Mining and Re-engineering Transactional Workflows for Reliable Executions

  • Walid Gaaloul
  • Sami Bhiri
  • Armin Haller
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4801)


A continuous evolution of business process parameters, constraints and needs, hardly foreseeable initially, requires from the business process management systems a continuous design and a reliable process model. In this paper, we are interested in developing a reactive design through a process log analysis ensuring process re-engineering and execution reliability.

We propose to analyse workflow logs to discover workflow transactional behavior and to improve and correct related recovery mechanisms subsequently. Our approach starts by collecting workflow logs. Then, we build, by statistical analysis techniques, an intermediate representation specifying elementary dependencies between activities. These dependencies are refined to mine the transactional workflow model. The analysis of the discrepancies between the discovered model and the initially designed model enables us to detect design gaps, concerning particularly the recovery mechanisms. Thus, based on this mining step, we apply a set of rules on the initially designed workflow to improve workflow reliability.


Credit Card Semantic Relation Recovery Mechanism Semantic Rule Failed Activity 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    ter Hofstede, A.H.M., Orlowska, M.E., Rajapakse, J.: Verification problems in conceptual workflow specifications. Data Knowl. Eng. 24(3), 239–256 (1998)CrossRefzbMATHGoogle Scholar
  2. 2.
    van der Aalst, W.M.P.: The Application of Petri Nets to Workflow Management. The Journal of Circuits, Systems and Computers 8(1), 21–66 (1998)CrossRefGoogle Scholar
  3. 3.
    Adam, N.R., Atluri, V., Huang, W.-K.: Modeling and analysis of workflows using petri nets. J. Intell. Inf. Syst. 10(2), 131–158 (1998)CrossRefGoogle Scholar
  4. 4.
    Eder, J., Liebhart, W.: Workflow recovery. In: Conference on Cooperative Information Systems, pp. 124–134 (1996)Google Scholar
  5. 5.
    van der Aalst, W.M.P., van Dongen, B.F.: Workflow mining: A survey of issues and approaches. In: Data and Knowledge Engineering (2003)Google Scholar
  6. 6.
    Eder, J., Olivotto, G.E., Gruber, W.: A data warehouse for workflow logs. In: Proceedings of the First International Conference on Engineering and Deployment of Cooperative Information Systems, pp. 1–15. Springer, Heidelberg (2002)Google Scholar
  7. 7.
    zur Muehlen, M.: Process-driven management information systems - combining data warehouses and workflow technology. In: Gavish, B. (ed.) Proceedings of the 4th International Conference on Electronic Commerce Research (ICECR-4), Dallas (TX), pp. 550–566. Southern Methodist University (2001)Google Scholar
  8. 8.
    Cook, J.E., Wolf, A.L.: Event-based detection of concurrency. In: Proceedings of the 6th ACM SIGSOFT international symposium on Foundations of software engineering, pp. 35–45. ACM Press, New York (1998)Google Scholar
  9. 9.
    Gaaloul, W.: La Découverte de Workflow Transactionnel pour la Fiabilisation des Exécutions. Phd thesis, Université Henri Poincaré - Nancy 1, LORIA(November 3, 2006)Google Scholar
  10. 10.
    Georgakopoulos, D., Hornick, M., Sheth, A.: An overview of workflow management: from process modeling to workflow automation infrastructure. Distrib. Parallel Databases 3(2), 119–153 (1995)CrossRefGoogle Scholar
  11. 11.
    Sheth, A., Rusinkiewicz, M.: On transactional workflows. Special Issue on Workflow and Extended Transaction Systems IEEE Computer Society  (1993)Google Scholar
  12. 12.
    Elmagarmid, A.K.: Database transaction models for advanced applications. Morgan Kaufmann Publishers Inc, San Francisco (1992)Google Scholar
  13. 13.
    van der Aalst, W.M.P., Barros, A.P., ter Hofstede, A.H.M., Kiepuszewski, B.: Advanced Workflow Patterns. In: Scheuermann, P., Etzion, O. (eds.) CoopIS 2000. LNCS, vol. 1901, pp. 18–29. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  14. 14.
