Mine Your Own Business
|
|
- Thomasina Shaw
- 5 years ago
- Views:
Transcription
1 33 Mine Your Own Business Using process mining to turn big data into better processes and systems prof.dr.ir. Wil van der Aalst PAGE 0
2 Season 1, Episode 4 (1969) PAGE 1
3 "Mine Your Own Business" (2006) the world's first anti-environmentalist documentary PAGE 2
4 Mine your own business: Turning big data into real value
5 process mining as the missing link aligning model and reality divide and conquer process discovery Big (Event) Data challenges getting started PAGE 4
6 process mining as the missing link aligning model and reality divide and conquer process discovery Big (Event) Data challenges getting started PAGE 5
7 process model analysis (simulation, verification, optimization, gaming, etc.) performanceoriented questions, problems and solutions process mining complianceoriented questions, problems and solutions data-oriented analysis (data mining, machine learning, business intelligence) PAGE 6
8 PAGE 7
9 PAGE 8
10 PAGE 9
11 let's play PAGE 10
12 Play-Out process model event log PAGE 11
13 Play-Out (Classical use of models) B A p1 E p3 D start end p2 C p4 A B C D A E D A C B D A B C D A E D A C B D A E D A C B D PAGE 12
14 Play-In event log process model PAGE 13
15 Play-In A B C D A C B D A E D A E D A B C D A C B D A E D A C B D B A p1 E p3 D start end p2 C p4 PAGE 14
16 Example Process Discovery (Vestia, Dutch housing agency, 208 cases, 5987 events) PAGE 15
17 Example Process Discovery (ASML, test process lithography systems, events) PAGE 16
18 Example Process Discovery (AMC, 627 gynecological oncology patients, events) PAGE 17
19 Replay event log process model extended model showing times, frequencies, etc. diagnostics predictions recommendations PAGE 18
20 Replay A B C D B A p1 E p3 D start end p2 C p4 PAGE 19
21 Replay A E D B A p1 E p3 D start end p2 C p4 PAGE 20
22 Replay can detect problems A C D Problem! token left behind B Problem! missing token A p1 E p3 D start end p2 C p4 PAGE 21
23 Conformance Checking (WOZ objections Dutch municipality, 745 objections, 9583 event, f= 0.988) PAGE 22
24 Replay can extract timing information A 5 B 8 C 9 D B A p1 E p3 D start 5 4 p C 9 p end PAGE 23
25 Performance Analysis Using Replay (WOZ objections Dutch municipality, 745 objections, 9583 event, f= 0.988) PAGE 24
26 Models are like the glasses required to see and understand event data! PAGE 25
27 process mining as the missing link aligning model and reality divide and conquer process discovery Big (Event) Data challenges getting started PAGE 26
28 Language identification in the limit (Mark Gold 1967) abc? ab(c d)? (ad) (ab(c d))? ab*(c d)? abc abd ad abbc ac A language is learnable in the limit if there exists a perfect child that generates only finitely many hypotheses. Language identification in the limit by E Mark Gold, Information and Control, 10(5): , PAGE 27
29 Learning is not easy Even simple languages like regular languages are not learnable in the limit. Many settings: evil or wellbehaving mothers, with or without negative examples, frequencies, etc. sentence trace in event log language process model PAGE 28
30 Process discovery algorithms (small selection) automata-based learning heuristic mining distributed genetic mining language-based regions genetic mining stochastic task graphs state-based regions LTL mining neural networks fuzzy mining mining block structures hidden Markov models α algorithm α# algorithm conformal process graph multi-phase mining partial-order based mining α++ algorithm ILP mining PAGE 29
31 Quiz Question: How to remove behavior? B A p1 E p3 D start end p2 C p4 PAGE 30
32 Quiz Question: How to remove behavior? B A p1 E p3 D start end p2 C p4 Add places or remove transitions! PAGE 31
33 Quiz Question: How to add behavior? B A p1 E p3 D start end p2 C p4 PAGE 32
34 Quiz Question: How to add behavior? B A p1 E p3 D start end p2 C p4 F Add transition or remove places! PAGE 33
