Mine Your Own Business

Size: px
Start display at page:

Download "Mine Your Own Business"

Transcription

1 33 Mine Your Own Business Using process mining to turn big data into better processes and systems prof.dr.ir. Wil van der Aalst PAGE 0

2 Season 1, Episode 4 (1969) PAGE 1

3 "Mine Your Own Business" (2006) the world's first anti-environmentalist documentary PAGE 2

4 Mine your own business: Turning big data into real value

5 process mining as the missing link aligning model and reality divide and conquer process discovery Big (Event) Data challenges getting started PAGE 4

6 process mining as the missing link aligning model and reality divide and conquer process discovery Big (Event) Data challenges getting started PAGE 5

7 process model analysis (simulation, verification, optimization, gaming, etc.) performanceoriented questions, problems and solutions process mining complianceoriented questions, problems and solutions data-oriented analysis (data mining, machine learning, business intelligence) PAGE 6

8 PAGE 7

9 PAGE 8

10 PAGE 9

11 let's play PAGE 10

12 Play-Out process model event log PAGE 11

13 Play-Out (Classical use of models) B A p1 E p3 D start end p2 C p4 A B C D A E D A C B D A B C D A E D A C B D A E D A C B D PAGE 12

14 Play-In event log process model PAGE 13

15 Play-In A B C D A C B D A E D A E D A B C D A C B D A E D A C B D B A p1 E p3 D start end p2 C p4 PAGE 14

16 Example Process Discovery (Vestia, Dutch housing agency, 208 cases, 5987 events) PAGE 15

17 Example Process Discovery (ASML, test process lithography systems, events) PAGE 16

18 Example Process Discovery (AMC, 627 gynecological oncology patients, events) PAGE 17

19 Replay event log process model extended model showing times, frequencies, etc. diagnostics predictions recommendations PAGE 18

20 Replay A B C D B A p1 E p3 D start end p2 C p4 PAGE 19

21 Replay A E D B A p1 E p3 D start end p2 C p4 PAGE 20

22 Replay can detect problems A C D Problem! token left behind B Problem! missing token A p1 E p3 D start end p2 C p4 PAGE 21

23 Conformance Checking (WOZ objections Dutch municipality, 745 objections, 9583 event, f= 0.988) PAGE 22

24 Replay can extract timing information A 5 B 8 C 9 D B A p1 E p3 D start 5 4 p C 9 p end PAGE 23

25 Performance Analysis Using Replay (WOZ objections Dutch municipality, 745 objections, 9583 event, f= 0.988) PAGE 24

26 Models are like the glasses required to see and understand event data! PAGE 25

27 process mining as the missing link aligning model and reality divide and conquer process discovery Big (Event) Data challenges getting started PAGE 26

28 Language identification in the limit (Mark Gold 1967) abc? ab(c d)? (ad) (ab(c d))? ab*(c d)? abc abd ad abbc ac A language is learnable in the limit if there exists a perfect child that generates only finitely many hypotheses. Language identification in the limit by E Mark Gold, Information and Control, 10(5): , PAGE 27

29 Learning is not easy Even simple languages like regular languages are not learnable in the limit. Many settings: evil or wellbehaving mothers, with or without negative examples, frequencies, etc. sentence trace in event log language process model PAGE 28

30 Process discovery algorithms (small selection) automata-based learning heuristic mining distributed genetic mining language-based regions genetic mining stochastic task graphs state-based regions LTL mining neural networks fuzzy mining mining block structures hidden Markov models α algorithm α# algorithm conformal process graph multi-phase mining partial-order based mining α++ algorithm ILP mining PAGE 29

31 Quiz Question: How to remove behavior? B A p1 E p3 D start end p2 C p4 PAGE 30

32 Quiz Question: How to remove behavior? B A p1 E p3 D start end p2 C p4 Add places or remove transitions! PAGE 31

33 Quiz Question: How to add behavior? B A p1 E p3 D start end p2 C p4 PAGE 32

34 Quiz Question: How to add behavior? B A p1 E p3 D start end p2 C p4 F Add transition or remove places! PAGE 33

35 Places limit behavior B A E D C abcd ad abed abccd acbd aebcd aed aad caed aded PAGE 34

36 Places limit behavior B A E D start C abcd ad abed abccd acbd aeccd aed aad caed aded PAGE 35

37 Places limit behavior B A E D start end C abcd ad abed abccd acbd aebcd aed aad caed aded PAGE 36

38 Places limit behavior B A p1 E D start end C abcd ad abed abccd acbd aebcd aed aad caed aded PAGE 37

39 Places limit behavior B A p1 E p3 D start end p2 C p4 abcd ad abed abccd acbd aebcd aed aad caed aded PAGE 38

40 Example: Process Discovery Using Language-Based Regions f c1 A place is feasible if it can be added without disabling any of the traces in the event log. a1 b1 e c d a2 p R b2 X Y PAGE 39

41 Genetic process mining: Overview create initial population event log mutation termination compute fitness tournament next generation elitism children crossover select best individual parents dead individuals PAGE 40

42 Example: crossover PAGE 41 a start register request b examine thoroughly c examine casually d check ticket decide pay compensation reject request reinitiate request e g h f end a start register request b examine thoroughly c examine casually d check ticket decide pay compensation reject request reinitiate request e g h f end a start register request b examine thoroughly c examine casually d check ticket decide reinitiate request e f a start register request b examine thoroughly c examine casually d check ticket decide pay compensation reject request reinitiate request e g h f end pay compensation reject request g h end

43 Example: mutation remove place b b examine thoroughly g examine thoroughly g start a register request c examine casually d check ticket decide f e reinitiate request pay compensation h reject request end start a register request added arc c examine casually d check ticket e decide f reinitiate request pay compensation h reject request end PAGE 42

44 models are like maps, their usefulness is determined by the intended use, i.e., there is not a single "perfect map" PAGE 43

45 process mining as the missing link aligning model and reality divide and conquer process discovery Big (Event) Data challenges getting started PAGE 44

46 Conformance checking an activity that should not happen happened an activity was executed by the wrong person an activity was executed too late an activity that should happen did not happen two activities were swapped PAGE 45

47 Alignments are essential! conformance checking to diagnose deviations squeezing reality into the model to do model-based analysis PAGE 46

48 process model event log synchronous move move on model only move on log only PAGE 47

