Encyclopedia of Big Data Technologies

2019 Edition
| Editors: Sherif Sakr, Albert Y. Zomaya

Conformance Checking

  • Jorge Munoz-GamaEmail author
Reference work entry
DOI: https://doi.org/10.1007/978-3-319-77525-8_89



Given an event log and a process model from the same process, conformance checking compares the recorded event data with the model to identify commonalities and discrepancies. The conformance between a log and model can be quantified with respect to different quality dimensions: fitness, precision, and generalization.


Conformance checking compares an event log with a process model of the same process (Munoz-Gama 2016). An event log is composed of a series of log traces where each log trace relates to the sequence of observed events of a process instance, i.e., a case. An event can be related to a particular activity in the process but can also record many other process information such as time stamp, resource, and cost. In a real-life context, event logs can be extracted from Process-Aware Information Systems (PAIS) such as workflow management (WFM) systems, business process management (BPM) systems, or typical...

This is a preview of subscription content, log in to check access.


  1. Adriansyah A (2014) Aligning observed and modeled behavior. Ph.D. thesis, Eindhoven University of TechnologyGoogle Scholar
  2. Adriansyah A, Munoz-Gama J, Carmona J, van Dongen BF, van der Aalst WMP (2012) Alignment based precision checking. In: Rosa ML, Soffer P (eds) Business process management workshops – BPM 2012 international workshops, Tallinn, Estonia, 3 Sept 2012. Revised papers. Lecture notes in business information processing, vol 132. Springer, pp 137–149Google Scholar
  3. Buijs, JCAM, Reijers HA (2014) Comparing business process variants using models and event logs. In: Enterprise, business-process and information systems modeling – 15th international conference, BPMDS 2014, 19th international conference, EMMSAD 2014, held at CAiSE 2014, Thessaloniki, Greece, 6–17 June 1 2014. Proceedings, pp 154–168Google Scholar
  4. Burattin A (2015) Process mining techniques in business environments – theoretical aspects, algorithms, techniques and open challenges in process mining. Lecture notes in business information processing, vol 207. Springer, ChamCrossRefGoogle Scholar
  5. Goedertier S, Martens D, Vanthienen J, Baesens B (2009) Robust process discovery with artificial negative events. J Mach Learn Res 10:1305–1340MathSciNetzbMATHGoogle Scholar
  6. Janssenswillen G, Donders N, Jouck T, Depaire B (2017) A comparative study of existing quality measures for process discovery. Inf Syst 71:1–15CrossRefGoogle Scholar
  7. Munoz-Gama J (2016) Conformance checking and diagnosis in process mining – comparing observed and modeled processes. Lecture notes in business information processing, vol 270. Springer, ChamzbMATHGoogle Scholar
  8. Munoz-Gama J, Carmona J, van der Aalst WMP (2014) Single-entry single-exit decomposed conformance checking. Inf Syst 46:102–122CrossRefGoogle Scholar
  9. Rozinat A, van der Aalst WMP (2008) Conformance checking of processes based on monitoring real behavior. Inf Syst 33(1):64–95CrossRefGoogle Scholar
  10. van der Aalst WMP (2013) Mediating between modeled and observed behavior: the quest for the “right” process: keynote. In: RCIS, pp 1–12. IEEEGoogle Scholar
  11. van der Aalst WMP (2016) Process mining – data science in action. Springer, Berlin/HeidelbergCrossRefGoogle Scholar
  12. van der Aalst WMP, Adriansyah A, van Dongen BF (2012) Replaying history on process models for conformance checking and performance analysis. Wiley Interdisc Rew Data Min Knowl Disc 2(2):182–192CrossRefGoogle Scholar
  13. van Dongen BF (2012) BPI challenge 2012. 4TU Datacentrum. Eindhoven University of TechnologyGoogle Scholar
  14. vanden Broucke SKLM, Weerdt JD, Vanthienen J, Baesens B (2014) Determining process model precision and generalization with weighted artificial negative events. IEEE Trans Knowl Data Eng 26(8):1877–1889CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer Science, School of EngineeringPontificia Universidad Católica de ChileSantiagoChile