Filters








8,957 Hits in 3.7 sec

Scalable process discovery and conformance checking

Sander J. J. Leemans, Dirk Fahland, Wil M. P. van der Aalst
2016 Journal of Software and Systems Modeling  
Many discovery techniques have been proposed, but none of them combines scalability with strong quality guarantees.  ...  We experimentally show that these discovery and measuring techniques sacrifice little compared to other algorithms, while gaining the ability to cope with event logs of 100,000,000 traces and processes  ...  In this paper, we focus on two process mining challenges: process discovery and conformance checking.  ... 
doi:10.1007/s10270-016-0545-x pmid:29706859 pmcid:PMC5910523 fatcat:23pxm6bspjazlbx2qd52ops7m4

Current solutions for Web service composition

N. Milanovic, M. Malek
2004 IEEE Internet Computing  
Web service composition lets developers create applications on top of serviceoriented computing's native description, discovery, and communication capabilities.  ...  Such applications are rapidly deployable and offer developers reuse possibilities and users seamless access to a variety of complex services.  ...  conformance checking.  ... 
doi:10.1109/mic.2004.58 fatcat:e4evym4phbelvevbrbb7eql4qy

Process Discovery for Industrial Control System Cyber Attack Detection [chapter]

David Myers, Kenneth Radke, Suriadi Suriadi, Ernest Foo
2017 IFIP Advances in Information and Communication Technology  
Firstly, we identify the requirements of this unique environment, and then evaluate the appropriateness of several commonly used process discovery algorithms to satisfy these requirements.  ...  on industrial control systems, both in processing time and accuracy.  ...  Secondly, we describe our process discovery, and validation using conformance checking activities.  ... 
doi:10.1007/978-3-319-58469-0_5 fatcat:av3jwltnqbafvgsmorjfsxvwhy

A systematic approach for performance evaluation using process mining: the POSIDONIA operations case study

Simona Bernardi, José Ignacio Requeno, Christophe Joubert, Alberto Romeu
2016 Proceedings of the 2nd International Workshop on Quality-Aware DevOps - QUDOS 2016  
Then, a conformance checking technique is iteratively applied to align -from the qualitative point of view-the normative model and the data log until the required fitness threshold is not reached.  ...  The proposed approach has been applied to a customizable Integrated Port Operations Management System, POSIDONIA Operations, where the performance model has been used to analyze the scalability of the  ...  On the other hand, process mining [24] mainly provides methods for: process discovery, that is deriving process models from logs, conformance checking, that is checking the alignment of an existing/derived  ... 
doi:10.1145/2945408.2945413 dblp:conf/issta/BernardiRJR16 fatcat:ugumedshxjbwfmbodprwhiji7m

Conformance Checking Using Activity and Trace Embeddings [chapter]

Jari Peeperkorn, Seppe vanden Broucke, Jochen De Weerdt
2020 Lecture Notes in Business Information Processing  
Conformance checking describes process mining techniques used to compare an event log and a corresponding process model.  ...  These methods are tested in different settings and compared to other conformance checking techniques, showing promising results.  ...  Introduction Conformance checking is a set of process mining techniques capable of comparing event logs and corresponding process models.  ... 
doi:10.1007/978-3-030-58638-6_7 fatcat:wqyj3ye7rfdktc5jpqqcrotd5q

Towards Connected Enterprises: The Business Network System [article]

Daniel Ritter
2013 arXiv   pre-print
BNS provides a new, declarative foundation for gathering information, defining a network model, inferring the network and check its conformance to the real-world "as-is" network.  ...  We present a novel data discovery, mining and network inference system, called Business Network System (BNS), that reconstructs the BN--integration and business process networks--from raw data, hidden  ...  It has similar requirements for data discovery, conformance and enhancement with respect to NM [13] , but does not work with network models and inference.  ... 
arXiv:1312.7542v1 fatcat:r36pbngicnbfpbppwukkirdmgu

Mining Approach for Software Architectures' Description Discovery

Mariam Chaabane, Ismael Bouassida Rodriguez, Khalil Drira, Mohamed Jmaiel
2017 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA)  
In addition, this paper offers a solution for checking conformity between the aggregated Architecture Model and the Discovered Model.  ...  Moreover, studies dealing with checking conformity between the whole SoS' software architecture description and the aggregated Architecture Model, are still lacking.  ...  Conformance Taking inspiration from the process mining field [12] , we applied the conformance checking techniques to diagnose the differences between the Discovered Model and the aggregated Architecture  ... 
doi:10.1109/aiccsa.2017.169 dblp:conf/aiccsa/ChaabaneRDJ17 fatcat:62pvgcykuvg3xpsn3hja2t3sy4

Ensuring Model Consistency in Declarative Process Discovery [chapter]

Claudio Di Ciccio, Fabrizio Maria Maggi, Marco Montali, Jan Mendling
2015 Lecture Notes in Computer Science  
Declarative process models consist of a set of constraints exerted over the execution of process activities.  ...  The automated discovery of DECLARE models aims at finding those constraints that are verified throughout a given event log.  ...  Di Ciccio and Dr. de Leoni has received funding from the EU Seventh Framework Programme under grant agreement 318275 (GET Service) and grant agreement 603993 (CORE), respectively.  ... 
doi:10.1007/978-3-319-23063-4_9 fatcat:4tdoksuhvbgojeqnvygqxq7gyi

