HIERARCHICAL CONFORMANCE CHECKING OF PROCESS MODELS BASED ON EVENT LOGS Jorge Munoz-Gama, Josep Carmona and Wil M.P. van der Aalst.

Slides:



Advertisements
Similar presentations
Comparison of Several Meta-modeling Tools 2 Yi Lu Computer Science Department McGill University
Advertisements

Workflow Management Appendix B. Workflow Modelling using UML Wil van der Aalst has copyrights to almost all figures in the following slideshow made by.
On 1-soundness and Soundness of Workflow Nets Lu Ping, Hu Hao and Lü Jian Department of Computer Science Nanjing University
Shape Analysis by Graph Decomposition R. Manevich M. Sagiv Tel Aviv University G. Ramalingam MSR India J. Berdine B. Cook MSR Cambridge.
Jorge Muñoz-Gama Josep Carmona
1 Analysis of workflows : Verification, validation, and performance analysis. Wil van der Aalst Eindhoven University of Technology Faculty of Technology.
A university for the world real R © 2009, Chapter 3 Advanced Synchronization Moe Wynn Wil van der Aalst Arthur ter Hofstede.
CONFORMANCE CHECKING IN THE LARGE: PARTITIONING AND TOPOLOGY Jorge Munoz-Gama, Josep Carmona and Wil M.P. van der Aalst.
1 Steiner Tree on graphs of small treewidth Algorithms and Networks 2014/2015 Hans L. Bodlaender Johan M. M. van Rooij.
Workflow Management Kap. 4. Analyzing Workflows Wil van der Aalst has copyrights to almost all figures in the following slideshow made by Lars Frank.
IE 469 Manufacturing Systems
Process discovery: Inductive Miner
Models vs. Reality dr.ir. B.F. van Dongen Assistant Professor Eindhoven University of Technology
Mining Declarative Models using Intervals Jan Martijn van der Werf Ronny Mans Wil van der Aalst.
Block-Structured Process Discovery: Filtering Infrequent Behaviour Sander Leemans Dirk Fahland Wil van der Aalst Eindhoven University of Technology.
Synthesis of Embedded Software Using Free-Choice Petri Nets.
CS447/ECE453/SE465 Prof. Alencar University of Waterloo 1 CS447/ECE453/SE465 Software Testing Tutorial Winter 2008 Based on the tutorials by Prof. Kontogiannis,
1 Analysis of workflows a-priori and a-posteriori analysis Wil van der Aalst Eindhoven University of Technology Faculty of Technology Management Department.
A Schedulability-Preserving Transformation of BDF to Petri Nets Cong Liu EECS 290n Class Project December 10, 2004.
Yangjun Chen 1 Bipartite Graph 1.A graph G is bipartite if the node set V can be partitioned into two sets V 1 and V 2 in such a way that no nodes from.
Specifying Workflow using CO- OPN Ang Chen SMV group 11 Mars, 2005.
1 Quasi-Static Scheduling of Embedded Software Using Free-Choice Petri Nets Marco Sgroi, Alberto Sangiovanni-Vincentelli Luciano Lavagno University of.
1 Petri Nets Marco Sgroi EE249 - Fall 2001 Most slides borrowed from Luciano Lavagno’s lecture ee249 (1998)
/faculteit technologie management Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance Wil van der Aalst.
DIDS part II The Return of dIDS 2/12 CIS GrIDS Graph based intrusion detection system for large networks. Analyzes network activity on networks.
Unraveling Unstructured Process Models Marlon Dumas University of Tartu, Estonia Joint work with Artem Polyvyanyy and Luciano García-Bañuelos Invited Talk,
A university for the world real R © 2009, Chapter 23 Epilogue Wil van der Aalst Michael Adams Arthur ter Hofstede Nick Russell.
VLSI Physical Design: From Graph Partitioning to Timing Closure Chapter 5: Global Routing © KLMH Lienig 1 FLUTE: Fast Lookup Table Based RSMT Algorithm.
Insuring Sensitive Processes through Process Mining Jorge Munoz-Gama Isao Echizen Jorge Munoz-Gama and Isao Echizen.
Circle Graph and Circular Arc Graph Recognition. 2/41 Outlines Circle Graph Recognition Circular-Arc Graph Recognition.
Session 6 Windows Platform Dina Alkhoudari. Learning Objectives What is Active Directory Logical components of active directory Physical components of.
Jorge Munoz-Gama Advisor: Josep Carmona December 2014 CONFORMANCE CHECKING AND DIAGNOSIS IN PROCESS MINING.
Jorge Muñoz-Gama Universitat Politècnica de Catalunya (Barcelona, Spain) Algorithms for Process Conformance and Process Refinement.
EVENT-BASED REAL-TIME DECOMPOSED CONFORMANCE ANALYSIS Seppe vanden Broucke, Jorge Munoz-Gama, Josep Carmona, Bart Baesens, and Jan Vanthienen CoopIS 2014.
DECOMPOSED CONFORMANCE Jorge Munoz-Gama, Josep Carmona and W.M.P van der Aalst.
Pontificia Universidad Católica de Chile School of Engineering Department of Computer Science A feedback-based framework for process enhancement of causal.
Decision Mining in Prom A. Rozinat and W.M.P. van der Aalst Joosung, Ko.
******************************************************************** *These notes contain NDSU confidential and proprietary material. * *Patents are pending.
Alignment-based Precision Checking A. Adriansyah 1, J. Munoz Gamma 2, J. Carmona 2, B.F. van Dongen 1, W.M.P. van der Aalst 1 Tallinn, 3 September 2012.
Decomposing Data-aware Conformance Checking Massimiliano de Leoni, Jorge Munoz-Gama, Josep Carmona, Wil van der Aalst PAGE 0.
Chapter 7 Complex Similarity Topix. About this chapter Extends previous discussed methods The reader can choose to read about only specific methods, depending.
"Decomposing Alignment- based Conformance Checking of Data-aware Process Models" Massimiliano de Leoni, Jorge Muñoz-Gama, Josep Carmona, Wil van der Aalst.
1 Petri Nets Ina Koch and Monika Heiner. 2 Petri Nets(1962) Carl Adam Petri.
Decomposing Replay Problems: A Case Study Eric Verbeek and Wil van der Aalst.
Smith’s Aerospace © P. Bailey & K. Vander Linden, 2005 Procedural Activity Patrick Bailey Keith Vander Linden Calvin College.
R-customizers Goal: define relation between graph and its customizers, study domains of adaptive programs, merging of interface class graphs.
CSC 252: Algorithms October 28, 2000 Homework #5: Graphs Victoria Manfredi (252a-ad) notes: -Definitions for each of the graph concepts are those presented.
Diagnostic Information for Control-Flow Analysis of Workflow Graphs (aka Free-Choice Workflow Nets) Cédric Favre(1,2), Hagen Völzer(1), Peter Müller(2)
Process Mining – Concepts and Algorithms Review of literature on process mining techniques for event log data.
Spanning Trees Alyce Brady CS 510: Computer Algorithms.
1 Visual Computing Institute | Prof. Dr. Torsten W. Kuhlen Virtual Reality & Immersive Visualization Till Petersen-Krauß | GUI Testing | GUI.
Multi-phase Process Mining: Building Instance Graphs
composition of workflows
Algorithms for Finding Distance-Edge-Colorings of Graphs
Advantages of FSM Their simplicity make it easy for inexperienced developers to implement with little to no extra knowledge (low entry level)
Proof technique (pigeonhole principle)
1 Queensland University of Technology, Brisbane, Australia
Exploring processes and deviations
Wil van der Aalst Eindhoven University of Technology
Decomposed Process Mining: The ILP Case
The Recommendation Click Graph: Properties and Applications
Petri nets refresher Prof.dr.ir. Wil van der Aalst
Wil van der Aalst Eindhoven University of Technology
JORGE MUNOZ-GAMA and JOSEP CARMONA
3 mei 2019 Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance Wil van der Aalst Ana Karla A. de Medeiros.
Neo4j for Process Mining
5 juli 2019 Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance Wil van der Aalst Ana Karla A. de Medeiros.
Faulty EPCs in the SAP Reference Model
FLUTE: Fast Lookup Table Based RSMT Algorithm for VLSI Design
Presentation transcript:

