?
Service Discovery from Observed Behavior while Guaranteeing Deadlock Freedom in Collaborations
P. 358–373.
Müller R., Stahl C., van der Aalst W., Westergaard M.
Process discovery techniques can be used to derive a process model from observed example behavior (i.e., an event log). As the observed behavior is inherently incomplete and models may serve different purposes, four competing quality dimensions—fitness, precision, simplicity, and generalization—have to be balanced to produce a process model of high quality.
In this paper, we investigate the discovery of processes that are specified as services. Given a service S and observed behavior of a service P interacting with S, we discover a service model of P. Our algorithm balances the four quality dimensions based on user preferences. Moreover, unlike existing discovery approaches, we guarantees that the composition of S and P is deadlock free. The service discovery technique has been implemented in ProM and experiments using service models of industrial size demonstrate the scalability or our approach.
Language:
English
Publication based on the results of:
In book
Vol. 8274: Lecture Notes in Computer Science. , Berlin, Heidelberg: Springer, 2013.
A. K. Begicheva, I. A. Lomazova, R. A. Nesterov, Modeling and Analysis of Information Systems 2024 Vol. 31 No. 3 P. 294–315
Process mining is a field of computer science that deals with the discovery and analysis of process models based on automatically generated event logs. Currently, many companies are using this technology to optimize and improve their business processes. However, a discovered process model may be too detailed, sophisticated, and difficult for experts to understand. In ...
Added: September 14, 2024
Julio C. Carrasquel, Irina A. Lomazova, , in: 6th International Conference, TMPA 2021, Tomsk, Russia, November 25–27, 2021, Revised Selected Papers. Tools and Methods of Program AnalysisVol. 1559: CCIS .: Springer, 2024. P. 94–106.
Trading systems are software platforms that support the exchange of securities (e.g., company shares) between participants. In this paper, we present a method to search for deviations in trading systems by checking conformance between colored Petri nets and event logs. Colored Petri nets (CPNs) are an extension of Petri nets, a formalism for modeling of ...
Added: January 31, 2024
Lyadova L. N., Платунов А. И., Информатизация и связь 2024 № 1 С. 84–89
Summary. The goal of the project is developing tools for generating and preprocessing event logs for process analysis using Process Mining methods. The implementation approach is based on low-code principles. Users should be able to develop their own rules for generating and processing event logs, including additional attributes, – event series. It is based on ...
Added: January 19, 2024
Платунов А. И., Lyadova L. N., В кн.: ТЕХНОЛОГИИ РАЗРАБОТКИ ИНСТРУМЕНТАЛЬНЫХ СРЕДСТВ (ТРИС-2023): материалы конференции.: Таганрог: Издательство ЮФУ, 2023. С. 113–122.
The goal of the project is to develop tools for generating and processing event logs including additional attributes for analyzing processes with Process Mining tools. Implementation are based on low-code principles. This enables non-programmers to develop their own data processing rules for generating and preprocessing event logs with additional attributes. The core of the system ...
Added: December 16, 2023
Anton Platunov, Lyudmila Lyadova, Matta N. et al., , in: IC3K 2023: Proceedings of the 15th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management. Volume 2: KEOD, Rome - Italy, November 13 - 15, 2023Vol. 2: KEOD.: Lisbon: SciTePress, 2023. P. 323–330.
Existing process mining methods allow to investigate processes in different domains. Besides mandatory event attributes like as identifier, activity, and timestamp, additional event attributes can be present in data sources. The analysing dynamics of changing the values of additional attributes allows to get important information on the system. The applications must be developed by programmers ...
Added: November 22, 2023
A. A. Sherstyugina, R. A. Nesterov, Proceedings of the Institute for System Programming of the RAS 2023 Vol. 35 No. 3 P. 11–32
The structure of a process model directly discovered from an event log of a multi-agent system often does not reflect the behavior of individual agents and their interactions. We suggest analyzing the relations between events in an event log to localize actions executed by different agents and involved in their asynchronous interaction. Then, a process ...
Added: October 31, 2023
Zayakin Viktor, Lyadova Lyudmila, Smirnov M. et al., , in: 2022 IEEE 16th International Conference on Application of Information and Communication Technologies (AICT).: Washington: IEEE, 2022. P. 1–6.
The article presents an approach to the analyzing processes in different domains using data from various Internet sources (open databases, news feeds, social networks, etc.). This one is suitable to carry out cross-disciplinary research encompassing processes in various fields (for example, economics, medicine, politics, ecology, etc.) in which events can have mutual affects. The concept ...
