A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Improving the performance of process discovery algorithms by instance selection
2020
Computer Science and Information Systems
Process discovery algorithms automatically discover process models based on event data that is captured during the execution of business processes. ...
This paper evaluates various subset selection methods and evaluates their performance on real event data. The proposed methods have been implemented in both the ProM and the RapidProM platforms. ...
Acknowledgments We would like to thank the Alexander von Humboldt (AvH) scholarship for supporting us to do this research. ...
doi:10.2298/csis200127028s
fatcat:hkxmsv7bdfdfnj6lyb5legibnu
Data Mining for Process Modeling: A Clustered Process Discovery Approach
2020
Proceedings of the 2020 Federated Conference on Computer Science and Information Systems
Process mining has emerged as a new scientific research topic on the interface between process modeling and event data gathering. ...
And as a result, the use of the clustering techniques coupled with process discovery showed significant gains in the generation of process models, unlike the standard approach. ...
One of the main focuses of the study of process mining and the object of this study is process discovery, where, based on observed behavior, a process model capable of reproducing event logs is inferred ...
doi:10.15439/2020f95
dblp:conf/fedcsis/CirneMLLMN20
fatcat:4jijs5jyfjexhheuylcb2lxkpu
The impact of biased sampling of event logs on the performance of process discovery
2021
Computing
AbstractWith Process discovery algorithms, we discover process models based on event data, captured during the execution of business processes. ...
However, little research has been conducted on selecting the right sample, given the available time and characteristics of event data. ...
To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/. ...
doi:10.1007/s00607-021-00910-4
fatcat:gprk7efzazfgrkicnrhskrrguq
Using Meta-learning to Recommend Process Discovery Methods
[article]
2021
arXiv
pre-print
Our experimental analysis also provided significant insights on the importance of log features in generating recommendations, paving the way to a deeper understanding of the discovery algorithms. ...
However, selecting the suitable method for a specific event log highly relies on human expertise, hindering its broad application. ...
The authors would like to thank CNPq (National Council for the Scientific and Technological Development) for their financial support under Grant of Project 420562/2018-4 and 309863/2020-1 and the program ...
arXiv:2103.12874v1
fatcat:d5oo6pvjwff27prxgiub3i5vju
Towards Goal-Oriented Process Mining
2018
2018 IEEE 26th International Requirements Engineering Conference (RE)
The growth of our digital world makes it possible to record many types of events. In particular, the number of business processes whose events are being logged is significantly increasing. ...
Process mining is an approach that exploits event logs to discover real processes executed in organizations, enabling them to (re)design and improve process models. ...
ACKNOWLEDGMENT This research is supported by the Natural Sciences and Engineering Research Council of Canada (NSERC). ...
doi:10.1109/re.2018.00066
dblp:conf/re/Ghasemi18
fatcat:ppdrg5ionbazviw4utt6yfvoju
Scalable process discovery and conformance checking
2016
Journal of Software and Systems Modeling
We experimentally show that these discovery and measuring techniques sacrifice little compared to other algorithms, while gaining the ability to cope with event logs of 100,000,000 traces and processes ...
In this paper, we introduce a framework for process discovery that ensures these properties while passing over the log only once and introduce three algorithms using the framework. ...
Evaluation To understand the impact of 'big data' event logs on process discovery and quality assessment, we conducted a series of experiments to answer the following research questions: RQ1 What is the ...
doi:10.1007/s10270-016-0545-x
pmid:29706859
pmcid:PMC5910523
fatcat:23pxm6bspjazlbx2qd52ops7m4
Privacy-Preserving Process Mining in Healthcare
2020
International Journal of Environmental Research and Public Health
We also advocate the recording of privacy metadatato capture information about privacy-preserving transformations performed on an event log. ...
We demonstratehow some of these anonymisation methods affect various process mining results using three publiclyavailable healthcare event logs. ...
The article [11] evaluates the impact of the log transformation on the results of process discovery and performance analysis algorithms using three real-life logs including a hospital log. ...
doi:10.3390/ijerph17051612
pmid:32131516
pmcid:PMC7084661
fatcat:cicpwfjvorhezh5gofom7minke
Understanding Contrail Business Processes through Hierarchical Clustering: A Multi-Stage Framework
2020
Algorithms
For clustering, the raw event log is initially decomposed into high-level business classes, and later feature engineering is performed exclusively based on the business-context features, to support the ...
of the process are not considered while clustering the process log. ...