HIERARCHICAL CONFORMANCE CHECKING OF PROCESS MODELS BASED ON EVENT LOGS Jorge Munoz-Gama, Josep Carmona and Wil M.P. van der Aalst

Session 7: Process Mining and Conformance 2

Process Mining in a Nutshell 3 THEORYREALITY

Process Mining in a Nutshell 4 THEORYREALITY REALITY REFLECTION LOGS

Session 7: Process Mining and Conformance 5

Conformance in a Nutshell 6 Log Model A B C D E A B B C Alignment E FitnessPrecision How much behavior of the log is captured by the model? How accurate is the model describing the log?

Conformance in the Large How easy is to diagnose a conformance problem here? How much time it takes? 7

Process Diagnosis like a Map 8

9

Decomposition Goals Intuitive and independent decomposition Hierarchy between components 10 SESERPST Single Entry Single Exit components Refined Process Structure Tree * Artem Polyvyanyy: Structuring Process Models. PhD Thesis. University of Potsdam (Germany), January 2012

Structural Decomposition 11

Interior, Boundary, Entry, and Exit nodes Given a subgraph and a node of it: Interior node: connected only to nodes of the subgraph. Boundary node: not interior Entry node: boundary where no incoming edge in subgraph or all outgoing edges in Exit node: boundary where no outgoing edge in subgraph or all incoming edges in 12

Example of SESE and RPST 13 SESE: set of edges which graph has a Single Entry node and a Single Exit node Refined Process Structure Tree (RPST) containing non overlapping SESEs Unique Modular Polynomial Time

Decomposed Conformance For each component in the RPST Project the Log Initial and Final marking of subnet Align projected log and subnet Compute fitness and precision 14 < t5 t6 t5t1 t2 t3 t3t7

Conformance and Markings Dependency The conclusions are strongly dependent on the markings 15 A B C A B C D E

Component inside a Cycle 16 X Y AB B CD A E

Depending Analysis Test components in isolation Black Box Multi-scenario responses Exploit properties Safe, bounds, … Acyclic Subclass of Petri Net Domain specific properties 17

Safe Sound Workflow Nets (1) Entry/Exit Places 18

Safe Sound Workflow Nets (2) Initial Marking = one token on the entry Final Marking = one token on the exit 19

Safe Sound Workflow Nets (3) Short-circuited the entry and exit with invisible transition Heuristic: all transitions of the component belong to T-invariants of the original net Best effort but good empirical results 20

Implementation 21 ProM 6 (

Implementation 22 ProM 6 (

Results 1 Component – 1h 15min 7 Components – 2min 23

Future Work Decomposed Conformance Checking Problem Not hierarchy but partitioning Reducing the time Non depending results 24 Conformance Checking in the Large: Partitioning and Topology J. Munoz-Gama, J. Carmona and W. van der Aalst Business Process Management (BPM) 2013

Conclusions Decomposition based on SESEs and RPST to aid on the diagnosis of conformance problems Strong dependency between the context selected and the results obtained. Case of Safe Sound Workflow Nets Implemented in ProM 6 25

Thank You