Encyclopedia of Big Data Technologies

Living Edition
| Editors: Sherif Sakr, Albert Zomaya

Automated Process Discovery

  • Sander J. J. Leemans
Living reference work entry
DOI: https://doi.org/10.1007/978-3-319-63962-8_88-1

Definitions

An event log contains a historical record of the steps taken in a business process. An event log consists of traces, one for each case, customer, order, etc. in the process. A trace contains events, which represent the steps (activities) that were taken for a particular case, customer, order, etc.

An example of an event log derived from an insurance claim handling process is [〈receive claim, check difficulty, decide claim, notify customer〉10, 〈receive claim, check difficulty, check fraud, decide claim, notify customer〉5]. This event log consists of 15 traces, corresponding to 15 claims made in the process. In 10 of these traces, the claim was received, its difficulty assessed, the claim was decided and the customer was notified.

A process model describes the behaviour that can happen in a process. Typically, it is represented as a Petri net (Reisig 1992) or a BPMN model (OMG 2011).

A Petri net consists of places, which denote the states the system can be in, and...
This is a preview of subscription content, log in to check access.

References

  1. Adriansyah A (2014) Aligning observed and modeled behavior. PhD thesis, Eindhoven University of TechnologyGoogle Scholar
  2. Augusto A, Conforti R, Dumas M, Rosa ML, Bruno G (2016) Automated discovery of structured process models: discover structured vs. discover and structure. In: Comyn-Wattiau I, Tanaka K, Song I, Yamamoto S, Saeki M (eds) Conceptual modeling – Proceedings of the 35th international conference, ER, Gifu, 14–17 Nov 2016. Lecture notes in computer science, vol 9974, pp 313–329. http://doi.org/10.1007/978-3-319-46397-1_25
  3. Augusto A, Conforti R, Dumas M, Rosa ML (2017a) Split miner: discovering accurate and simple business process models from event logs. In: IEEE international conference on data mining, New Orleans. https://eprints.qut.edu.au/110153/
  4. Augusto A, Conforti R, Dumas M, Rosa ML, Maggi FM, Marrella A, Mecella M, Soo A (2017b) Automated discovery of process models from event logs: review and benchmark. CoRR abs/1705.02288, http://arxiv.org/abs/1705.02288
  5. Badouel E (2012) On the α-reconstructibility of workflow nets. In: Haddad S, Pomello L (eds) Application and theory of Petri Nets – Proceedings of the 33rd international conference, PETRI NETS, Hamburg, 25–29 June 2012. Lecture notes in computer science, vol 7347. Springer, pp 128–147. http://doi.org/10.1007/978-3-642-31131-4_8
  6. Buijs JCAM, van Dongen BF, van der Aalst WMP (2012a) A genetic algorithm for discovering process trees. In: Proceedings of the IEEE congress on evolutionary computation, CEC, Brisbane, 10–15 June 2012. IEEE, pp 1–8.  http://doi.org/10.1109/CEC.2012.6256458
  7. Buijs JCAM, van Dongen BF, van der Aalst WMP (2012b) On the role of fitness, precision, generalization and simplicity in process discovery. In: Meersman R, Panetto H, Dillon TS, Rinderle-Ma S, Dadam P, Zhou X, Pearson S, Ferscha A, Bergamaschi S, Cruz IF (eds) On the move to meaningful internet systems: OTM 2012, Proceedings of the confederated international conferences: CoopIS, DOA-SVI, and ODBASE, Rome, part I, 10–14 Sept 2012. Lecture notes in computer science, vol 7565. Springer, pp 305–322. http://doi.org/10.1007/978-3-642-33606-5_19
  8. Celonis (2017) Process mining. https://www.celonis.com/. [Online; Accessed 11 Nov 2017]
  9. DBL (2011) Proceedings of the IEEE symposium on computational intelligence and data mining, CIDM 2011, part of the IEEE symposium series on computational intelligence, 11–15 Apr 2011. IEEE, Paris. http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5937059
  10. de Medeiros AKA, van Dongen BF, van der Aalst WMP, Weijters AJMM (2004) Process mining for ubiquitous mobile systems: an overview and a concrete algorithm. In: Baresi L, Dustdar S, Gall HC, Matera M (eds) Ubiquitous mobile information and collaboration systems, second CAiSE workshop, UMICS, Riga, 7–8 June 2004, Revised selected papers. Lecture notes in computer science, vol 3272. Springer, pp 151–165. http://doi.org/10.1007/978-3-540-30188-2_12
  11. Di Ciccio C, Maggi FM, Mendling J (2016) Efficient discovery of target-branched declare constraints. Inf Syst 56:258–283. http://doi.org/10.1016/j.is.2015.06.009