Added: October 29, 2022
Shaimov N., Lomazova I. A., Mitsyuk A. A. et al., Моделирование и анализ информационных систем 2022 Т. 29 № 4 С. 286–314
Modern educational process involves the use of electronic educational environments. These are special information systems that are both a means for storing educational materials and a tool for conducting tests, collecting homework, keeping a grade book, and working together. Such environments produce a large amount of data containing the recorded behavior of students and teachers ...
Added: October 14, 2022
Nesterov R., Bernardinello L., Lomazova I. A. et al., Software and Systems Modeling 2023 Vol. 22 P. 351–375
A process model discovered from an event log of a multi-agent system often does not fully cover certain viewpoints of its architecture. We consider those concerned with the structure of a model explicitly reflecting agent behavior and interactions. The direct discovery from an event log of a multi-agent system may result in an unclear model ...
Added: May 5, 2022
Viacheslav Lanin, Lyudmila Lyadova, Elena Zamyatina et al., , in: Proceedings of the 13th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge ManagementVol. 2: KEOD.: Lisbon: SciTePress, 2021. P. 234–239.
Added: October 2, 2021
Carrasquel Gamez J. C., Mecheraoui K., Modeling and Analysis of Information Systems 2021 Vol. 28 No. 2 P. 146–168
Conformance checking methods diagnose to which extent a real system, whose behavior is recorded in an event log, complies with its specification model, e.g., a Petri net. Nonetheless, the majority of these methods focus on checking isolated process instances, neglecting interaction between instances in a system. Addressing this limitation, a series of object-centric approaches have ...
Added: June 21, 2021
Lyadova L. N., Заякин В. С., Смирнов М. А., В кн.: Технологии разработки информационных систем (ТРИС-2020): материалы X Международной научно-технической конференции.: Таганрог: Южный федеральный университет, 2020. С. 297–303.
The purpose of the study is to define the event series concept and develop an approach to the event series formation based on data extracted from various Internet-sources (news feeds, social networks, mass media and databases) using multifaceted ontologies describing both data sources and the structure of information extracted from them. Event series are defined ...
Added: January 20, 2021
Mecheraoui K., Carrasquel Gamez J. C., Lomazova I. A., , in: Proceedings of the Conference on Modeling and Analysis of Complex Systems and Processes 2020 (MACSPro 2020)Vol. 2795.: CEUR Workshop Proceedings, 2020. P. 34–45.
This paper presents a compositional conformance checking approach between nested Petri nets and event logs of multi-agent systems. By projecting an event log onto model components, one can perform conformance checking between each projected log and the corresponding component. We formally demonstrate the validity of our approach proving that, to check fitness of a nested ...
Added: January 14, 2021
Mecheraoui K., Carrasquel Gamez J. C., Lomazova I. A., / Series Computer Science "arxiv.org". 2020.
This paper presents a compositional conformance checking approach between nested Petri nets and event logs of multi-agent systems. By projecting an event log onto model components, one can perform conformance checking between each projected log and the corresponding component. We formally demonstrate the validity of our approach proving that, to check fitness of a nested ...
Added: October 20, 2020
Carrasquel Gamez J. C., Chuburov S., Lomazova I. A., , in: Tools and Methods of Program Analysis. 5th International Conference, TMPA 2019, Tbilisi, Georgia, November 7–9, 2019, Revised Selected PapersVol. 1288: CCIS.: Springer, 2021. P. 88–100.
Process mining is emerging as an important discipline for the analysis, monitoring, and improvement of business and software processes. Methods from process mining are based on the use of formal
models and event logs, i.e., describing respectively the expected and observed behavior of system processes. This approach can be leveraged by the software testing industry for ...
Added: October 19, 2020
Rybakov Dmitriy S., International Journal of Logistics Research and Applications 2018 Vol. 21 No. 1 P. 72–93
The purpose of this paper is to investigate the role of the process approach in optimisation programme implementation. It is proposed that application of a process model of a company provides overcoming of functional boundaries and, consequently, overcoming of sub-optimisation of logistics system performance. The process model of an internal logistics system of a wholesale ...
Added: November 25, 2019
N. S. Zubkova, S. A. Shershakov, Proceedings of the Institute for System Programming of the RAS 2019 Vol. 31 No. 4 P. 139–150
UML Activity Diagrams are widely used models for representing software processes. Models built from event logs, recorded by information systems, can provide valuable insights into real flows in processes and suggest ways of improving those systems. This paper proposes a novel method for mining UML Activity Diagrams from event logs. The method is based on ...
Added: October 28, 2019
Alexandra Kolosova, Irina Lomazova, , in: Analysis of Images, Social Networks and Texts. 8th International Conference, AIST 2019, Lecture Notes in Computer Science, Revised Selected PapersVol. 11832.: Cham: Springer, 2019. P. 401–410.
Added: October 24, 2019