49 Example: BPI Challenge 2012 (Dutch financial institute, doi: /uuid:3926db30-f aebc e91f) Loops of W_Completeren aanvraag and W_Nabellen offertes are often performed O_DECLINED and W_Wijzigen contractgegevens are often skipped Many moves on log of O_CANCELLED, O_CREATED, O_SELECTED, O_SENT occurred with the same frequency value (i.e. 60) before parallel branch Work of Arya Adriansyah (Replay project) Many moves on log of W_Afhandelen leads ( > 2200 times) occurred in the end of traces PAGE 48

50 Synchronous moves of Completeren aanvraag Loops of W_Completeren aanvraag and W_Nabellen offertes are often performed O_DECLINED and W_Wijzigen contractgegevens are often skipped Move on log of Completeren aanvraag Many moves on log of O_CANCELLED, O_CREATED, O_SELECTED, O_SENT occurred with the same frequency value (i.e. 60) before parallel branch The average waiting time for the input place of W_Nabellen offertes+start is very long (2.83 days) compares to the average waiting time of other places Move on log of O_CANCELLED and A_CANCELLED Moves on model towards end of traces Many moves on log of W_Afhandelen leads ( > 2200 times) occurred in the end of traces O_ACCEPTED has average sojourn time of minutes, while A_REGISTERED, A_ACTIVATED, and A_APPROVED have average sojourn time of minutes Activity W_Wijzigen contractgegevens is the bottleneck, but it occured rarely (only 4 times) PAGE 49

51 PAGE 50

52 process mining as the missing link aligning model and reality divide and conquer process discovery Big (Event) Data challenges getting started PAGE 51

53 In 10 years we will have 50 times as much data! PAGE 52

54 PAGE 53

55 PAGE 54

56 PAGE 55

57 PAGE 56

58 Big Data? PAGE 57

59 Big or fast and efficient? PAGE 58

60 process mining as the missing link aligning model and reality divide and conquer process discovery Big (Event) Data challenges getting started PAGE 59

61 Big Data: Opportunities and Challenges PAGE 60

62 Divide and Conquer A D 1: AC 2: BC 3: BC 4: AC 5: AC 6: AC 7: BC 8: BC B C 1: CDEG 2: CFG 3: CFG 4: CEDG 5: CFG 6: CEDG 7: CEDG 8: CDEG C F E G split horizontally split vertically 1: ACDEG 2: BCFG 3: BCFG 4: ACEDG 5: ACFG 6: ACEDG 7: BCEDG 8: BCDEG start A B C D F E G complete merge horizontally merge vertically D 1: ACDEG 4: ACEDG 6: ACEDG A C E G D 7: BCEDG 8: BCDEG B C E G 5: ACFG A C F G 2: BCFG 3: BCFG B C F G PAGE 61

63 Vertical Decomposition A D split vertically 1: ACDEG 2: BCFG 3: BCFG 4: ACEDG 5: ACFG 6: ACEDG 7: BCEDG 8: BCDEG start B C F E G complete merge vertically D 1: ACDEG 4: ACEDG 6: ACEDG A C E G D 7: BCEDG 8: BCDEG B C E G 5: ACFG A C F G 2: BCFG 3: BCFG B C F G PAGE 62

64 Horizontal Decomposition A D 1: AC 2: BC 3: BC 4: AC 5: AC 6: AC 7: BC 8: BC B C 1: CDEG 2: CFG 3: CFG 4: CEDG 5: CFG 6: CEDG 7: CEDG 8: CDEG C F E G split horizontally 1: ACDEG 2: BCFG 3: BCFG 4: ACEDG 5: ACFG 6: ACEDG 7: BCEDG 8: BCDEG start A B C D F E G complete merge horizontally PAGE 63

65 Decomposing Conformance Checking e.g., maximal decomposition, passage-based decomposition, or SESE/RPST-based decomposition e.g., A* based alignments, token-based replay, or simple replay until first deviation decomposition technique yields a (valid) activity partitioning conformance checking technique SN process model decompose model M 1 submodel M 2 submodel M n submodel conformance check conformance check conformance check L event log decompose event log L 1 sublog L 2 sublog L n sublog conformance diagnostics PAGE 64

66 Example of a valid decomposition f t7 c7 t8 c8 t11 start a t1 c1 c2 t2 b t3 c t4 c3 c4 d t5 e c5 c6 g t9 h t10 c9 end Log can be split in the same way! t6 SN 1 start a t1 SN 2 a t1 c1 t2 b t3 c3 d t5 e t6 SN 5 t7 d t5 e c5 c7 c6 f t8 g t9 h t10 f t8 g t9 h t10 c8 c9 t11 end SN 6 a t6 t1 c2 c SN 4 d t5 SN 3 t4 e t6 c t4 c4 PAGE 65

67 Example of alignment for observed trace a,b,c,d,e,c,d,g,f a,b,c,d,e,c,d,g,f t2 c1 b a t3 start t1 c2 c t4 c3 c4 t7 d t5 e t6 c5 c7 c6 f t8 g t9 h t10 c8 c9 t11 end SN 1 start a t1 SN 3 a t1 c2 SN 2 a t1 c t4 c1 e t6 t2 b t3 c3 SN 4 c t4 d t5 e t6 c4 SN 5 t7 d t5 e t6 d t5 c5 c7 c6 f t8 g t9 h t10 f t8 g t9 h t10 c8 c9 t11 end SN 6 Etc. PAGE 66

68 Conformance checking can be decomposed!!! General result for any valid decomposition: Any event log or trace is perfectly fitting the overall model if and only if it is also fitting all the individual fragments start a t1 c1 c2 t2 b t3 c t4 c3 c4 t7 d t5 e t6 c5 c7 c6 f t8 g t9 h t10 c8 c9 t11 end SN 1 start a t1 SN 3 a t1 c2 SN 2 a t1 c t4 c1 e t6 t2 b t3 c3 SN 4 c t4 d t5 e t6 c4 SN 5 t7 d t5 e t6 d t5 c5 c7 c6 f t8 g t9 h t10 f t8 g t9 h t10 c8 c9 t11 end SN 6 Wil van der Aalst, Decomposing Petri nets for process mining: A generic approach. Distributed and Parallel Databases, Volume 31, Issue 4, pp , 2013 PAGE 67

69 Decomposing Process Discovery e.g., causal graph based on frequencies is decomposed using passages or SESE/RPST e.g., language/state-based region discovery, variants of alpha algorithm, genetic process mining decomposition technique yields a (valid) activity partitioning process discovery technique L event log decompose event log L 1 sublog L 2 sublog L n sublog discovery discovery discovery M process model compose model M 1 submodel M 2 submodel M n submodel PAGE 68