35 Places limit behavior B A E D C abcd ad abed abccd acbd aebcd aed aad caed aded PAGE 34
36 Places limit behavior B A E D start C abcd ad abed abccd acbd aeccd aed aad caed aded PAGE 35
37 Places limit behavior B A E D start end C abcd ad abed abccd acbd aebcd aed aad caed aded PAGE 36
38 Places limit behavior B A p1 E D start end C abcd ad abed abccd acbd aebcd aed aad caed aded PAGE 37
39 Places limit behavior B A p1 E p3 D start end p2 C p4 abcd ad abed abccd acbd aebcd aed aad caed aded PAGE 38
40 Example: Process Discovery Using Language-Based Regions f c1 A place is feasible if it can be added without disabling any of the traces in the event log. a1 b1 e c d a2 p R b2 X Y PAGE 39
41 Genetic process mining: Overview create initial population event log mutation termination compute fitness tournament next generation elitism children crossover select best individual parents dead individuals PAGE 40
42 Example: crossover PAGE 41 a start register request b examine thoroughly c examine casually d check ticket decide pay compensation reject request reinitiate request e g h f end a start register request b examine thoroughly c examine casually d check ticket decide pay compensation reject request reinitiate request e g h f end a start register request b examine thoroughly c examine casually d check ticket decide reinitiate request e f a start register request b examine thoroughly c examine casually d check ticket decide pay compensation reject request reinitiate request e g h f end pay compensation reject request g h end
43 Example: mutation remove place b b examine thoroughly g examine thoroughly g start a register request c examine casually d check ticket decide f e reinitiate request pay compensation h reject request end start a register request added arc c examine casually d check ticket e decide f reinitiate request pay compensation h reject request end PAGE 42
44 models are like maps, their usefulness is determined by the intended use, i.e., there is not a single "perfect map" PAGE 43
45 process mining as the missing link aligning model and reality divide and conquer process discovery Big (Event) Data challenges getting started PAGE 44
46 Conformance checking an activity that should not happen happened an activity was executed by the wrong person an activity was executed too late an activity that should happen did not happen two activities were swapped PAGE 45
47 Alignments are essential! conformance checking to diagnose deviations squeezing reality into the model to do model-based analysis PAGE 46
48 process model event log synchronous move move on model only move on log only PAGE 47
49 Example: BPI Challenge 2012 (Dutch financial institute, doi: /uuid:3926db30-f aebc e91f) Loops of W_Completeren aanvraag and W_Nabellen offertes are often performed O_DECLINED and W_Wijzigen contractgegevens are often skipped Many moves on log of O_CANCELLED, O_CREATED, O_SELECTED, O_SENT occurred with the same frequency value (i.e. 60) before parallel branch Work of Arya Adriansyah (Replay project) Many moves on log of W_Afhandelen leads ( > 2200 times) occurred in the end of traces PAGE 48
50 Synchronous moves of Completeren aanvraag Loops of W_Completeren aanvraag and W_Nabellen offertes are often performed O_DECLINED and W_Wijzigen contractgegevens are often skipped Move on log of Completeren aanvraag Many moves on log of O_CANCELLED, O_CREATED, O_SELECTED, O_SENT occurred with the same frequency value (i.e. 60) before parallel branch The average waiting time for the input place of W_Nabellen offertes+start is very long (2.83 days) compares to the average waiting time of other places Move on log of O_CANCELLED and A_CANCELLED Moves on model towards end of traces Many moves on log of W_Afhandelen leads ( > 2200 times) occurred in the end of traces O_ACCEPTED has average sojourn time of minutes, while A_REGISTERED, A_ACTIVATED, and A_APPROVED have average sojourn time of minutes Activity W_Wijzigen contractgegevens is the bottleneck, but it occured rarely (only 4 times) PAGE 49
