Discovering instance and process spanning constraints from process execution logs

被引:15
|
作者
Winter, Karolin [1 ]
Stertz, Florian [1 ]
Rinderle-Ma, Stefanie [1 ,2 ]
机构
[1] Univ Vienna, Fac Comp Sci, Res Grp Workflow Syst & Technol, Vienna, Austria
[2] Univ Vienna, Data Sci Uni Vienna, Vienna, Austria
关键词
Digitalized compliance management; Constraint mining; Instance spanning constraints; Process mining; CONFORMANCE CHECKING;
D O I
10.1016/j.is.2019.101484
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Instance spanning constraints (ISC) are the instrument to establish controls across multiple instances of one or several processes. A multitude of applications crave for ISC support. Consider, for example, the bundling and unbundling of cargo across several instances of a logistics process or dependencies between examinations in different medical treatment processes. Non-compliance with ISC can lead to severe consequences and penalties, e.g., dangerous effects due to undesired drug interactions. ISC might stem from regulatory documents, extracted by domain experts. Another source for ISC are process execution logs. Process execution logs store execution information for process instances, and hence, inherently, the effects of ISC. Discovering ISC from process execution logs can support ISC design and implementation (if the ISC was not known beforehand) and the validation of the ISC during its life time. This work contributes a categorization of ISC as well as four discovery algorithms for ISC candidates from process execution logs. The discovered ISC candidates are put into context of the associated processes and can be further validated with domain experts. The algorithms are prototypically implemented and evaluated based on artificial and real-world process execution logs. The results facilitate ISC design as well as validation and hence contribute to a digitalized ISC and compliance management. (C) 2019 The Authors. Published by Elsevier Ltd.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Discovering Instance Spanning Exceptions from Process Execution Logs
    Stertz, Florian
    Winter, Karolin
    Rinderle-Ma, Stefanie
    [J]. 2022 IEEE 24TH CONFERENCE ON BUSINESS INFORMATICS (CBI 2022), VOL 2, 2022, : 49 - 56
  • [2] Discovering Instance-Spanning Constraints from Process Execution Logs based on Classification Techniques
    Winter, Karolin
    Rinderle-Ma, Stefanie
    [J]. PROCEEDINGS OF THE 2017 IEEE 21ST INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE (EDOC 2017), 2017, : 79 - 88
  • [3] Discovering Branching Conditions from Business Process Execution Logs
    de Leoni, Massimiliano
    Dumas, Marlon
    Garcia-Banuelos, Luciano
    [J]. FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, FASE 2013, 2013, 7793 : 114 - 129
  • [4] Evolution of Instance-Spanning Constraints in Process Aware Information Systems
    Indiono, Conrad
    Fdhila, Walid
    Rinderle-Ma, Stefanie
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS, OTM 2018, PT I, 2018, 11229 : 298 - 317
  • [5] Discovering Process Models from Unlabelled Event Logs
    Ferreira, Diogo R.
    Gillblad, Daniel
    [J]. BUSINESS PROCESS MANAGEMENT, PROCEEDINGS, 2009, 5701 : 143 - +
  • [6] Discovering Business Process Architectures from Event Logs
    Bano, Dorina
    Nikaj, Adriatik
    Weske, Mathias
    [J]. BUSINESS PROCESS MANAGEMENT FORUM (BPM 2021), 2021, 427 : 162 - 177
  • [7] Process mining: Discovering direct successors in process logs
    Maruster, L
    Weijters, AJMM
    van der Aalst, WMP
    van den Bosch, A
    [J]. DISCOVERY SCIENCE, PROCEEDINGS, 2002, 2534 : 364 - 373
  • [8] Classification and Formalization of Instance-Spanning Constraints in Process-Driven Applications
    Fdhila, Walid
    Gall, Manuel
    Rinderle-Ma, Stefanie
    Mangler, Juergen
    Indiono, Conrad
    [J]. BUSINESS PROCESS MANAGEMENT, BPM 2016, 2016, 9850 : 348 - 364
  • [9] Workflow mining: Discovering process models from event logs
    van der Aalst, W
    Weijters, T
    Maruster, L
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (09) : 1128 - 1142
  • [10] A new model for discovering process trees from event logs
    Amin Vahedian Khezerlou
    Somayeh Alizadeh
    [J]. Applied Intelligence, 2014, 41 : 725 - 735