November 7–9, 2019, Revised Selected Papers. Vol. 1288: CCIS.: Springer, 2021. P. 88-100.
Process mining is emerging as an important discipline for the analysis, monitoring, and improvement of business and software processes. Methods from process mining are based on the use of formal
models and event logs, i.e., describing respectively the expected and observed behavior of system processes. This approach can be leveraged by the software testing industry for ...
Added: October 19, 2020
Платунов А. И., Lyadova L. N., В кн. : ТЕХНОЛОГИИ РАЗРАБОТКИ ИНСТРУМЕНТАЛЬНЫХ СРЕДСТВ (ТРИС-2023): материалы конференции. : Таганрог : Издательство ЮФУ, 2023. С. 113-122.
The goal of the project is to develop tools for generating and processing event logs including additional attributes for analyzing processes with Process Mining tools. Implementation are based on low-code principles. This enables non-programmers to develop their own data processing rules for generating and preprocessing event logs with additional attributes. The core of the system ...
Added: December 16, 2023