51 PAGE 50
52 process mining as the missing link aligning model and reality divide and conquer process discovery Big (Event) Data challenges getting started PAGE 51
53 In 10 years we will have 50 times as much data! PAGE 52
54 PAGE 53
55 PAGE 54
56 PAGE 55
57 PAGE 56
58 Big Data? PAGE 57
59 Big or fast and efficient? PAGE 58
60 process mining as the missing link aligning model and reality divide and conquer process discovery Big (Event) Data challenges getting started PAGE 59
61 Big Data: Opportunities and Challenges PAGE 60
62 Divide and Conquer A D 1: AC 2: BC 3: BC 4: AC 5: AC 6: AC 7: BC 8: BC B C 1: CDEG 2: CFG 3: CFG 4: CEDG 5: CFG 6: CEDG 7: CEDG 8: CDEG C F E G split horizontally split vertically 1: ACDEG 2: BCFG 3: BCFG 4: ACEDG 5: ACFG 6: ACEDG 7: BCEDG 8: BCDEG start A B C D F E G complete merge horizontally merge vertically D 1: ACDEG 4: ACEDG 6: ACEDG A C E G D 7: BCEDG 8: BCDEG B C E G 5: ACFG A C F G 2: BCFG 3: BCFG B C F G PAGE 61
63 Vertical Decomposition A D split vertically 1: ACDEG 2: BCFG 3: BCFG 4: ACEDG 5: ACFG 6: ACEDG 7: BCEDG 8: BCDEG start B C F E G complete merge vertically D 1: ACDEG 4: ACEDG 6: ACEDG A C E G D 7: BCEDG 8: BCDEG B C E G 5: ACFG A C F G 2: BCFG 3: BCFG B C F G PAGE 62
64 Horizontal Decomposition A D 1: AC 2: BC 3: BC 4: AC 5: AC 6: AC 7: BC 8: BC B C 1: CDEG 2: CFG 3: CFG 4: CEDG 5: CFG 6: CEDG 7: CEDG 8: CDEG C F E G split horizontally 1: ACDEG 2: BCFG 3: BCFG 4: ACEDG 5: ACFG 6: ACEDG 7: BCEDG 8: BCDEG start A B C D F E G complete merge horizontally PAGE 63
65 Decomposing Conformance Checking e.g., maximal decomposition, passage-based decomposition, or SESE/RPST-based decomposition e.g., A* based alignments, token-based replay, or simple replay until first deviation decomposition technique yields a (valid) activity partitioning conformance checking technique SN process model decompose model M 1 submodel M 2 submodel M n submodel conformance check conformance check conformance check L event log decompose event log L 1 sublog L 2 sublog L n sublog conformance diagnostics PAGE 64
66 Example of a valid decomposition f t7 c7 t8 c8 t11 start a t1 c1 c2 t2 b t3 c t4 c3 c4 d t5 e c5 c6 g t9 h t10 c9 end Log can be split in the same way! t6 SN 1 start a t1 SN 2 a t1 c1 t2 b t3 c3 d t5 e t6 SN 5 t7 d t5 e c5 c7 c6 f t8 g t9 h t10 f t8 g t9 h t10 c8 c9 t11 end SN 6 a t6 t1 c2 c SN 4 d t5 SN 3 t4 e t6 c t4 c4 PAGE 65
67 Example of alignment for observed trace a,b,c,d,e,c,d,g,f a,b,c,d,e,c,d,g,f t2 c1 b a t3 start t1 c2 c t4 c3 c4 t7 d t5 e t6 c5 c7 c6 f t8 g t9 h t10 c8 c9 t11 end SN 1 start a t1 SN 3 a t1 c2 SN 2 a t1 c t4 c1 e t6 t2 b t3 c3 SN 4 c t4 d t5 e t6 c4 SN 5 t7 d t5 e t6 d t5 c5 c7 c6 f t8 g t9 h t10 f t8 g t9 h t10 c8 c9 t11 end SN 6 Etc. PAGE 66
68 Conformance checking can be decomposed!!! General result for any valid decomposition: Any event log or trace is perfectly fitting the overall model if and only if it is also fitting all the individual fragments start a t1 c1 c2 t2 b t3 c t4 c3 c4 t7 d t5 e t6 c5 c7 c6 f t8 g t9 h t10 c8 c9 t11 end SN 1 start a t1 SN 3 a t1 c2 SN 2 a t1 c t4 c1 e t6 t2 b t3 c3 SN 4 c t4 d t5 e t6 c4 SN 5 t7 d t5 e t6 d t5 c5 c7 c6 f t8 g t9 h t10 f t8 g t9 h t10 c8 c9 t11 end SN 6 Wil van der Aalst, Decomposing Petri nets for process mining: A generic approach. Distributed and Parallel Databases, Volume 31, Issue 4, pp , 2013 PAGE 67
69 Decomposing Process Discovery e.g., causal graph based on frequencies is decomposed using passages or SESE/RPST e.g., language/state-based region discovery, variants of alpha algorithm, genetic process mining decomposition technique yields a (valid) activity partitioning process discovery technique L event log decompose event log L 1 sublog L 2 sublog L n sublog discovery discovery discovery M process model compose model M 1 submodel M 2 submodel M n submodel PAGE 68
