?
Using Event Logs for Local Correction of Process Models
Automatic Control and Computer Sciences. 2017. Vol. 51. No. 7. P. 709-723.
Publication based on the results of:
Mitsyuk A. A., Lomazova I. A., van der Aalst W., Моделирование и анализ информационных систем 2017 Т. 24 № 4 С. 459-480
During the life-cycle of an Information System (IS) its actual behaviour may not correspond to the original system model. However, to the IS support it is very important to have the latest model that reflects the current system behaviour. To correct the model, the information from the event log of the system may be used. ...
Added: August 28, 2017
Mitsyuk A. A., Lomazova I. A., Ivan S. Shugurov et al., , in : Supplementary Proceedings of the Sixth International Conference on Analysis of Images, Social Networks and Texts (AIST-SUP 2017), Moscow, Russia, July 27-29, 2017. Vol. 1975.: Aachen : CEUR-WS.org, 2017. Ch. 32. P. 301-313.
Added: November 1, 2017
Begicheva A., Lomazova I. A., Nesterov R., / Cornell University. Series Computer Science "arxiv.org". 2023.
Process mining is a field of computer science that deals with discovery and analysis of process models based on automatically generated event logs. Currently, many companies use this technology for optimization and improving their processes. However, a discovered process model may be too detailed, sophisticated and difficult for experts to understand. In this paper, we ...
Added: March 31, 2023
Kalenkova A. A., Lomazova I. A., Fundamenta Informaticae 2014 Vol. 133 No. 2-3 P. 197-209
Process mining is a relatively new field of computer science which deals with process discovery and analysis based on event logs. In this work we consider the problem of discovering workflow nets with cancellation regions from event logs. Cancellations occur in the majority of real-life event logs. In spite of huge amount of process mining ...
Added: September 30, 2014
Mitsyuk A. A., Shugurov I., Automatic Control and Computer Sciences 2016 Vol. 50 No. 7 P. 460-470
Process mining is a new emerging discipline related to process management, formal process models, and data mining. One of the main tasks of process mining is the model synthesis (discovery) based on event logs. A wide range of algorithms for process model discovery, analysis, and enhancement is developed. The real-life event logs often contain noise ...
Added: October 10, 2016
Begicheva A., Lomazova I. A., Modeling and Analysis of Information Systems 2015 Vol. 22 No. 3 P. 392-403
Process mining is a relatively new field of computer science, which deals with process discovery and analysis based on event logs. In this paper we consider the problem of models and event logs conformance checking. Conformance checking is intensively studied in the frame of process mining research, but only models and event logs of the ...
Added: August 5, 2015
Kalenkova A. A., van der Aalst W., Lomazova I. A. et al., Software and Systems Modeling 2017 Vol. 16 No. 4 P. 1019-1048
Process-aware information systems (PAIS) are systems relying on processes, which involve human and software resources to achieve concrete goals. There is a need to develop approaches for modeling, analysis, improvement and monitoring processes within PAIS. These approaches include process mining techniques used to discover process models from event logs, find log and model deviations, and ...
Added: June 11, 2015
N. S. Zubkova, S. A. Shershakov, Proceedings of the Institute for System Programming of the RAS 2019 Vol. 31 No. 4 P. 139-150
UML Activity Diagrams are widely used models for representing software processes. Models built from event logs, recorded by information systems, can provide valuable insights into real flows in processes and suggest ways of improving those systems. This paper proposes a novel method for mining UML Activity Diagrams from event logs. The method is based on ...
Added: October 28, 2019
van der Aalst W., Distributed and Parallel Databases 2013 Vol. 31 No. 4 P. 471-507
The practical relevance of process mining is increasing as more and more event data become available. Process mining techniques aim to discover, monitor and improve real processes by extracting knowledge from event logs. The two most prominent process mining tasks are: (i) process discovery: learning a process model from example behavior recorded in an event ...
Added: November 14, 2013
Torun : CEUR Workshop Proceedings, 2016
The The workshop first took place in 2015 as a succession of the Applications of Region Theory (ART) workshop series. After the success of the initial workshop, it is only natural to bring together researchers working on region-based synthesis and process mining again. The ATAED'2016 workshop took place in Torun on June 20-21, 2016 and ...
Added: June 30, 2016
Mitsyuk A. A., Shugurov I., Моделирование и анализ информационных систем 2014 Т. 21 № 4 С. 181-198
Process mining is a new emerging discipline related to process management, formal process models, and data mining. One of the main tasks of process mining is the model synthesis (discovery) based on the event logs. A wide range of algorithms for process model discovery, analysis, and enhancement are developed. The real-life event logs often contain ...
Added: October 20, 2014
Begicheva A.K., Lomazova I.A., Modeling and Analysis of Information Systems 2017 Vol. 24 No. 2 P. 125-140
Process mining is a relatively new field of computer science, which deals with process discovery and analysis based on event logs. In this paper we consider the problem of discovering a high-level business process model from a low-level event log, i.e. automatic synthesis of process models based on the information stored in event logs of ...
