18 results with keyword: 'workflow mining discovering process models from event logs'
To conclude we summarize the rediscovery problem : “Find a mining algorithm able to rediscover a large class of sound WF-nets on the basis of complete workflow logs.” This problem
N/A
Given a set of Declare constraints extracted from an event log, a key step of the proposed technique is to generate a set of data-aware constraints, meaning constraints that
N/A
For example, in the case of a travel application, every artifact (emails, documents, webpage forms) involved may include the name(s) of the applicant(s), the destination(s), and
N/A
Step 1b: Process Mining Step 1a: Merge Event Logs Merged event log Process model 1 Process model 2 Process model n Step 1d: Process Model Merging Step 2: Process
N/A
The activity precondition learning approach suggested in this paper also allows to take into account (time-varying) case data properties for predicting the conditions under which a
N/A
The answer to RQ1 (Can Temporal Logic Query Checking improve the discovery of declarative process models from event logs?) is yes, improvement in speed was made respect to [13]
N/A
Besides that the resource and the data flow perspectives can be discovered as well: data Petri nets obtained using the data-aware process mining algorithm [27] can be used to
N/A
Based upon the concept of the structured workflow process model (Liu & Kumar, 2005), we propose a series of distributed workflow process mining approaches that play a theoretical
N/A
Before we discover the overlapping rules, we need to mine the process model in Petri Net using modified time-based heuristics miner algorithm [9].. After process model is
N/A
Most mining algorithms have an implicit notion of state, i.e., activities are glued together in some process modeling language based on an analysis of the log and the resulting
N/A
There are three basic types of process mining: (a) process discovery techniques automatically learn models from event logs, (b) conformance checking techniques diagnose
N/A
In this paper, we will focus on four types of metrics that can be derived from event logs: (1) metrics based on (possible) causality, (2) metrics based on joint cases, (3) metrics
N/A
Event logs of students’ group works have been analyzed using process mining techniques. 4) Hierarchical: an investigation of top-level models discovered from the
N/A
During the validation procedure, we add the shortcut transitions, loop structure, and fork/join states into the workflow model to make sure that all event traces
N/A
subject of a standard internal audit before we applied process mining to data drawn from the same time period covered by the audit. This provides our benchmark for the value added by
N/A
Cross-Organizational Process Mining : the application of process mining techniques to event logs originating from different organizations. Data Mining : the analysis of (often
N/A
H4.2 The three-way interaction effects of services recovery actions (compensations, empowerment, apology and response speed) on: a) repurchase intent; b) expectation update;
N/A