70 Learn more about decomposing process mining problems? W.M.P. van der Aalst. Decomposing Petri Nets for Process Mining: A Generic Approach. Distributed and Parallel Databases, 31(4): , W.M.P. van der Aalst. A General Divide and Conquer Approach for Process Mining. In M. Ganzha, L. Maciaszek, and M. Paprzycki, editors, Federated Conference on Computer Science and Information Systems (FedCSIS 2013), pages IEEE Computer Society, W.M.P. van der Aalst. Decomposing Process Mining Problems Using Passages. In S. Haddad and L. Pomello, editors, Applications and Theory of Petri Nets 2012, volume 7347 of Lecture Notes in Computer Science, pages Springer-Verlag, Berlin, J. Munoz-Gama, J. Carmona, and W.M.P. van der Aalst. Hierarchical Conformance Checking of Process Models Based on Event Logs. In J.M. Colom and J. Desel, editors, Applications and Theory of Petri Nets 2013, volume 7927 of Lecture Notes in Computer Science, pages Springer-Verlag, Berlin, J. Munoz-Gama, J. Carmona, and W.M.P. van der Aalst. Conformance Checking in the Large: Partitioning and Topology. In F. Daniel, J. Wang, and B. Weber, editors, International Conference on Business Process Management (BPM 2013), volume 8094 of Lecture Notes in Computer Science, pages Springer-Verlag, Berlin, E. Verbeek and W.M.P. van der Aalst. Decomposing Replay Problems: A Case Study. In D. Moldt and H. Roelke, editors, Proceedings of the International Workshop on Petri Nets in Software Engineering (PNSE 2013), volume 989 of CEUR Workshop Proceedings, pages CEUR- WS.org, PAGE 69

71 process mining as the missing link aligning model and reality divide and conquer process discovery Big (Event) Data challenges getting started PAGE 70

72 Distributing process mining problems to cope with big data PAGE 71

73 streaming event data (sensors, RFID, messages, etc.) PAGE 72

74 process discovery: finding sheep with five or more legs 1 formal (not just a picture) fast (should not take years) 2 ability to balance all conformance dimensions (fitness, precision, generalization, and simplicity) incl. noise provide guarantees (not just a best effort) sound (result should at least be free of deadlocks, etc.) PAGE 73

75 On-the-fly process mining Operational support PAGE 74

76 Concept drift Concept drift PAGE 75

77 Cross-organizational mining cross-organizational / comparative process mining PAGE 76

78 Supporting the process of process mining PAGE 78

79 process mining as the missing link aligning model and reality divide and conquer process discovery Big (Event) Data challenges getting started PAGE 79

80 How to get started? PAGE 80

81 600+ plug-ins available covering the whole process mining spectrum open-source (L-GPL) Download from: 81

82 Commercial Alternatives Disco (Fluxicon) Perceptive Process Mining (before Futura Reflect and BPM one) ARIS Process Performance Manager QPR ProcessAnalyzer Interstage Process Discovery (Fujitsu) Discovery Analyst (StereoLOGIC) XMAnalyzer (XMPro) 82

83 How to Get Started? Collect event data Collect questions Minimal requirement: events referring to an activity name and a process instance. Good to have: timestamps, resource information, additional data elements. Challenges: scoping and sometimes correlation. What kind problems would you like to address (cost, time, risk, compliance, service, etc.)? Related to discovery, conformance, enhancement? Iterative process: can be curiosity driven initially. 83

84 Join our expedition: Mine your processes! performance-oriented questions, problems and solutions process model analysis (simulation, verification, etc.) process mining data-oriented analysis (data mining, machine learning, business intelligence) compliance-oriented questions, problems and solutions PAGE 84

85 Learn more? Informal PM Meeting (15.50 today). Thanks to Krzysztof Kluza! Building C2 (entrance through buildings C1 or C3), room no. 316 (3rd floor). PAGE 85

Distributed Process Discovery and Conformance Checking

Distributed Process Discovery and Conformance Checking Distributed Process Discovery and Conformance Checking prof.dr.ir. Wil van der Aalst www.processmining.org On the different roles of (process) models PAGE 1 Play-Out PAGE 2 Play-Out (Classical use of models)

More information

Chapter 8 Mining Additional Perspectives

Chapter 8 Mining Additional Perspectives Chapter 8 Mining Additional Perspectives prof.dr.ir. Wil van der Aalst www.processmining.org Overview Chapter 1 Introduction Part I: Preliminaries Chapter 2 Process Modeling and Analysis Chapter 3 Data

More information

An Experimental Evaluation of Passage-Based Process Discovery

An Experimental Evaluation of Passage-Based Process Discovery An Experimental Evaluation of Passage-Based Process Discovery H.M.W. Verbeek and W.M.P. van der Aalst Technische Universiteit Eindhoven Department of Mathematics and Computer Science P.O. Box 513, 5600

More information

Process Discovery and Conformance Checking Using Passages

Process Discovery and Conformance Checking Using Passages Fundamenta Informaticae XX (2012) 1 35 1 DOI 10.3233/FI-2012-0000 IOS Press Process Discovery and Conformance Checking Using Passages W.M.P. van der Aalst Department of Mathematics and Computer Science,

More information

Process Mining in the Large: A Tutorial

Process Mining in the Large: A Tutorial Process Mining in the Large: A Tutorial Wil M.P. van der Aalst Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, The Netherlands; Business Process Management

More information

Automatic Root Cause Identification Using Most Probable Alignments

Automatic Root Cause Identification Using Most Probable Alignments Automatic Root Cause Identification Using Most Probable Alignments Marie Koorneef, Andreas Solti 2, Henrik Leopold, Hajo A. Reijers,3 Department of Computer Sciences, Vrije Universiteit Amsterdam, The

More information

Decomposing Conformance Checking on Petri Nets with Data

Decomposing Conformance Checking on Petri Nets with Data Decomposing Conformance Checking on Petri Nets with Data Massimiliano de Leoni 1,2, Jorge Munoz-Gama 3, Josep Carmona 3, and Wil M.P. van der Aalst 2 1 University of Padua, Padua (Italy) 2 Eindhoven University

More information

Process Mining Enabling Data-Driven Process Discovery and Analysis Using ProM

Process Mining Enabling Data-Driven Process Discovery and Analysis Using ProM Process ining Enabling Data-Driven Process Discovery and Analysis Using Pro Keynote SIPDA 2011 Campione d Italia, June 29, 2011 prof.dr.ir. Wil van der Aalst www.processmining.org Baarle-Nassau (NL) /Baarle-Hertog

