Repairing Business Process Models as Retrieved from Source Code

  • María Fernández-Ropero
  • Hajo A. Reijers
  • Ricardo Pérez-Castillo
  • Mario Piattini
Part of the Lecture Notes in Business Information Processing book series (LNBIP, volume 147)


The static analysis of source code has become a feasible solution to obtain underlying business process models from existing information systems. Due to the fact that not all information can be automatically derived from source code (e.g., consider manual activities), such business process models may not entirely reflect the original behavior of the organization. This paper provides a technique to repair such business process models on the basis of event logs collected during the execution of information systems. The technique detects missing sequence flows regarding the event log and tidily adds these sequence flows to the target business process model. In order to enhance its applicability, this technique is tool-supported. Additionally, this paper provides a case study with a real-life system to demonstrate its feasibility.


process models source code mining event logs repairing 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Weske, M.: Business Process Management: Concepts, Languages, Architectures. Springer, Heidelberg (2007)Google Scholar
  2. 2.
    Pérez-Castillo, R., García-Rodríguez de Guzmán, I., Piattini, M.: Business Process Archeology using MARBLE. Information and Software Technology (2011)Google Scholar
  3. 3.
    Fernández-Ropero, M., Pérez-Castillo, R., Caballero, I., Piattini, M.: Quality-Driven Business Process Refactoring. In: International Conference on Business Information Systems, ICBIS 2012, Paris, France, pp. 960–966 (2012)Google Scholar
  4. 4.
    Fahland, D., van der Aalst, W.M.P.: Repairing Process Models to Reflect Reality (2012)Google Scholar
  5. 5.
    van der Aalst, W.M.P.: Process Mining: Discovery, Conformance and Enhancement of Business Processes. Springer (2011)Google Scholar
  6. 6.
    van der Aalst, W.M.P., Reijers, H.A., Weijters, A.J.M.M., van Dongen, B.F., de Medeiros, A.K.A., Song, M., Verbeek, H.: Business process mining: An industrial application. Information Systems 32, 713–732 (2007)CrossRefGoogle Scholar
  7. 7.
    Dumas, M., van der Aalst, W.M.P., Ter Hofstede, A.: Process-aware information systems. Wiley Online Library (2005)Google Scholar
  8. 8.
    Pérez-Castillo, R., Weber, B., García Rodríguez de Guzmán, I., Piattini, M.: Generating Event Logs from Non-Process-Aware Systems Enabling Business Process Mining. Enterprise Information System Journal 5, 301–335 (2011)CrossRefGoogle Scholar
  9. 9.
    van der Aalst, W.M.P., Weijters, T., Maruster, L.: Workflow mining: discovering process models from event logs. IEEE Transactions on Knowledge and Data Engineering 16, 1128–1142 (2004)CrossRefGoogle Scholar
  10. 10.
    De Medeiros, A.K.A., Weijters, A., van der Aalst, W.M.P.: Using genetic algorithms to mine process models: representation, operators and results. Beta, Research School for Operations Management and Logistics (2005)Google Scholar
  11. 11.
    Weijters, A., van der Aalst, W.M.P., de Medeiros, A.K.A.: Process mining with the heuristics miner-algorithm. Technische Universiteit Eindhoven, Tech. Rep. WP 166 (2006)Google Scholar
  12. 12.
    Zou, Y., Hung, M.: An Approach for Extracting Workflows from E-Commerce Applications. In: Proceedings of the Fourteenth International Conference on Program Comprehension, pp. 127–136. IEEE Computer Society (2006)Google Scholar
  13. 13.
    Ghose, A., Koliadis, G., Chueng, A.: Process discovery from model and text artefacts. In: 2007 IEEE Congress on Services, pp. 167–174. IEEE (2007)Google Scholar
  14. 14.
    Adriansyah, A., van Dongen, B., van der Aalst, W.M.P.: Conformance checking using cost-based fitness analysis, pp. 55–64. IEEE (2011)Google Scholar
  15. 15.
    ISO/IEC: ISO/IEC 19506:2012. Information technology – Object Management Group Architecture-Driven Modernization (ADM) – Knowledge Discovery Meta-Model (KDM), p. 331. ISO/IEC (2012) Google Scholar
  16. 16.
  17. 17.
    van der Aalst, W.M.P.: Process Mining: Overview and Opportunities. ACM Transactions on Management Information Systems (TMIS) 3, 7 (2012)Google Scholar
  18. 18. ProM Tool (2010)Google Scholar
  19. 19.
    Lcvenshtcin, V.: BINARY coors CAPABLE or ‘CORRECTING DELETIONS, INSERTIONS, AND REVERSALS. In: Soviet Physics-Doklady (1966) Google Scholar
  20. 20.
    Runeson, P., Höst, M.: Guidelines for conducting and reporting case study research in software engineering. Empirical Softw. Eng. 14, 131–164 (2009)CrossRefGoogle Scholar
  21. 21.
    Yin, R.K.: Case study research. Design and methods. Sage, London (2003)Google Scholar
  22. 22.
    van der Aalst, W.M.P., Adriansyah, A., van Dongen, B.: Replaying history on process models for conformance checking and performance analysis. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery (2012)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • María Fernández-Ropero
    • 1
    • 2
  • Hajo A. Reijers
    • 1
    • 3
  • Ricardo Pérez-Castillo
    • 2
  • Mario Piattini
    • 2
  1. 1.Department of Mathematics and Computer ScienceEindhoven University of TechnologyEindhovenThe Netherlands
  2. 2.Instituto de Tecnologías y Sistemas de la InformaciónUniversity of Castilla-La ManchaCiudad RealSpain
  3. 3.Perceptive SoftwareApeldoornThe Netherlands

Personalised recommendations