    Elmagarmid, A., Leu, Y., Litwin, W.: A multidatabase transaction model for interbase. In: Proceedings of the sixteenth international conference on Very large databases, pp. 507–518. Morgan Kaufmann Publishers Inc, San Francisco (1990)Google Scholar
  15. 15.
    Du, W., Davis, J., Shan, M.-C.: Flexible specification of workflow compensation scopes. In: Proceedings of the international ACM SIGGROUP conference on Supporting group work: the integration challenge, pp. 309–316. ACM Press, New York (1997)CrossRefGoogle Scholar
  16. 16.
    Gaaloul, W., Baïna, K., Godart, C.: Towards mining structural workflow patterns. In: Andersen, K.V., Debenham, J.K., Wagner, R. (eds.) DEXA. LNCS, vol. 3588, pp. 24–33. Springer, Heidelberg (2005)Google Scholar
  17. 17.
    Gaaloul, W., Godart, C.: A workflow mining tool based on logs statistical analysis. In: Maurer, F., Ruhe, G. (eds.) SEKE, pp. 37–44 (2006)Google Scholar
  18. 18.
    Kiepuszewski, B., Muhlberger, R., Orlowska, M.E.: Flowback: providing backward recovery for workflow management systems. In: Proceedings of the 1998 ACM SIGMOD international conference on Management of data, pp. 555–557. ACM Press, New York (1998)CrossRefGoogle Scholar
  19. 19.
    Bhiri, S., Perrin, O., Godart, C.: Extending workflow patterns with transactional dependencies to define reliable composite web services. In: AICT/ICIW, p. 145. IEEE Computer Society (2006)Google Scholar
  20. 20.
    van der Aalst, W.M.P.: Exterminating the dynamic change bug: A concrete approach to support workflow change. Information Systems Frontiers 3(3), 297–317 (2001)CrossRefGoogle Scholar
  21. 21.
    Basten, T., van der Aalst, W.M.P.: Inheritance of behavior. J. Log. Algebr. Program. 47(2), 47–145 (2001)MathSciNetCrossRefzbMATHGoogle Scholar
  22. 22.
    Jin, W.W., Rusinkiewicz, M., Ness, L., Sheth, A.: Concurrency control and recovery of multidatabase work flows in telecommunication applications. In: Proceedings of the 1993 ACM SIGMOD international conference on Management of data, pp. 456–459. ACM Press, New York (1993)CrossRefGoogle Scholar
  23. 23.
    Leymann, F.: Supporting business transactions via partial backward recovery in workflow management systems. In: Proceedings of BTW 1995, pp. 51–70. Springer, Heidelberg (1995)Google Scholar
  24. 24.
    Gaaloul, W., Bhiri, S., Godart, C.: Discovering workflow transactional behaviour event-based log. In: Meersman, R., Tari, Z. (eds.) OTM 2004. LNCS, vol. 3290, Springer, Heidelberg (2004)Google Scholar
  25. 25.
    van der Aalst, W.M.P., de Medeiros, A.K.A.: Process mining and security: Detecting anomalous process executions and checking process conformance. Electr. Notes Theor. Comput. Sci. 121, 3–21 (2005)CrossRefzbMATHGoogle Scholar
  26. 26.
    Rozinat, A., van der Aalst, W.M.P.: Conformance testing: Measuring the fit and appropriateness of event logs and process models. In: Business Process Management Workshops, pp. 163–176 (2005)Google Scholar
  27. 27.
    Grigori, D., Casati, F., Castellanos, M., Dayal, U., Sayal, M., Shan, M.-C.: Business process intelligence. Comput. Ind. 53(3), 321–343 (2004)CrossRefGoogle Scholar
  28. 28.
    Baïna, K., Gaaloul, W., ElKhattabi, R., Mouhou, A.: A new workflow patterns and performance analysis tool. In: Dubois, E., Pohl, K. (eds.) CAiSE 2006. LNCS, vol. 4001, Springer, Heidelberg (2006)Google Scholar
  29. 29.
    Rouached, M., Gaaloul, W., van der Aalst, W.M.P., Bhiri, S., Godart, C.: Web service mining and verification of properties: An approach based on event calculus. In: Meersman, R., Tari, Z. (eds.) OTM 2006. LNCS, vol. 4275, pp. 408–425. Springer, Heidelberg (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Walid Gaaloul
    • 1
  • Sami Bhiri
    • 1
  • Armin Haller
    • 1
  1. 1.DERI – National University of Ireland, IDA Business Park, GalwayIreland

Personalised recommendations