More information

DrFurby Classifier. Process Discovery BPM Where innovation starts

DrFurby Classifier. Process Discovery BPM Where innovation starts Den Dolech 2, 5612 AZ Eindhoven P.O. Box 513, 5600 MB Eindhoven The Netherlands www.tue.nl Author Eric Verbeek and Felix Mannhardt Date June 14, 2016 Version 1.2 DrFurby Classifier Process Discovery Contest

More information

Discovering Petri Nets

Discovering Petri Nets Discovering Petri Nets It s a kind of magic Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology Department of Information and Technology P.O. Box 513, 5600 MB Eindhoven The Netherlands w.m.p.v.d.aalst@tm.tue.nl

More information

Learning Hybrid Process Models From Events

Learning Hybrid Process Models From Events Learning Hybrid Process Models From Events Process Discovery Without Faking Confidence (Experimental Results) Wil M.P. van der Aalst 1,2 and Riccardo De Masellis 2 and Chiara Di Francescomarino 2 and Chiara

More information

PAGE 2

PAGE 2 PAGE 1 PAGE 2 PAGE 3 PAGE 4 Vision PAGE 5 Desire Lines of Cow Paths? PAGE 6 www.olifantenpaadjes.nl PAGE 7 Desire Lines: Join Them or Fight Them (but never ignore them ) desire line expected or normative

More information

Markings in Perpetual Free-Choice Nets Are Fully Characterized by Their Enabled Transitions

Markings in Perpetual Free-Choice Nets Are Fully Characterized by Their Enabled Transitions Markings in Perpetual Free-Choice Nets Are Fully Characterized by Their Enabled Transitions Wil M.P. van der Aalst Process and Data Science (PADS), RWTH Aachen University, Germany. wvdaalst@pads.rwth-aachen.de

More information

Causal Nets: A Modeling Language Tailored towards Process Discovery

Causal Nets: A Modeling Language Tailored towards Process Discovery Causal Nets: A Modeling Language Tailored towards Process Discovery Wil van der Aalst, Arya Adriansyah, and Boudewijn van Dongen Department of Mathematics and Computer Science, Technische Universiteit

More information

Using Genetic Algorithms to Mine Process Models: Representation, Operators and Results

Using Genetic Algorithms to Mine Process Models: Representation, Operators and Results Using Genetic Algorithms to Mine Process Models: Representation, Operators and Results A.K. Alves de Medeiros, A.J.M.M. Weijters and W.M.P. van der Aalst Department of Technology Management, Eindhoven

More information

Discovering Block-Structured Process Models From Event Logs - A Constructive Approach

Discovering Block-Structured Process Models From Event Logs - A Constructive Approach Discovering Block-Structured Process Models From Event Logs - A Constructive Approach S.J.J. Leemans, D. Fahland, and W.M.P. van der Aalst Department of Mathematics and Computer Science, Eindhoven University

More information

Flexible Heuristics Miner (FHM)

Flexible Heuristics Miner (FHM) Flexible Heuristics Miner (FHM) A.J.M.M. Weijters Eindhoven University of Technology Email: a.j.m.m.weijters@tue.nl J.T.S. Ribeiro Eindhoven University of Technology Email: j.t.s.ribeiro@tue.nl Abstract

More information

Process Mining in Non-Stationary Environments

Process Mining in Non-Stationary Environments and Machine Learning. Bruges Belgium), 25-27 April 2012, i6doc.com publ., ISBN 978-2-87419-049-0. Process Mining in Non-Stationary Environments Phil Weber, Peter Tiňo and Behzad Bordbar School of Computer

More information

DISCOVERING BLOCK STRUCTURED PARALLEL PROCESS MODELS FROM CAUSALLY COMPLETE EVENT LOGS

DISCOVERING BLOCK STRUCTURED PARALLEL PROCESS MODELS FROM CAUSALLY COMPLETE EVENT LOGS Journal of ELECTRICAL ENGINEERING, VOL 67 (2016), NO2, 111 123 DISCOVERING BLOCK STRUCTURED PARALLEL PROCESS MODELS FROM CAUSALLY COMPLETE EVENT LOGS Julijana Lekić Dragan Milićev α-algorithm is suitable

More information

Decomposing Alignment-based Conformance Checking of Data-aware Process Models

Decomposing Alignment-based Conformance Checking of Data-aware Process Models Decomposing Alignment-based Conformance Checking of Data-aware Process Models Massimiliano de Leoni 1, Jorge Munoz-Gama 2, Josep Carmona 2, and Wil M.P. van der Aalst 1 1 Eindhoven University of Technology,

More information

Genetic Process Mining

Genetic Process Mining Genetic Process Mining W.M.P. van der Aalst, A.K. Alves de Medeiros, and A.J.M.M. Weijters Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600 MB, Eindhoven, The

More information

Business Process Technology Master Seminar

Business Process Technology Master Seminar Business Process Technology Master Seminar BPT Group Summer Semester 2008 Agenda 2 Official Information Seminar Timeline Tasks Outline Topics Sergey Smirnov 17 April 2008 Official Information 3 Title:

More information

The Alignment of Formal, Structured and Unstructured Process Descriptions. Josep Carmona

The Alignment of Formal, Structured and Unstructured Process Descriptions. Josep Carmona The Alignment of Formal, Structured and Unstructured Process Descriptions Josep Carmona Thomas Chatain Luis delicado Farbod Taymouri Boudewijn van Dongen Han van der Aa Lluís Padró Josep Sànchez-Ferreres

More information

Interorganizational Workflow Nets: a Petri Net Based Approach for Modelling and Analyzing Interorganizational Workflows

Interorganizational Workflow Nets: a Petri Net Based Approach for Modelling and Analyzing Interorganizational Workflows Interorganizational Workflow Nets: a Petri Net Based Approach for Modelling and Analyzing Interorganizational Workflows Oana Prisecaru and Toader Jucan Faculty of Computer Science, Al. I. Cuza University,

More information

Assigning Ontology-Based Semantics to Process Models: The Case of Petri Nets

Assigning Ontology-Based Semantics to Process Models: The Case of Petri Nets Assigning Ontology-Based Semantics to Process Models: The Case of Petri Nets Pnina Soffer 1, Maya Kaner 2, and Yair Wand 3 1 University of Haifa, Carmel Mountain 31905, Haifa, Israel 2 Ort Braude College,

More information

Mining Process Models with Prime Invisible Tasks

Mining Process Models with Prime Invisible Tasks Mining Process Models with Prime Invisible Tasks Lijie Wen 1,2, Jianmin Wang 1,4,5, Wil M.P. van der Aalst 3, Biqing Huang 2, and Jiaguang Sun 1,4,5 1 School of Software, Tsinghua University, Beijing,