70 Learn more about decomposing process mining problems? W.M.P. van der Aalst. Decomposing Petri Nets for Process Mining: A Generic Approach. Distributed and Parallel Databases, 31(4): , W.M.P. van der Aalst. A General Divide and Conquer Approach for Process Mining. In M. Ganzha, L. Maciaszek, and M. Paprzycki, editors, Federated Conference on Computer Science and Information Systems (FedCSIS 2013), pages IEEE Computer Society, W.M.P. van der Aalst. Decomposing Process Mining Problems Using Passages. In S. Haddad and L. Pomello, editors, Applications and Theory of Petri Nets 2012, volume 7347 of Lecture Notes in Computer Science, pages Springer-Verlag, Berlin, J. Munoz-Gama, J. Carmona, and W.M.P. van der Aalst. Hierarchical Conformance Checking of Process Models Based on Event Logs. In J.M. Colom and J. Desel, editors, Applications and Theory of Petri Nets 2013, volume 7927 of Lecture Notes in Computer Science, pages Springer-Verlag, Berlin, J. Munoz-Gama, J. Carmona, and W.M.P. van der Aalst. Conformance Checking in the Large: Partitioning and Topology. In F. Daniel, J. Wang, and B. Weber, editors, International Conference on Business Process Management (BPM 2013), volume 8094 of Lecture Notes in Computer Science, pages Springer-Verlag, Berlin, E. Verbeek and W.M.P. van der Aalst. Decomposing Replay Problems: A Case Study. In D. Moldt and H. Roelke, editors, Proceedings of the International Workshop on Petri Nets in Software Engineering (PNSE 2013), volume 989 of CEUR Workshop Proceedings, pages CEUR- WS.org, PAGE 69
71 process mining as the missing link aligning model and reality divide and conquer process discovery Big (Event) Data challenges getting started PAGE 70
72 Distributing process mining problems to cope with big data PAGE 71
73 streaming event data (sensors, RFID, messages, etc.) PAGE 72
74 process discovery: finding sheep with five or more legs 1 formal (not just a picture) fast (should not take years) 2 ability to balance all conformance dimensions (fitness, precision, generalization, and simplicity) incl. noise provide guarantees (not just a best effort) sound (result should at least be free of deadlocks, etc.) PAGE 73
75 On-the-fly process mining Operational support PAGE 74
76 Concept drift Concept drift PAGE 75
77 Cross-organizational mining cross-organizational / comparative process mining PAGE 76
78 Supporting the process of process mining PAGE 78
79 process mining as the missing link aligning model and reality divide and conquer process discovery Big (Event) Data challenges getting started PAGE 79
80 How to get started? PAGE 80
81 600+ plug-ins available covering the whole process mining spectrum open-source (L-GPL) Download from: 81
82 Commercial Alternatives Disco (Fluxicon) Perceptive Process Mining (before Futura Reflect and BPM one) ARIS Process Performance Manager QPR ProcessAnalyzer Interstage Process Discovery (Fujitsu) Discovery Analyst (StereoLOGIC) XMAnalyzer (XMPro) 82
83 How to Get Started? Collect event data Collect questions Minimal requirement: events referring to an activity name and a process instance. Good to have: timestamps, resource information, additional data elements. Challenges: scoping and sometimes correlation. What kind problems would you like to address (cost, time, risk, compliance, service, etc.)? Related to discovery, conformance, enhancement? Iterative process: can be curiosity driven initially. 83
84 Join our expedition: Mine your processes! performance-oriented questions, problems and solutions process model analysis (simulation, verification, etc.) process mining data-oriented analysis (data mining, machine learning, business intelligence) compliance-oriented questions, problems and solutions PAGE 84
85 Learn more? Informal PM Meeting (15.50 today). Thanks to Krzysztof Kluza! Building C2 (entrance through buildings C1 or C3), room no. 316 (3rd floor). PAGE 85
Distributed Process Discovery and Conformance Checking
Distributed Process Discovery and Conformance Checking prof.dr.ir. Wil van der Aalst www.processmining.org On the different roles of (process) models PAGE 1 Play-Out PAGE 2 Play-Out (Classical use of models)