Applying MapReduce to Conformance Checking
Применение MapReduce для проверки соответствия моделей процессов и логов событий

I.S. Shugurov, A.A. Mitsyuk
2016 Proceedings of the Institute for System Programming of RAS  
Conformance checking is one of the main sub-fields of process mining.  ...  Conformance checking algorithms are aimed to assess how well a given process model, typically represented by a Petri net, and a corresponding event log fit each other.  ...  Typically, three main sub-fields of process mining are distinguished in the literature: (1) process discovery; (2) conformance checking and (3) enhancement [1] .  ... 
doi:10.15514/ispras-2016-28(3)-7 fatcat:mngicibgavh5nbulzb4gcdvv4y

Exploiting architectural prescriptions for self-managing, self-adaptive systems

Matthew J. Hawthorne, Dewayne E. Perry
2004 Proceedings of the 1st ACM SIGSOFT workshop on Self-managed systems - WOSS '04  
We use abstract constraint-and intent-based architectural prescriptions to enable architectural reflection, reification, and distributed configuration discovery as the basis for designing adaptive, selfconfiguring  ...  We discuss some key architectural properties and patterns that facilitate the design and implementation of self-configuring systems, and use these as the basis for an example prototype architecture for  ...  Techniques that support scalability include distributed architectures, decentralized configuration, and distributed service discovery.  ... 
doi:10.1145/1075405.1075420 dblp:conf/woss/HawthorneP04 fatcat:zewkcr5q2beofkeaijbshe4uvu

Business Process Analytics and Big Data Systems: A Roadmap to Bridge the Gap

Sherif Sakr, Zakaria Maamar, Ahmed Awad, Boualem Benatallah, Wil M. P. Van Der Aalst
2018 IEEE Access  
These are generated as business processes are executed and stored in transaction logs, databases, e-mail correspondences, free form text on (enterprise) social media, and so on.  ...  In this paper, we advocate that a good understanding of the business process and Big Data worlds can play an effective role in improving the efficiency and the quality of various data-intensive business  ...  ACKNOWLEDGMENT The work of Sherif Sakr and Ahmed Awad is funded by the European Regional Development Funds via the Mobilitas Plus programme (grant MOBTT75).  ... 
doi:10.1109/access.2018.2881759 fatcat:2fcc4au7bfgklf3zemq7xfxcii

Named Service Networking

Shuo Chen, Junwei Cao, Lipeng Zhu
2015 2015 IEEE International Conference on Networking, Architecture and Storage (NAS)  
A prototype of NSN is implemented over Named Data Networking (NDN) and evaluated to test its transmission efficiency, scalability and availability.  ...  In the practical implementation of multiple ICN projects, applications based on ICN may not just focus on data distribution, but also service and functional components.  ...  scalable web, service discovery, selection, mediation and composition  ... 
doi:10.1109/nas.2015.7255227 dblp:conf/nas/ChenCZ15 fatcat:tj6kkxytzraopfwfhqa4wcjwsu

Extracting Multiple Viewpoint Models from Relational Databases [article]

Alessandro Berti, Wil van der Aalst
2020 arXiv   pre-print
We provide a toolchain allowing for the discovery of MVP models (annotated with performance and frequency information) from relational databases.  ...  Much time in process mining projects is spent on finding and understanding data sources and extracting the event data needed.  ...  ProM 6 plug-ins have been realized to import XOC logs, for the discovery of a process model, and for conformance checking on top of OCBC models.  ... 
arXiv:2001.02562v1 fatcat:vw6lvflng5ezrjdvu45hbtzcgm

Distributed Process Discovery and Conformance Checking [chapter]

Wil M. P. van der Aalst
2012 Lecture Notes in Computer Science  
The two most important types of process mining are process discovery (i.e., learning a process model from example behavior recorded in an event log) and conformance checking (i.e., comparing modeled behavior  ...  Process mining techniques have matured over the last decade and more and more organization started to use this new technology.  ...  their work on conformance checking), and Maja Pesic, Fabrizio Maggi, and Michael Westergaard (for their work on Declare).  ... 
doi:10.1007/978-3-642-28872-2_1 fatcat:h3succnwgrdsjh6ttpyx7zixg4

Scalable Conformance Checking of Business Processes [chapter]

Daniel Reißner, Raffaele Conforti, Marlon Dumas, Marcello La Rosa, Abel Armas-Cervantes
2017 Lecture Notes in Computer Science  
Existing conformance checking techniques that achieve these properties do not scale up to real-life process models and logs.  ...  Given a process model representing the expected behavior of a business process and an event log recording its actual execution, the problem of business process conformance checking is that of detecting  ...  This research is partly funded by the Australian Research Council (grant DP150103356) and the Estonian Research Council (grant IUT20-55).  ... 
doi:10.1007/978-3-319-69462-7_38 fatcat:worhn7ewtbfercypgyzm7xw6dm
« Previous Showing results 1 — 15 out of 8,957 results