More information

A Unified Approach for Measuring Precision and Generalization Based on Anti-Alignments

A Unified Approach for Measuring Precision and Generalization Based on Anti-Alignments A Unified Approach for Measuring Precision and Generalization Based on Anti-Alignments B.F. van Dongen 1, J. Carmona 2, and T. Chatain 3 1 Eindhoven University of Technology, The Netherlands b.f.v.dongen@tue.nl

More information

Genetic Process Mining

Genetic Process Mining Genetic Process Mining W.M.P. van der Aalst, A.K. Alves de Medeiros, and A.J.M.M. Weijters Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600 MB, Eindhoven, The

More information

Methods for the specification and verification of business processes MPB (6 cfu, 295AA)

Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Roberto Bruni http://www.di.unipi.it/~bruni 17 - Diagnosis for WF nets 1 Object We study suitable diagnosis techniques

More information

Analysis and Optimization of Discrete Event Systems using Petri Nets

Analysis and Optimization of Discrete Event Systems using Petri Nets Volume 113 No. 11 2017, 1 10 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Analysis and Optimization of Discrete Event Systems using Petri Nets

More information

Conformance Checking of Interacting Processes With Overlapping Instances

Conformance Checking of Interacting Processes With Overlapping Instances Conformance Checking of Interacting Processes With Overlapping Instances Dirk Fahland, Massimiliano de Leoni, Boudewijn F. van Dongen, and Wil M.P. van der Aalst Eindhoven University of Technology, The

More information

Time and Timed Petri Nets

Time and Timed Petri Nets Time and Timed Petri Nets Serge Haddad LSV ENS Cachan & CNRS & INRIA haddad@lsv.ens-cachan.fr DISC 11, June 9th 2011 1 Time and Petri Nets 2 Timed Models 3 Expressiveness 4 Analysis 1/36 Outline 1 Time

More information

Improved TBL algorithm for learning context-free grammar

Improved TBL algorithm for learning context-free grammar Proceedings of the International Multiconference on ISSN 1896-7094 Computer Science and Information Technology, pp. 267 274 2007 PIPS Improved TBL algorithm for learning context-free grammar Marcin Jaworski

More information

The State Explosion Problem

The State Explosion Problem The State Explosion Problem Martin Kot August 16, 2003 1 Introduction One from main approaches to checking correctness of a concurrent system are state space methods. They are suitable for automatic analysis

More information

Process Mining. Knut Hinkelmann. Prof. Dr. Knut Hinkelmann MSc Business Information Systems

Process Mining. Knut Hinkelmann. Prof. Dr. Knut Hinkelmann MSc Business Information Systems Knut Hinkelmann Prof. r. Knut Hinkelmann MSc usiness Information Systems Learning Objective Topic: Learning Process knowledge from experience learning a process/decision model ase-ased Reasoning (R) reusing

More information

1 Impact-Driven Process Model Repair

1 Impact-Driven Process Model Repair 1 Impact-Driven Process Model Repair ARTEM POLYVYANYY, Queensland University of Technology, Brisbane, Australia WIL M.P. VAN DER AALST, Eindhoven University of Technology, Eindhoven, The Netherlands, and

More information

arxiv: v1 [cs.ds] 17 Mar 2017

arxiv: v1 [cs.ds] 17 Mar 2017 arxiv:1703.06733v1 [cs.ds] 17 Mar 2017 Discovering Relaxed Sound Workflow Nets using Integer Linear Programming S.J. van Zelst, B.F. van Dongen, W.M.P. van der Aalst, and H.M.W. Verbeek Department of Mathematics

More information

An Intuitive Formal Approach to Dynamic Workflow Modeling and Analysis

An Intuitive Formal Approach to Dynamic Workflow Modeling and Analysis An Intuitive Formal Approach to Dynamic Workflow Modeling and Analysis Jiacun Wang, Daniela Rosca, William Tepfenhart, Allen Milewski, and Michael Stoute 2 Department of Software Engineering, Monmouth

More information

SOBER Cryptanalysis. Daniel Bleichenbacher and Sarvar Patel Bell Laboratories Lucent Technologies

SOBER Cryptanalysis. Daniel Bleichenbacher and Sarvar Patel Bell Laboratories Lucent Technologies SOBER Cryptanalysis Daniel Bleichenbacher and Sarvar Patel {bleichen,sarvar}@lucent.com Bell Laboratories Lucent Technologies Abstract. SOBER is a new stream cipher that has recently been developed by

More information

Reducing Complexity of Large EPCs

Reducing Complexity of Large EPCs Reducing Complexity of Large EPCs Artem Polyvyanyy, Sergey Smirnov, and Mathias Weske Business Process Technology Group Hasso Plattner Institute at the University of Potsdam D-14482 Potsdam, Germany (artem.polyvyanyy,sergey.smirnov,mathias.weske)@hpi.uni-potsdam.de

More information

Process Mining for Ubiquitous Mobile Systems: An Overview and a Concrete Algorithm

Process Mining for Ubiquitous Mobile Systems: An Overview and a Concrete Algorithm Process Mining for Ubiquitous Mobile Systems: An Overview and a Concrete Algorithm A.K.A. de Medeiros, B.F. van Dongen, W.M.P. van der Aalst, and A.J.M.M. Weijters Department of Technology Management,

More information

Checking Behavioral Conformance of Artifacts

Checking Behavioral Conformance of Artifacts Checking Behavioral Conformance of Artifacts Dirk Fahland Massimiliano de Leoni Boudewijn F. van Dongen Wil M.P. van der Aalst, Eindhoven University of Technology, The Netherlands (d.fahland m.d.leoni

More information

arxiv: v1 [cs.db] 3 Nov 2017

arxiv: v1 [cs.db] 3 Nov 2017 Noname manuscript No. (will be inserted by the editor) Discovering More Precise Process Models from Event Logs by Filtering Out Chaotic Activities Niek Tax Natalia Sidorova Wil M. P. van der Aalst Received:

More information

Time(d) Petri Net. Serge Haddad. Petri Nets 2016, June 20th LSV ENS Cachan, Université Paris-Saclay & CNRS & INRIA

Time(d) Petri Net. Serge Haddad. Petri Nets 2016, June 20th LSV ENS Cachan, Université Paris-Saclay & CNRS & INRIA Time(d) Petri Net Serge Haddad LSV ENS Cachan, Université Paris-Saclay & CNRS & INRIA haddad@lsv.ens-cachan.fr Petri Nets 2016, June 20th 2016 1 Time and Petri Nets 2 Time Petri Net: Syntax and Semantic