  12. Ferilli S, Esposito F, Redavid D, Angelastro S (2016) Predicting process behavior in woman. In: Adorni G, Cagnoni S, Gori M, Maratea M (eds) AI*IA 2016: advances in artificial intelligence – Proceedings of the XVth international conference of the Italian association for artificial intelligence, Genova, 29 Nov–1 Dec 2016. Lecture notes in computer science, vol 10037. Springer, pp 308–320. http://doi.org/10.1007/978-3-319-49130-1_23
  13. Fluxicon (2017) Disco. http://fluxicon.com, [Online; Accessed 11 Nov 2017]
  14. Günther C, van der Aalst W (2007) Fuzzy mining–adaptive process simplification based on multi-perspective metrics. Business process management. Springer, Berlin/Heidelberg, pp 328–343Google Scholar
  15. Guo Q, Wen L, Wang J, Yan Z, Yu PS (2015) Mining invisible tasks in non-free-choice constructs. In: Motahari-Nezhad HR, Recker J, Weidlich M (eds) Business process management – Proceedings of the 13th international conference, BPM, Innsbruck, 31 Aug–3 Sept 2015. Lecture notes in computer science, vol 9253. Springer, pp 109–125. http://doi.org/10.1007/978-3-319-23063-4_7
  16. Leemans S (2017) Robust process mining with guarantees. PhD thesis, Technische Universiteit EindhovenGoogle Scholar
  17. Leemans SJJ, Fahland D, van der Aalst WMP (2013a) Discovering block-structured process models from event logs – a constructive approach. In: Colom JM, Desel J (eds) Application and theory of Petri Nets and concurrency – Proceedings of the 34th international conference, PETRI NETS, Milan, 24–28 June 2013. Lecture notes in computer science, vol 7927. Springer, pp 311–329. http://doi.org/10.1007/978-3-642-38697-8_17
  18. Leemans SJJ, Fahland D, van der Aalst WMP (2013b) Discovering block-structured process models from event logs containing infrequent behaviour. In: Lohmann N, Song M, Wohed P (eds) Business process management workshops – BPM 2013 international workshops, Beijing, 26 Aug 2013, Revised papers. Lecture notes in business information processing, vol 171. Springer, pp 66–78. http://doi.org/l10.1007/978-3-319-06257-0_6
  19. Leemans SJJ, Fahland D, van der Aalst WMP (2014a) Discovering block-structured process models from incomplete event logs. In: Ciardo G, Kindler E (eds) Application and theory of Petri Nets and concurrency – Proceedings of the 35th international conference, PETRI NETS, Tunis, 23–27 June 2014. Lecture notes in computer science, vol 8489. Springer, pp 91–110. http://doi.org10.1007/978-3-319-07734-5_6
  20. Leemans SJJ, Fahland D, van der Aalst WMP (2014b) Process and deviation exploration with inductive visual miner. In: Limonad L, Weber B (eds) Proceedings of the BPM demo sessions 2014, co-located with the 12th international conference on business process management(BPM), Eindhoven, 10 Sept 2014, CEUR-WS.org, CEUR workshop proceedings, vol 1295, p 46. http://ceur-ws.org/Vol-1295/paper19.pdf
  21. Leemans SJJ, Fahland D, van der Aalst WMP (2015) Using life cycle information in process discovery. In: Reichert M, Reijers HA (eds) Business process management workshops – BPM, 13th international workshops, Innsbruck, 31 Aug–3 Sept 2015, Revised papers. Lecture notes in business information processing, vol 256. Springer, pp 204–217. http://doi.org/10.1007/978-3-319-42887-1_17
  22. Leemans SJJ, Fahland D, van der Aalst WMP (2016) Scalable process discovery and conformance checking. Softw Syst Model Special issue:1–33. http://doi.org/10.1007/s10270-016-0545-x
  23. Maggi FM, Mooij AJ, van der Aalst WMP (2011) User-guided discovery of declarative process models. In: DBL (2011), pp 192–199.  http://doi.org/10.1109/CIDM.2011.5949297 Google Scholar
  24. OMG (2011) Business process model and notation (BPMN) version 2.0. Technical report, Object management group (OMG)Google Scholar
  25. ProcessGold (2017) Enterprise platform. http://processgold.com/en/, [Online; Accessed 11 Nov 2017]
  26. Redlich D, Molka T, Gilani W, Blair GS, Rashid A (2014) Constructs competition miner: process control-flow discovery of bp-domain constructs. In: Sadiq SW, Soffer P, Völzer H (eds) Business process management – Proceedings of the 12th international conference, BPM, Haifa, 7–11 Sept 2014. Lecture notes in computer science, vol 8659. Springer, pp 134–150. http://doi.org/10.1007/978-3-319-10172-9_9
  27. Reisig W (1992) A primer in Petri net design. Springer compass international. Springer, Berlin/New YorkCrossRefzbMATHGoogle Scholar
