Matching of Events and Activities - An Approach Using Declarative Modeling Constraints
Nowadays, business processes are increasingly supported by IT services that produce massive amounts of event data during the execution of a process. This event data can be used to analyze the process using process mining techniques to discover the real process, measure conformance to a given process model, or to enhance existing models with performance information. Mapping the produced events to activities of a given process model is essential for conformance checking, annotation and understanding of process mining results. In order to accomplish this mapping with low manual effort, we developed a semi-automatic approach that maps events to activities using the solution of a corresponding constraint satisfaction problem. The approach extracts Declare constraints from both the log and the model to build matching constraints to efficiently reduce the number of possible mappings. The evaluation with an industry process model collection and simulated event logs demonstrates the effectiveness of the approach and its robustness towards non-conforming execution logs.
KeywordsProcess mining Event mapping Business process intelligence Constraint satisfaction
Unable to display preview. Download preview PDF.
- 1.van der Aalst, W.M.P.: Verification of workflow nets. In: Azéma, P., Balbo, G. (eds.) ICATPN, LNCS, vol. 1248, pp. 407–426. Springer (1997)Google Scholar
- 2.van der Aalst, W.M.P.: Process Mining: Discovery, Conformance and Enhancement of Business Processes, 1st edn. Springer (2011)Google Scholar
- 4.Baier, T., Mendling, J.: Bridging Abstraction Layers in Process Mining: Event to Activity Mapping. In: Nurcan, S., Proper, H.A., Soffer, P., Krogstie, J., Schmidt, R., Halpin, T., Bider, I. (eds.) BPMDS 2013 and EMMSAD 2013. LNBIP, vol. 147, pp. 109–123. Springer, Heidelberg (2013) CrossRefGoogle Scholar
- 9.Di Ciccio, C., Mecella, M.: On the discovery of declarative control flows for artful processes. ACM Trans. Manage. Inf. Syst. 5(4), 24:1–24:37 (2015)Google Scholar
- 11.Euzenat, J., Shvaiko, P.: Ontology Matching. Springer (2007)Google Scholar
- 13.Freuder, E., Mackworth, A.: Handbook of Constraint Programming, Foundations of Artificial Intelligence, vol. 2, ch. Constraint satisfaction: An emerging paradigm, pp. 13–27. Elsevier (2006)Google Scholar
- 14.Günther, C.W., van der Aalst, W.M.P.: Mining activity clusters from low-level event logs. In: BETA Working Paper Series. vol. WP 165. Eindhoven University of Technology (2006)Google Scholar
- 22.Pérez-Castillo, R., Weber, B., de Guzmán, I.G.R., Piattini, M., Pinggera, J.: Assessing event correlation in non-process-aware information systems. Software and System Modeling 13(3), 1117–1139 (2014)Google Scholar
- 26.Weidlich, M., Dijkman, R., Weske, M.: Behaviour Equivalence and Compatibility of Business Process Models with Complex Correspondences. ComJnl (2012)Google Scholar