More information

Encoding Process Discovery Problems in SMT

Encoding Process Discovery Problems in SMT Software and Systems Modeling manuscript No. (will be inserted by the editor) Encoding Process Discovery Problems in SMT Marc Solé Josep Carmona Received: date / Accepted: date Abstract Information Systems,

More information

Methods for the specification and verification of business processes MPB (6 cfu, 295AA)

Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Roberto Bruni http://www.di.unipi.it/~bruni 20 - Workflow modules 1 Object We study Workflow modules to model interaction

More information

Final Exam December 12, 2017

Final Exam December 12, 2017 Introduction to Artificial Intelligence CSE 473, Autumn 2017 Dieter Fox Final Exam December 12, 2017 Directions This exam has 7 problems with 111 points shown in the table below, and you have 110 minutes

More information

Final Exam December 12, 2017

Final Exam December 12, 2017 Introduction to Artificial Intelligence CSE 473, Autumn 2017 Dieter Fox Final Exam December 12, 2017 Directions This exam has 7 problems with 111 points shown in the table below, and you have 110 minutes

More information

Bayesian Methods in Artificial Intelligence

Bayesian Methods in Artificial Intelligence WDS'10 Proceedings of Contributed Papers, Part I, 25 30, 2010. ISBN 978-80-7378-139-2 MATFYZPRESS Bayesian Methods in Artificial Intelligence M. Kukačka Charles University, Faculty of Mathematics and Physics,

More information

CSL302/612 Artificial Intelligence End-Semester Exam 120 Minutes

CSL302/612 Artificial Intelligence End-Semester Exam 120 Minutes CSL302/612 Artificial Intelligence End-Semester Exam 120 Minutes Name: Roll Number: Please read the following instructions carefully Ø Calculators are allowed. However, laptops or mobile phones are not

More information

Security as a Resource in Process-Aware Information Systems

Security as a Resource in Process-Aware Information Systems Security as a Resource in Process-Aware Information Systems 14 October 2011 Joint Work with: Jason Crampton Information Security Group Royal Holloway Jim Huan-Pu Kuo Department of Computing Imperial College

More information

PROCESS mining [1] is a family of methods concerned

PROCESS mining [1] is a family of methods concerned 1 Complete and Interpretable Conformance Checking of Business Processes Luciano García-Bañuelos, Nick RTP van Beest, Marlon Dumas and Marcello La Rosa Abstract This article presents a method for checking

More information

Systems engineering. Organization of the course, background knowledge Systems analysis introduction L E C T U R E. Ing. Zuzana Bělinová, Ph.D.

Systems engineering. Organization of the course, background knowledge Systems analysis introduction L E C T U R E. Ing. Zuzana Bělinová, Ph.D. L E C T U R E 1 Systems engineering Organization of the course, background knowledge Systems analysis introduction Ing., Ph.D. LECTURE 1 - OVERVIEW Organizational Issues Background knowledge - Systems

More information

Compositional Discovery of Workflow Nets from Event Logs Using Morphisms

Compositional Discovery of Workflow Nets from Event Logs Using Morphisms Compositional Discovery of Workflow Nets from Event Logs Using Morphisms Luca Bernardinello 2, Irina Lomazova 1, Roman Nesterov 1,2, and Lucia Pomello 2 1 National Research University Higher School of

More information

Probabilistic Models

Probabilistic Models Bayes Nets 1 Probabilistic Models Models describe how (a portion of) the world works Models are always simplifications May not account for every variable May not account for all interactions between variables

More information

PROCESS DISCOVERY: A NEW METHOD FITTED TO BIG EVENT LOGS

PROCESS DISCOVERY: A NEW METHOD FITTED TO BIG EVENT LOGS PROCESS DISCOVERY: A NEW METHOD FITTED TO BIG EVENT LOGS 1 SOUHAIL BOUSHABA, 2 MOHAMMAD ISSAM KABBAJ, 3 FATIMA-ZAHRA BELOUADHA, 4 ZOHRA BAKKOURY, 1 Ph.D candidate, 2 Assistant Professor, 3 Habilitated

More information

arxiv: v1 [cs.ma] 11 Jun 2018

arxiv: v1 [cs.ma] 11 Jun 2018 Compositional Discovery of Workflow Nets from Event Logs Using Morphisms Luca Bernardinello 2, Irina Lomazova 1, Roman Nesterov 1,2, and Lucia Pomello 2 arxiv:1806.04254v1 [cs.ma] 11 Jun 2018 1 National

More information

Methods for the specification and verification of business processes MPB (6 cfu, 295AA)

Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Roberto Bruni http://www.di.unipi.it/~bruni 20 - Workflow modules 1 Object We study Workflow modules to model interaction

More information

Bayesian Networks: Construction, Inference, Learning and Causal Interpretation. Volker Tresp Summer 2016

Bayesian Networks: Construction, Inference, Learning and Causal Interpretation. Volker Tresp Summer 2016 Bayesian Networks: Construction, Inference, Learning and Causal Interpretation Volker Tresp Summer 2016 1 Introduction So far we were mostly concerned with supervised learning: we predicted one or several

More information

Heuristics for High-Utility Local Process Model Mining

Heuristics for High-Utility Local Process Model Mining Heuristics for High-Utility Local Process Model Mining Benjamin Dalmas 1, Niek Tax 2, and Sylvie Norre 1 1 Clermont-Auvergne University, LIMOS CNRS UMR 6158, Aubière, France {benjamin.dalmas,sylvie.norre}@isima.fr

More information

ILP-Based Process Discovery Using Hybrid Regions

ILP-Based Process Discovery Using Hybrid Regions ILP-Based Process Discovery Using Hybrid Regions S.J. van Zelst, B.F. van Dongen, and W.M.P. van der Aalst Department of Mathematics and Computer Science Eindhoven University of Technology, The Netherlands

More information

Bayesian Networks: Construction, Inference, Learning and Causal Interpretation. Volker Tresp Summer 2014

Bayesian Networks: Construction, Inference, Learning and Causal Interpretation. Volker Tresp Summer 2014 Bayesian Networks: Construction, Inference, Learning and Causal Interpretation Volker Tresp Summer 2014 1 Introduction So far we were mostly concerned with supervised learning: we predicted one or several

More information

Stochastic Petri Net. Ben, Yue (Cindy) 2013/05/08

Stochastic Petri Net. Ben, Yue (Cindy) 2013/05/08 Stochastic Petri Net 2013/05/08 2 To study a formal model (personal view) Definition (and maybe history) Brief family tree: the branches and extensions Advantages and disadvantages for each Applications