  28. Rosa ML, Reijers HA, van der Aalst WMP, Dijkman RM, Mendling J, Dumas M, García-Bañuelos L (2011) APROMORE: an advanced process model repository. Expert Syst Appl 38(6):7029–7040. http://doi.org/10.1016/j.eswa.2010.12.012 CrossRefGoogle Scholar
  29. vanden Broucke SKLM, Weerdt JD (2017) Fodina: a robust and flexible heuristic process discovery technique. Decis Support Syst 100:109–118. http://doi.org/10.1016/j.dss.2017.04.005
  30. van der Aalst WMP (2016) Process mining – data science in action, 2nd edn. Springer http://www.springer.com/gp/book/9783662498507 Google Scholar
  31. van der Aalst W, Weijters A, Maruster L (2004) Workflow mining: discovering process models from event logs. IEEE Trans Knowl Data Eng 16(9):1128–1142CrossRefGoogle Scholar
  32. van der Werf JMEM, van Dongen BF, Hurkens CAJ, Serebrenik A (2009) Process discovery using integer linear programming. Fundam Inform 94(3–4):387–412. http://doi.org/10.3233/FI-2009-136 MathSciNetzbMATHGoogle Scholar
  33. van Dongen BF, de Medeiros AKA, Verbeek HMW, Weijters AJMM, van der Aalst WMP (2005) The prom framework: a new era in process mining tool support. In: Ciardo G, Darondeau P (eds) Applications and theory of Petri Nets 2005, Proceedings of the 26th international conference, ICATPN, Miami, 20–25 June 2005. Lecture notes in computer science, vol 3536. Springer, pp 444–454. http://doi.org/10.1007/11494744_25
  34. van Eck ML, Lu X, Leemans SJJ, van der Aalst WMP (2015) PMˆ2 : a process mining project methodology. In: Zdravkovic J, Kirikova M, Johannesson P (eds) Advanced information systems engineering – Proceedings of the 27th international conference, CAiSE, Stockholm, 8–12 June 2015. Lecture notes in computer science, vol 9097. Springer, pp 297–313. http://doi.org/10.1007/978-3-319-19069-3_19
  35. van Zelst SJ, van Dongen BF, van der Aalst WMP, Verbeek HMW (2017) Discovering relaxed sound workflow nets using integer linear programming. CoRR abs/1703.06733. http://arxiv.org/abs/1703.06733
  36. Weerdt JD, Backer MD, Vanthienen J, Baesens B (2012) A multi-dimensional quality assessment of state-of-the-art process discovery algorithms using real-life event logs. Inf Syst 37(7):654–676. http://doi.org/10.1016/j.is.2012.02.004 CrossRefGoogle Scholar
  37. Weijters AJMM, Ribeiro JTS (2011) Flexible heuristics miner (FHM). In: DBL (2011), pp 310–317.  http://doi.org/10.1109/CIDM.2011.5949453 Google Scholar
  38. Weijters AJMM, van der Aalst WMP (2003) Rediscovering workflow models from event-based data using little thumb. Integr Comput Aided Eng 10(2):151–162. http://content.iospress.com/articles/integrated-computer-aided-engineering/ica00143 Google Scholar
  39. Wen L, Wang J, Sun J (2006) Detecting implicit dependencies between tasks from event logs. In: Zhou X, Li J, Shen HT, Kitsuregawa M, Zhang Y (eds) Frontiers of WWW research and development – APWeb 2006, Proceedings of the 8th Asia-Pacific web conference, Harbin, 16–18 Jan 2006. Lecture notes in computer science, vol 3841. Springer, pp 591–603. http://doi.org/10.1007/11610113_52
  40. Wen L, van der Aalst WMP, Wang J, Sun J (2007a) Mining process models with non-free-choice constructs. Data Min Knowl Discov 15(2):145–180. http://doi.org/10.1007/s10618-007-0065-y MathSciNetCrossRefGoogle Scholar
  41. Wen L, Wang J, Sun J (2007b) Mining invisible tasks from event logs. In: Dong G, Lin X, Wang W, Yang Y, Yu JX (eds) Advances in data and web management, Joint 9th Asia-Pacific web conference, APWeb 2007, and Proceedings of the 8th international conference, on web-age information management, WAIM, Huang Shan, 16–18 June 2007. Lecture notes in computer science, vol 4505. Springer, pp 358–365. http://doi.org/10.1007/978-3-540-72524-4_38
  42. Wen L, Wang J, van der Aalst WMP, Huang B, Sun J (2009) A novel approach for process mining based on event types. J Intell Inf Syst 32(2):163–190. http://doi.org/10.1007/s10844-007-0052-1 CrossRefGoogle Scholar
  43. Wen L, Wang J, van der Aalst WMP, Huang B, Sun J (2010) Mining process models with prime invisible tasks. Data Knowl Eng 69(10):999–1021. http://doi.org/10.1016/j.datak.2010.06.001 CrossRefGoogle Scholar
  44. Yahya BN, Song M, Bae H, Sul S, Wu J (2016) Domain-driven actionable process model discovery. Comput Ind Eng 99:382–400. http://doi.org/10.1016/j.cie.2016.05.010 CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.Queensland University of TechnologyBrisbaneAustralia

Section editors and affiliations

  • Marlon Dumas
    • 1
  • Matthias Weidlich
    • 1
  1. 1.Institute of Computer ScienceUniversity of TartuTartuEstonia