Filters








102 Hits in 3.8 sec

Occam's Razor Applied to the Petri Net Coverability Problem [article]

Thomas Geffroy, Jérôme Leroux, Grégoire Sutre
2016 arXiv   pre-print
The verification of safety properties for concurrent systems often reduces to the coverability problem for Petri nets. This problem was shown to be ExpSpace-complete forty years ago.  ...  Driven by the concurrency revolution, it has regained a lot of interest over the last decade. In this paper, we propose a generic and simple approach to solve this problem.  ...  Backward Coverability Analysis with Pruning We now present our method to solve the coverability problem for Petri nets.  ... 
arXiv:1607.05956v1 fatcat:j4bq7o3f5bdwfbjdqhb5coplpq

Towards Improving the Representational Bias of Process Mining [chapter]

Wil van der Aalst, Joos Buijs, Boudewijn van Dongen
2012 Lecture Notes in Business Information Processing  
Most techniques suffer from the problem that often the discovered model is internally inconsistent (i.e., the model has deadlocks, livelocks or other behavioral anomalies).  ...  Although the result can be translated to conventional languages, we ensure the internal consistency of the resulting model while mining, thus reducing the search space and allowing for more efficient algorithms  ...  The simplicity dimension refers to Occam's Razor ; the simplest model that can explain the behavior seen in the log, is the best model.  ... 
doi:10.1007/978-3-642-34044-4_3 fatcat:ah7xkjec5fhkfifdb7fnezkl7u

Incorporating Negative Information in Process Discovery

Hernan Ponce de Leon, Josep Carmona, Seppe K.L.M. Vanden Broucke
2015 Social Science Research Network  
Most of the contributions consider the extraction of a model as a semi-supervised problem where only positive information is available.  ...  Experiments performed in our prototype implementation show the effectiveness of the techniques and the ability to improve the results produced by selected discovery techniques.  ...  Occam's Razor principle).  ... 
doi:10.2139/ssrn.2592996 fatcat:mhotjnb4i5bo7omgyknsiebjlq

Incorporating Negative Information in Process Discovery [chapter]

Hernan Ponce-de-León, Josep Carmona, Seppe K. L. M. vanden Broucke
2015 Lecture Notes in Computer Science  
Most of the contributions consider the extraction of a model as a semi-supervised problem where only positive information is available.  ...  Experiments performed in our prototype implementation show the effectiveness of the techniques and the ability to improve the results produced by selected discovery techniques.  ...  Occam's Razor principle).  ... 
doi:10.1007/978-3-319-23063-4_8 fatcat:33f3ubfli5cfvifhxj5byh55ju

Log-Based Simplification of Process Models [chapter]

Javier De San Pedro, Josep Carmona, Jordi Cortadella
2015 Lecture Notes in Computer Science  
The algorithms, either cast as optimization problems or heuristically guided, find simplified versions of the initial process model, and can be applied in the final stage of the process mining life-cycle  ...  , between the discovery of a process model and the deployment to the final user.  ...  We would also like to thank to Seppe vanden Broucke, Jorge Munoz-Gama and Thomas Gschwind for their great help in the experiments.  ... 
doi:10.1007/978-3-319-23063-4_30 fatcat:q2x3m5qnije6fgmpetmnntcf5u

Conformance checking

Sebastian Dunzer, Matthias Stierle, Martin Matzner, Stephan Baier
2019 Proceedings of the 11th International Conference on Subject-Oriented Business Process Management - S-BPM ONE '19  
It identifies deviations between the process instances' actual behaviour ("as-is") and its modelled behaviour ("to-be").  ...  Future research may construct techniques that support these neglected approaches to conformance checking.  ...  Another metric to assess model quality relates to the principle of Occam's razor and is called simplicity.  ... 
doi:10.1145/3329007.3329014 dblp:conf/s-bpm-one/DunzerSMB19 fatcat:cyfmzukjefa4fjyp5bdmxwalya

Discovering Petri Nets from Event Logs [chapter]

Wil M. P. van der Aalst, Boudewijn F. van Dongen
2013 Lecture Notes in Computer Science  
The goal is to introduce several approaches to discover Petri nets from event data (notably the α-algorithm, state-based regions, and language-based regions).  ...  We focus on Petri nets as a representation language, because of the concurrent and unstructured nature of real-life processes.  ...  The authors would like to thank all the people that contributed to the development of ProM (www.processmining.org).  ... 
doi:10.1007/978-3-642-38143-0_10 fatcat:mdpeun735naizjky56ih6gsvwi

Exploring the CSCW spectrum using process mining

Wil M.P. van der Aalst
2007 Advanced Engineering Informatics  
Traditionally, process mining has been applied to structured processes.  ...  For example, the audit trails of a workflow management system or the transaction logs of an enterprise resource planning system can be used to discover models describing processes, organizations, and products  ...  and Martijn investigated the application of process mining to FLOWer and SAP R/3.  ... 
doi:10.1016/j.aei.2006.05.002 fatcat:nhbswlzt4rgzfler7l63zhippq