More information

Sample questions for COMP-424 final exam

Sample questions for COMP-424 final exam Sample questions for COMP-44 final exam Doina Precup These are examples of questions from past exams. They are provided without solutions. However, Doina and the TAs would be happy to answer questions

More information

Chapter 5 Process Discovery: An Introduction

Chapter 5 Process Discovery: An Introduction Chapter 5 Process Discovery: An Introduction Process discovery is one of the most challenging process mining tasks. Based on an event log, a process model is constructed thus capturing the behavior seen

More information

Discrete Event Systems Exam

Discrete Event Systems Exam Computer Engineering and Networks Laboratory TEC, NSG, DISCO HS 2016 Prof. L. Thiele, Prof. L. Vanbever, Prof. R. Wattenhofer Discrete Event Systems Exam Friday, 3 rd February 2017, 14:00 16:00. Do not

More information

A graph contains a set of nodes (vertices) connected by links (edges or arcs)

A graph contains a set of nodes (vertices) connected by links (edges or arcs) BOLTZMANN MACHINES Generative Models Graphical Models A graph contains a set of nodes (vertices) connected by links (edges or arcs) In a probabilistic graphical model, each node represents a random variable,

More information

Tractable Inference in Hybrid Bayesian Networks with Deterministic Conditionals using Re-approximations

Tractable Inference in Hybrid Bayesian Networks with Deterministic Conditionals using Re-approximations Tractable Inference in Hybrid Bayesian Networks with Deterministic Conditionals using Re-approximations Rafael Rumí, Antonio Salmerón Department of Statistics and Applied Mathematics University of Almería,

More information

Bounded Approximation Algorithms

Bounded Approximation Algorithms Bounded Approximation Algorithms Sometimes we can handle NP problems with polynomial time algorithms which are guaranteed to return a solution within some specific bound of the optimal solution within

More information

Process Mining. prof.dr.ir. Wil van der Aalst

Process Mining. prof.dr.ir. Wil van der Aalst Process Mining Tutorial Computational Intelligence in HealthCare 20-24 September 2010, Eindhoven, the Netherlands prof.dr.ir. Wil van der Aalst www.processmining.org Focus of most modeling and analysis

More information

Business Process Management

Business Process Management Business Process Management Theory: The Pi-Calculus Frank Puhlmann Business Process Technology Group Hasso Plattner Institut Potsdam, Germany 1 What happens here? We discuss the application of a general

More information

Automatic Partitions Extraction to Distribute the Runtime Verification of a Global Specification

Automatic Partitions Extraction to Distribute the Runtime Verification of a Global Specification Automatic Partitions Extraction to Distribute the Runtime Verification of a Global Specification Angelo Ferrando DIBRIS, University of Genova, Italy angelo.ferrando@dibris.unige.it Abstract. Trace expressions

More information

TRAITS to put you on the map

TRAITS to put you on the map TRAITS to put you on the map Know what s where See the big picture Connect the dots Get it right Use where to say WOW Look around Spread the word Make it yours Finding your way Location is associated with

More information

ADVANCED ROBOTICS. PLAN REPRESENTATION Generalized Stochastic Petri nets and Markov Decision Processes

ADVANCED ROBOTICS. PLAN REPRESENTATION Generalized Stochastic Petri nets and Markov Decision Processes ADVANCED ROBOTICS PLAN REPRESENTATION Generalized Stochastic Petri nets and Markov Decision Processes Pedro U. Lima Instituto Superior Técnico/Instituto de Sistemas e Robótica September 2009 Reviewed April

More information

THROUGHPUT ANALYSIS OF MANUFACTURING CELLS USING TIMED PETRI NETS

THROUGHPUT ANALYSIS OF MANUFACTURING CELLS USING TIMED PETRI NETS c 1994 IEEE. Published in the Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, San Antonio, TX, October 2 5, 1994. Personal use of this material is permitted. However,

More information

A Hierarchical Markov Model to Understand the Behaviour of Agents in Business Processes

A Hierarchical Markov Model to Understand the Behaviour of Agents in Business Processes A Hierarchical Markov Model to Understand the Behaviour of Agents in Business Processes Diogo R. Ferreira 1, Fernando Szimanski 2, Célia Ghedini Ralha 2 1 IST Technical University of Lisbon, Portugal diogo.ferreira@ist.utl.pt

More information

Planning Under Uncertainty II

Planning Under Uncertainty II Planning Under Uncertainty II Intelligent Robotics 2014/15 Bruno Lacerda Announcement No class next Monday - 17/11/2014 2 Previous Lecture Approach to cope with uncertainty on outcome of actions Markov

More information

7. Queueing Systems. 8. Petri nets vs. State Automata

7. Queueing Systems. 8. Petri nets vs. State Automata Petri Nets 1. Finite State Automata 2. Petri net notation and definition (no dynamics) 3. Introducing State: Petri net marking 4. Petri net dynamics 5. Capacity Constrained Petri nets 6. Petri net models

More information

CS 5522: Artificial Intelligence II

CS 5522: Artificial Intelligence II CS 5522: Artificial Intelligence II Bayes Nets Instructor: Alan Ritter Ohio State University [These slides were adapted from CS188 Intro to AI at UC Berkeley. All materials available at http://ai.berkeley.edu.]

More information

Semi-asynchronous. Fault Diagnosis of Discrete Event Systems ALEJANDRO WHITE DR. ALI KARIMODDINI OCTOBER

Semi-asynchronous. Fault Diagnosis of Discrete Event Systems ALEJANDRO WHITE DR. ALI KARIMODDINI OCTOBER Semi-asynchronous Fault Diagnosis of Discrete Event Systems ALEJANDRO WHITE DR. ALI KARIMODDINI OCTOBER 2017 NC A&T State University http://www.ncat.edu/ Alejandro White Semi-asynchronous http://techlav.ncat.edu/

More information

Process Mining: A Two-Step Approach to Balance Between Underfitting and Overfitting

Process Mining: A Two-Step Approach to Balance Between Underfitting and Overfitting Process Mining: Two-Step pproach to alance etween Underfitting and Overfitting W.M.P. van der alst 1, V. Rubin 2,1, H.M.W. Verbeek 1,.F. van ongen 1,. Kindler 3, and.w. Günther 1 1 indhoven University

More information

Comparison of Shannon, Renyi and Tsallis Entropy used in Decision Trees

Comparison of Shannon, Renyi and Tsallis Entropy used in Decision Trees Comparison of Shannon, Renyi and Tsallis Entropy used in Decision Trees Tomasz Maszczyk and W lodzis law Duch Department of Informatics, Nicolaus Copernicus University Grudzi adzka 5, 87-100 Toruń, Poland