More informationChapter 8 Mining Additional Perspectives
Chapter 8 Mining Additional Perspectives prof.dr.ir. Wil van der Aalst www.processmining.org Overview Chapter 1 Introduction Part I: Preliminaries Chapter 2 Process Modeling and Analysis Chapter 3 Data
More informationAn Experimental Evaluation of Passage-Based Process Discovery
An Experimental Evaluation of Passage-Based Process Discovery H.M.W. Verbeek and W.M.P. van der Aalst Technische Universiteit Eindhoven Department of Mathematics and Computer Science P.O. Box 513, 5600
More informationProcess Discovery and Conformance Checking Using Passages
Fundamenta Informaticae XX (2012) 1 35 1 DOI 10.3233/FI-2012-0000 IOS Press Process Discovery and Conformance Checking Using Passages W.M.P. van der Aalst Department of Mathematics and Computer Science,
More informationProcess Mining in the Large: A Tutorial
Process Mining in the Large: A Tutorial Wil M.P. van der Aalst Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, The Netherlands; Business Process Management
More informationAutomatic Root Cause Identification Using Most Probable Alignments
Automatic Root Cause Identification Using Most Probable Alignments Marie Koorneef, Andreas Solti 2, Henrik Leopold, Hajo A. Reijers,3 Department of Computer Sciences, Vrije Universiteit Amsterdam, The
More informationDecomposing Conformance Checking on Petri Nets with Data
Decomposing Conformance Checking on Petri Nets with Data Massimiliano de Leoni 1,2, Jorge Munoz-Gama 3, Josep Carmona 3, and Wil M.P. van der Aalst 2 1 University of Padua, Padua (Italy) 2 Eindhoven University
More informationProcess Mining Enabling Data-Driven Process Discovery and Analysis Using ProM
Process ining Enabling Data-Driven Process Discovery and Analysis Using Pro Keynote SIPDA 2011 Campione d Italia, June 29, 2011 prof.dr.ir. Wil van der Aalst www.processmining.org Baarle-Nassau (NL) /Baarle-Hertog
More informationDrFurby Classifier. Process Discovery BPM Where innovation starts
Den Dolech 2, 5612 AZ Eindhoven P.O. Box 513, 5600 MB Eindhoven The Netherlands www.tue.nl Author Eric Verbeek and Felix Mannhardt Date June 14, 2016 Version 1.2 DrFurby Classifier Process Discovery Contest
More informationDiscovering Petri Nets
Discovering Petri Nets It s a kind of magic Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology Department of Information and Technology P.O. Box 513, 5600 MB Eindhoven The Netherlands w.m.p.v.d.aalst@tm.tue.nl
More informationLearning Hybrid Process Models From Events
Learning Hybrid Process Models From Events Process Discovery Without Faking Confidence (Experimental Results) Wil M.P. van der Aalst 1,2 and Riccardo De Masellis 2 and Chiara Di Francescomarino 2 and Chiara
More informationPAGE 2
PAGE 1 PAGE 2 PAGE 3 PAGE 4 Vision PAGE 5 Desire Lines of Cow Paths? PAGE 6 www.olifantenpaadjes.nl PAGE 7 Desire Lines: Join Them or Fight Them (but never ignore them ) desire line expected or normative
More informationMarkings in Perpetual Free-Choice Nets Are Fully Characterized by Their Enabled Transitions
Markings in Perpetual Free-Choice Nets Are Fully Characterized by Their Enabled Transitions Wil M.P. van der Aalst Process and Data Science (PADS), RWTH Aachen University, Germany. wvdaalst@pads.rwth-aachen.de
More informationCausal Nets: A Modeling Language Tailored towards Process Discovery
Causal Nets: A Modeling Language Tailored towards Process Discovery Wil van der Aalst, Arya Adriansyah, and Boudewijn van Dongen Department of Mathematics and Computer Science, Technische Universiteit
More informationUsing Genetic Algorithms to Mine Process Models: Representation, Operators and Results
Using Genetic Algorithms to Mine Process Models: Representation, Operators and Results A.K. Alves de Medeiros, A.J.M.M. Weijters and W.M.P. van der Aalst Department of Technology Management, Eindhoven
More informationDiscovering Block-Structured Process Models From Event Logs - A Constructive Approach
