Advertisement

Detecting Implicit Dependencies Between Tasks from Event Logs

  • Lijie Wen
  • Jianmin Wang
  • Jiaguang Sun
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3841)

Abstract

Process mining aims at extracting information from event logs to capture the business process as it is being executed. In spite of many researchers’ persistent efforts, there are still some challenging problems to be solved. In this paper, we focus on mining non-free-choice constructs, where the process models are represented in Petri nets. In fact, there are totally two kinds of causal dependencies between tasks, i.e., explicit and implicit ones. Implicit dependency is very hard to mine by current mining approaches. Thus we propose three theorems to detect implicit dependency between tasks and give their proofs. The experimental results show that our approach is powerful enough to mine process models with non-free-choice constructs.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Schimm, G.: Mining exact models of concurrent workflows. Computers in Industry 53, 265–281 (2004)CrossRefGoogle Scholar
  2. 2.
    van der Aalst, W.M.P., van Dongen, B.F., Herbst, J., Maruster, L., Schimm, G., Weijters, A.J.M.M.: Workflow mining: A survey of issues and approaches. Data & Knowledge Engineering 47, 237–267 (2003)CrossRefGoogle Scholar
  3. 3.
    van der Aalst, W.M.P., Weijters, A.J.M.M.: Process mining: a research agenda. Computers in Industry 53, 231–244 (2004)CrossRefGoogle Scholar
  4. 4.
    de Medeiros, A.K.A., van der Aalst, W.M.P., Weijters, A.J.M.M.: Workflow Mining: Current Status and Future Directions. In: Meersman, R., Tari, Z., Schmidt, D.C. (eds.) CoopIS 2003, DOA 2003, and ODBASE 2003. LNCS, vol. 2888, pp. 389–406. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  5. 5.
    van der Aalst, W.M.P.: The Application of Petri Nets to Workflow Management. The Journal of Circuits, Systems, and Computers 8(l), 21–66 (1998)Google Scholar
  6. 6.
    van der Aalst, W.M.P., Weijters, A.J.M.M., Maruster, L.: Workflow Mining: Discovering Process Models from Event Logs. IEEE Transactions on Knowledge and Data Engineering 16(9), 1128–1142 (2004)CrossRefGoogle Scholar
  7. 7.
    de Medeiros, A.K.A., van Dongen, B.F., van der Aalst, W.M.P., Weijters, A.J.M.M.: Process Mining for Ubiquitous Mobile Systems: An Overview and a Concrete Algorithm. In: UMICS, pp. 151–165 (2004)Google Scholar
  8. 8.
    van Dongen, B.F., van der Aalst, W.M.P.: EMiT: A Process Mining Tool. In: Cortadella, J., Reisig, W. (eds.) ICATPN 2004. LNCS, vol. 3099, pp. 454–463. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  9. 9.
    Hammori, M., Herbst, J., Kleiner, N.: Interactive Workflow Mining. In: Desel, J., Pernici, B., Weske, M. (eds.) BPM 2004. LNCS, vol. 3080, pp. 211–226. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  10. 10.
    Herbst, J., Karagiannis, D.: Workflow mining with InWoLvE. Computers in Industry 53, 245–264 (2004)CrossRefGoogle Scholar
  11. 11.
    Golani, M., Pinter, S.S.: Generating a Process Model from a Process Audit Log. In: van der Aalst, W.M.P., ter Hofstede, A.H.M., Weske, M. (eds.) BPM 2003. LNCS, vol. 2678, pp. 136–151. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  12. 12.
    Pinter, S.S., Golani, M.: Discovering workflow models from activities’ lifespans. Computers in Industry 53, 283–296 (2004)CrossRefGoogle Scholar
  13. 13.
    Lijie, W., Jianmin, W., van der Aalst, W.M.P., Zhe, W., Jiaguang, S.: A Novel Approach for Process Mining Based on Event Types. BETA Working Paper Series, WP 118, Eindhoven University of Technology, Eindhoven (2004)Google Scholar
  14. 14.
    Greco, G., Guzzo, A., et al.: Mining Expressive Process Models by Clustering Workflow Traces. In: Dai, H., Srikant, R., Zhang, C. (eds.) PAKDD 2004. LNCS (LNAI), vol. 3056, pp. 52–62. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  15. 15.
    Gaaloul, W., Bhiri, S., Godart, C.: Discovering Workflow Transactional Behavior from Event-Based Log. In: Meersman, R., Tari, Z. (eds.) OTM 2004. LNCS, vol. 3290, pp. 3–18. Springer, Heidelberg (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Lijie Wen
    • 1
  • Jianmin Wang
    • 1
  • Jiaguang Sun
    • 1
  1. 1.School of SoftwareTsinghua UniversityBeijingChina

Personalised recommendations