Conformance checking of service behavior

Wil M. P. van der Aalst, Marlon Dumas, Chun Ouyang, Anne Rozinat, Eric Verbeek
2008 ACM Transactions on Internet Technology  
This paper shows that it is possible to translate BPEL business protocols to Petri nets and to relate SOAP messages to transitions in the Petri net.  ...  As a result, Petri net-based conformance checking techniques can be used to quantify fitness (whether the observed behavior is possible in the business protocol) and appropriateness (whether the observed  ...  Occam's razor as discussed in Section 1).  ... 
doi:10.1145/1361186.1361189 fatcat:uuxjvuqoqzhedlmxt34jxh4o44

Process Discovery: Capturing the Invisible

Will van de Aalst
2010 IEEE Computational Intelligence Magazine  
Process mining has been successfully applied in a variety of domains ranging from healthcare and e-business to high-tech systems and auditing.  ...  It is still very difficult to capture the complex reality in a suitable model.  ...  Acknowledgment The author would like to thank the many people involved in the development of ProM and the organizations sponsoring our work on process mining.  ... 
doi:10.1109/mci.2009.935307 fatcat:xz75lhrqhfgqfg3klxbulhtnjy

Conformance Testing: Measuring the Fit and Appropriateness of Event Logs and Process Models [chapter]

A. Rozinat, W. M. P. van der Aalst
2006 Lecture Notes in Computer Science  
Appropriateness tries to capture the idea of Occam's razor, i.e., "one should not increase, beyond what is necessary, the number of entities required to explain anything".  ...  An event log and Petri net "fit" if the Petri net can generate each trace in the log. In other words: the Petri net should be able to "parse" every event sequence.  ...  Acknowledgements The authors would like to thank Ton Weijters, Boudewijn van Dongen, Ana Karla Alves de Medeiros, Minseok Song, Laura Maruster, Eric Verbeek, Monique Jansen-Vullers, Hajo Reijers, Michael  ... 
doi:10.1007/11678564_15 fatcat:rwxt6w4pdng7nbthyf6pel7m3e

Event Log Visualisation with Conditional Partial Order Graphs: from Control Flow to Data

Andrey Mokhov, Josep Carmona
2015 Applications and Theory of Petri Nets  
particular for addressing the problem of compact and easy-to-comprehend visualisation of event logs with data.  ...  Several notations and formalisms for event log representation have been proposed in the recent years to enable efficient algorithms for the aforementioned process mining problems.  ...  The authors would like to thank various organisations that supported this research work.  ... 
dblp:conf/apn/MokhovC15 fatcat:mb7db7szr5eszackpp6ahs3va4

Mediating between modeled and observed behavior: The quest for the "right" process: Keynote

Wil M.P. van der Aalst
2013 IEEE 7th International Conference on Research Challenges in Information Science (RCIS)  
Also note that discrepancies between model and event log may point to problems in the model (e.g., the model is a poor representation of reality and as such has no predictive power) or problems in the  ...  The second part of the title of this paper -The Quest for the "Right" Process -refers to both types of problems. real process event data process model record process discovery conformance checking process  ...  A labeled Petri net is used to represent the process. A Petri net is a bipartite graph consisting of places and transitions.  ... 
doi:10.1109/rcis.2013.6577675 dblp:conf/rcis/Aalst13 fatcat:ymnbhbwsrnayjn5nov4gvjkha4

Unfolding-Based Process Discovery [chapter]

Hernán Ponce-de-León, César Rodríguez, Josep Carmona, Keijo Heljanko, Stefan Haar
2015 Lecture Notes in Computer Science  
After deriving an intermediate net unfolding from them, we perform a controlled folding giving rise to a Petri net which contains both the input log and all independence-equivalent traces arising from  ...  Remarkably, the derived Petri net cannot execute any trace from the negative collection. The entire chain of transformations is fully automated.  ...  Finally, a model M is simple when it has the minimal complexity in representing obs(M), i.e., the well-known Occam's razor principle.  ... 
doi:10.1007/978-3-319-24953-7_4 fatcat:yvoscarhvbgg3ndpvckesa67rq

An Interdisciplinary Comparison of Sequence Modeling Methods for Next-Element Prediction [article]

Niek Tax, Irene Teinemaa, Sebastiaan J. van Zelst
2018 arXiv   pre-print
have been developed and successfully applied to a wide-range of tasks, (ii) in process mining process discovery techniques aim to generate human-interpretable descriptive models, and (iii) in the grammar  ...  aim to yield interpretable models.  ...  structures of the neural network, thereby applying Occam's razor and steering the neural network towards simpler solutions.  ... 
arXiv:1811.00062v1 fatcat:ccng5cyq7zebfkyoeqfobr5ciy
« Previous Showing results 1 — 15 out of 102 results