Acknowledgments: This research is supported by the BTIIC (BT Ireland Innovation Centre) project, funded by BT and Invest Northern Ireland. ...
doi:10.3390/a13100244
fatcat:trxnnwssl5bnxfmnvcm67txwby
An Integrated Framework for Process Discovery Algorithm Evaluation
[article]
2018
arXiv
pre-print
The growing amount of algorithms for process discovery has raised the question of which algorithms perform best on a given event log. ...
It supports two main evaluation objectives: benchmarking process discovery algorithms and sensitivity analysis, i.e. studying the effect of model and log characteristics on a discovery algorithm's accuracy ...
In the context of process discovery this implies that one needs to test a specific algorithm on more than one event log to accurately assess the effect of that algorithm on model quality. ...
arXiv:1806.07222v1
fatcat:ckkbh7wxtvbzlaqnefo7ke6lju
Event Log Preprocessing for Process Mining: A Review
2021
Applied Sciences
The results of this study reveal that the preprocessing techniques in process mining have demonstrated a high impact on the performance of the process mining tasks. ...
Process Mining allows organizations to obtain actual business process models from event logs (discovery), to compare the event log or the resulting process model in the discovery task with the existing ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/app112210556
fatcat:lls2qf6llnddxbdnego2okk2ya
Discovering Duplicate Tasks in Transition Systems for the Simplification of Process Models
[chapter]
2016
Lecture Notes in Computer Science
The first problem addressed in the paper is the discovery of duplicate tasks. A new method is proposed that avoids overfitting by working on the transition system generated by the log. ...
An important feature of the methods proposed in this paper is that they are independent from the actual miner used for process discovery. ...
This work has been partially supported by funds from the Spanish Ministry for Economy and Competitiveness and the European Union (FEDER funds) under grant TIN2013-46181-C2-1-R, and the Generalitat de Catalunya ...
doi:10.1007/978-3-319-45348-4_7
fatcat:4vhrw2rdh5h2bgtgiow5rq67pi
Automated Discovery of Process Models from Event Logs: Review and Benchmark
[article]
2018
arXiv
pre-print
One of the most widely studied process mining operations is automated process discovery. ...
Process mining allows analysts to exploit logs of historical executions of business processes to extract insights regarding the actual performance of these processes. ...
and RoMA -Resilence of Metropolitan Areas (SCN_00064). ...
arXiv:1705.02288v3
fatcat:7wz5qz76tnaxhmvoo4il2awonu
A Detailed Description on Unsupervised Heterogeneous Anomaly Based Intrusion Detection Framework
2019
Scalable Computing : Practice and Experience
Several logs from multiple sources are used as input and this data are processed by all the modules of the framework. ...
The result achieved shows the direction or pathway to design anomaly detectors that can utilize raw traffic logs collected from heterogeneous sources on the network monitored and correlate the events across ...
To perform the selection process, a feature in the log is set as class attribute to recognise the association of the fixed feature with further features and the features selected are noted. ...
doi:10.12694/scpe.v20i1.1465
fatcat:6hhyrhwfxnc5rigrox7uhk3kru
Automated Discovery of Process Models from Event Logs: Review and Benchmark
2018
IEEE Transactions on Knowledge and Data Engineering
One of the most widely studied process mining operations is automated process discovery. ...
Process mining allows analysts to exploit logs of historical executions of business processes to extract insights regarding the actual performance of these processes. ...
ACKNOWLEDGMENTS This research is partly funded by the Australian Research Council (grant DP150103356) and the Estonian Research Council (grant IUT20-55). ...
doi:10.1109/tkde.2018.2841877
fatcat:s2sca5k24bgafplv7f5x72s2ny
Using Rough Set Theory to Find Minimal Log with Rule Generation
2021
Symmetry
Data pre-processing is a major difficulty in the knowledge discovery process, especially feature selection on a large amount of data. ...
Algorithm complexity is related to the search of the minimal subset of attributes, which requires computing an exponential number of possible subsets. ...
Related Works As feature selection denotes the operation of selecting a subset of attributes from the original large set of attributes, the selected subset should be of the most important and relevant ...
doi:10.3390/sym13101906
fatcat:5y4lxxnfvjdf7noevy6cakzlc4
« Previous
Showing results 1 — 15 out of 29,560 results