More information

Distributed Genetic Algorithm for feature selection in Gaia RVS spectra. Application to ANN parameterization

Distributed Genetic Algorithm for feature selection in Gaia RVS spectra. Application to ANN parameterization Distributed Genetic Algorithm for feature selection in Gaia RVS spectra. Application to ANN parameterization Diego Fustes, Diego Ordóñez, Carlos Dafonte, Minia Manteiga and Bernardino Arcay Abstract This

More information

Chapter 6 Process Discovery: An Introduction

Chapter 6 Process Discovery: An Introduction Chapter 6 Process Discovery: An Introduction Process discovery is one of the most challenging process mining tasks. Based on an event log a process model is constructed thus capturing the behavior seen

More information

Intelligent Systems Statistical Machine Learning

Intelligent Systems Statistical Machine Learning Intelligent Systems Statistical Machine Learning Carsten Rother, Dmitrij Schlesinger WS2014/2015, Our tasks (recap) The model: two variables are usually present: - the first one is typically discrete k

More information

Extending Process Logs with Events from Supplementary Sources. Felix Mannhardt Massimiliano de Leoni, Hajo A.

Extending Process Logs with Events from Supplementary Sources. Felix Mannhardt Massimiliano de Leoni, Hajo A. Extending Process Logs with Events from Supplementary Sources Felix Mannhardt (@fmannhardt), Massimiliano de Leoni, Hajo A. Reijers Heterogeneous Information Systems Systems Databases Join Event Logs?

More information

CS 188: Artificial Intelligence Fall 2009

CS 188: Artificial Intelligence Fall 2009 CS 188: Artificial Intelligence Fall 2009 Lecture 14: Bayes Nets 10/13/2009 Dan Klein UC Berkeley Announcements Assignments P3 due yesterday W2 due Thursday W1 returned in front (after lecture) Midterm

More information

Computer Simulation and Applications in Life Sciences. Dr. Michael Emmerich & Dr. Andre Deutz LIACS

Computer Simulation and Applications in Life Sciences. Dr. Michael Emmerich & Dr. Andre Deutz LIACS Computer Simulation and Applications in Life Sciences Dr. Michael Emmerich & Dr. Andre Deutz LIACS Part 0: Course Preliminaries Course Preliminaries The course consists of 13 lectures + exercises Exercises

More information

Aligning Event Logs and Process Models for Multi-Perspective Conformance Checking: An Approach Based on Integer Linear Programming

Aligning Event Logs and Process Models for Multi-Perspective Conformance Checking: An Approach Based on Integer Linear Programming Aligning Event Logs and Process Models for Multi-Perspective Conformance Checking: An Approach Based on Integer Linear Programming Massimiliano de Leoni and Wil M. P. van der Aalst Eindhoven University

More information

Distributed systems Lecture 4: Clock synchronisation; logical clocks. Dr Robert N. M. Watson

Distributed systems Lecture 4: Clock synchronisation; logical clocks. Dr Robert N. M. Watson Distributed systems Lecture 4: Clock synchronisation; logical clocks Dr Robert N. M. Watson 1 Last time Started to look at time in distributed systems Coordinating actions between processes Physical clocks

More information

Data Warehousing & Data Mining

Data Warehousing & Data Mining 13. Meta-Algorithms for Classification Data Warehousing & Data Mining Wolf-Tilo Balke Silviu Homoceanu Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 13.

More information

Soundness of Workflow Nets with an Unbounded Resource is Decidable

Soundness of Workflow Nets with an Unbounded Resource is Decidable Soundness of Workflow Nets with an Unbounded Resource is Decidable Vladimir A. Bashkin 1 and Irina A. Lomazova 2,3 1 Yaroslavl State University, Yaroslavl, 150000, Russia v_bashkin@mail.ru 2 National Research

More information

Using first-order logic, formalize the following knowledge:

Using first-order logic, formalize the following knowledge: Probabilistic Artificial Intelligence Final Exam Feb 2, 2016 Time limit: 120 minutes Number of pages: 19 Total points: 100 You can use the back of the pages if you run out of space. Collaboration on the

More information

CS 343: Artificial Intelligence

CS 343: Artificial Intelligence CS 343: Artificial Intelligence Bayes Nets Prof. Scott Niekum The University of Texas at Austin [These slides based on those of Dan Klein and Pieter Abbeel for CS188 Intro to AI at UC Berkeley. All CS188

More information

Distributed Deadlock-Avoidance. IMDEA Software Institute, Spain

Distributed Deadlock-Avoidance. IMDEA Software Institute, Spain Distributed Deadlock-voidance César Sánchez IMDE Software Institute, Spain DRV Workshop, ertinoro 19-May, 216 Distributed Deadlock-voidance little story about how static knowledge can help solve unsolvable

More information

Name: UW CSE 473 Final Exam, Fall 2014

Name: UW CSE 473 Final Exam, Fall 2014 P1 P6 Instructions Please answer clearly and succinctly. If an explanation is requested, think carefully before writing. Points may be removed for rambling answers. If a question is unclear or ambiguous,

More information

Basic Statistics for Astrologers

Basic Statistics for Astrologers Page 1 of 5 Basic Statistics for Astrologers Written by Sergey Tarassov The statistics is the most tricky science I have ever dealt with. A decent person from the street who is not a statistician might

More information

Robust process mining with guarantees

Robust process mining with guarantees Robust process mining with guarantees Leemans, S.J.J. Published: 09/05/2017 Document Version Publisher s PDF, also known as Version of Record (includes final page, issue and volume numbers) Please check

More information

Reliability of Technical Systems. Advanced Methods for Systems Modelling and Simulation I : Petri Nets

Reliability of Technical Systems. Advanced Methods for Systems Modelling and Simulation I : Petri Nets Reliability of Technical Systems Advanced Methods for Systems Modelling and Simulation I : Petri Nets Petri Nets - Overview Introduction Basic elements and rules Notation Extensions/Tools Applications

More information

What happens to the value of the expression x + y every time we execute this loop? while x>0 do ( y := y+z ; x := x:= x z )

What happens to the value of the expression x + y every time we execute this loop? while x>0 do ( y := y+z ; x := x:= x z ) Starter Questions Feel free to discuss these with your neighbour: Consider two states s 1 and s 2 such that s 1, x := x + 1 s 2 If predicate P (x = y + 1) is true for s 2 then what does that tell us about

More information