Added: May 6, 2017
W. M. P. van der Aalst, Software and Systems Modeling. Germany 2014 P. 1-7
Since their inception in 1962, Petri nets have been used in a wide variety of application domains. Although Petri nets are graphical and easy to understand, they have formal semantics and allow for analysis techniques ranging from model checking and structural analysis to process mining and performance analysis. Over time Petri nets emerged as a ...
Added: October 17, 2014
W.M.P. van der Aalst, Informatik-Spektrum, Germany 2014 Vol. 37 No. 5 P. 191-198
Seit ihrem Entwurf im Jahr 1962 sind Petrinetze in ganz unterschiedlichen Bereichen eingesetzt worden. Obwohl sie graphisch dargestellt werden und intuitiv einfach verständlich sind, haben Petrinetze eine formal eindeutige Semantik mit einer Vielzahl mathematischer Analysetechniken. Sie reichen vom Model Checking und der Strukturellen Analyse über das Process Mining bis zur Performanz-Analyse. Im Lauf der Zeit ...
Added: October 17, 2014
R.A. Nesterov, S.Yu. Savelyev, Proceedings of the Institute for System Programming of the RAS 2021 Vol. 33 No. 3 P. 155-170
In this paper, we present an approach to the generation of Petri nets exhibiting desired structural and behavioral properties. Given a reference Petri net, we apply a collection of local refinement transformations, which extends the internal structure of the reference model. The correctness of applying these transformations is justified via Petri net morphisms and by ...
Added: August 9, 2021
Shershakov S., Моделирование и анализ информационных систем 2014 Т. 21 № 5 С. 102-115
Process mining is a new direction in the field of modeling and analysis of processes, where using information from event logs, describing the history of the system behavior, plays
an important role. Methods and approaches used in the process mining are often based on various heuristics, and experiments with large event logs are crucial for the ...
Added: October 20, 2014
Mecheraoui K., Lomazova I. A., Belala N., Journal of Parallel and Distributed Computing 2021 Vol. 155 P. 14-23
This paper provides a true-concurrency approach for the specification and verification of systems of concurrent communicating agents with durable actions. We present high-level Petri nets with durable actions (DaHL) to cope with various details in such complex systems. We define a DaHL module as an open variant of time-dependent colored Petri nets. A DaHL system ...
Added: May 13, 2021
Shershakov S. A., Rubin V. A., Modeling and Analysis of Information Systems 2015 Vol. 22 No. 6 P. 818-833
Information systems (IS) produce numerous traces and logs at runtime. In context of SOA-based (service-oriented architecture) IS, these logs contain details about sequences of process and service calls. Modern application monitoring and error tracking tools provide only rather straightforward log search and filtering functionality. However, ``clever'' analysis of the logs is highly useful, since it ...
Added: December 22, 2015
Westergaard M., Fahland D., Stahl C., Transactions on Petri Nets and Other Models of Concurrency 2013 Vol. 8 P. 180-202
Grading dozens of Petri net models manually is a tedious and error-prone task. In this paper, we present Grade/CPN, a tool supporting the grading of Colored Petri nets modeled in CPN Tools. The tool is extensible, configurable, and can check static and dynamic properties. It automatically handles tedious tasks like checking that good modeling practise ...
Added: October 14, 2013
Lomazova I. A., Fundamenta Informaticae 2010 Vol. 101 No. 1-2 P. 59-70
In this work we consider modeling of workflow systems with Petri nets. To increase flexibility and give tools for workflow models re-engineering we extend the formalism of workflow nets by considering systems of interacting nets. Then we study soundness - the main correctness property of workflow processes - and show, that for a special class ...
Added: November 19, 2012
Tsaregorodtsev A. V., Дербин Е. А., Мухин И. Н., Информация и безопасность 2015 Т. 18 № 3 С. 408-411
The use of cloud computing to build of IT-infrastructure of the organization implies the refusal of the organization direct control over the security aspects. There is a need for solving the problem of data privacy in the design architecture based on cloud computing technology. In the article the simulation method of data processing using Petri ...
Added: March 15, 2016
Springer, 2021
This book constitutes revised selected papers from the 9th International Conference on Analysis of Images, Social Networks and Texts, AIST 2020, held during October 15-16, 2020. The conference was planned to take place in Moscow, Russia, but changed to an online format due to the COVID-19 pandemic.
The 27 full papers and 4 short papers presented ...
Added: October 7, 2020
Sergey Andreevich Shershakov, International Journal of Computer and Communication Engineering 2015 Vol. 4 No. 3 P. 166-179
Process mining is a research area dealing with, inter alia, the construction of models of various types from event logs. Fuzzy maps are an example of such models produced by different process mining tools, such as ProM and Disco. We proposed a new approach to mining fuzzy models which is based on logs representation in ...
Added: October 20, 2014
Alexey Mitsyuk, Anna Kalenkova, Sergey A. Shershakov et al., Business Informatics 2014 Vol. 29 No. 3 P. 15-27
E-trade systems are widely used to automate sales processes. Inefficiencies and bottlenecks in the sales processes lead to business losses. Conventional approaches to identifying problems require much time and result in subjective conclusions. This paper proposes an approach for the analysis of e-trade system processes based on the application of process mining techniques. Process mining ...
Added: August 29, 2014