Discovering Block-Structured Process Models From Event Logs - A Constructive Approach S.J.J. Leemans, D. Fahland, and W.M.P. van der Aalst Department of Mathematics and Computer Science, Eindhoven University
More informationFlexible Heuristics Miner (FHM)
Flexible Heuristics Miner (FHM) A.J.M.M. Weijters Eindhoven University of Technology Email: a.j.m.m.weijters@tue.nl J.T.S. Ribeiro Eindhoven University of Technology Email: j.t.s.ribeiro@tue.nl Abstract
More informationProcess Mining in Non-Stationary Environments
and Machine Learning. Bruges Belgium), 25-27 April 2012, i6doc.com publ., ISBN 978-2-87419-049-0. Process Mining in Non-Stationary Environments Phil Weber, Peter Tiňo and Behzad Bordbar School of Computer
More informationDISCOVERING BLOCK STRUCTURED PARALLEL PROCESS MODELS FROM CAUSALLY COMPLETE EVENT LOGS
Journal of ELECTRICAL ENGINEERING, VOL 67 (2016), NO2, 111 123 DISCOVERING BLOCK STRUCTURED PARALLEL PROCESS MODELS FROM CAUSALLY COMPLETE EVENT LOGS Julijana Lekić Dragan Milićev α-algorithm is suitable
More informationDecomposing Alignment-based Conformance Checking of Data-aware Process Models
Decomposing Alignment-based Conformance Checking of Data-aware Process Models Massimiliano de Leoni 1, Jorge Munoz-Gama 2, Josep Carmona 2, and Wil M.P. van der Aalst 1 1 Eindhoven University of Technology,
More informationGenetic Process Mining
Genetic Process Mining W.M.P. van der Aalst, A.K. Alves de Medeiros, and A.J.M.M. Weijters Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600 MB, Eindhoven, The
More informationBusiness Process Technology Master Seminar
Business Process Technology Master Seminar BPT Group Summer Semester 2008 Agenda 2 Official Information Seminar Timeline Tasks Outline Topics Sergey Smirnov 17 April 2008 Official Information 3 Title:
More informationThe Alignment of Formal, Structured and Unstructured Process Descriptions. Josep Carmona
The Alignment of Formal, Structured and Unstructured Process Descriptions Josep Carmona Thomas Chatain Luis delicado Farbod Taymouri Boudewijn van Dongen Han van der Aa Lluís Padró Josep Sànchez-Ferreres
More informationInterorganizational Workflow Nets: a Petri Net Based Approach for Modelling and Analyzing Interorganizational Workflows
Interorganizational Workflow Nets: a Petri Net Based Approach for Modelling and Analyzing Interorganizational Workflows Oana Prisecaru and Toader Jucan Faculty of Computer Science, Al. I. Cuza University,
More informationAssigning Ontology-Based Semantics to Process Models: The Case of Petri Nets
Assigning Ontology-Based Semantics to Process Models: The Case of Petri Nets Pnina Soffer 1, Maya Kaner 2, and Yair Wand 3 1 University of Haifa, Carmel Mountain 31905, Haifa, Israel 2 Ort Braude College,
More informationMining Process Models with Prime Invisible Tasks
Mining Process Models with Prime Invisible Tasks Lijie Wen 1,2, Jianmin Wang 1,4,5, Wil M.P. van der Aalst 3, Biqing Huang 2, and Jiaguang Sun 1,4,5 1 School of Software, Tsinghua University, Beijing,
More informationA Unified Approach for Measuring Precision and Generalization Based on Anti-Alignments
A Unified Approach for Measuring Precision and Generalization Based on Anti-Alignments B.F. van Dongen 1, J. Carmona 2, and T. Chatain 3 1 Eindhoven University of Technology, The Netherlands b.f.v.dongen@tue.nl
More informationGenetic Process Mining
Genetic Process Mining W.M.P. van der Aalst, A.K. Alves de Medeiros, and A.J.M.M. Weijters Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600 MB, Eindhoven, The
More informationMethods for the specification and verification of business processes MPB (6 cfu, 295AA)
Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Roberto Bruni http://www.di.unipi.it/~bruni 17 - Diagnosis for WF nets 1 Object We study suitable diagnosis techniques
More informationAnalysis and Optimization of Discrete Event Systems using Petri Nets
Volume 113 No. 11 2017, 1 10 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Analysis and Optimization of Discrete Event Systems using Petri Nets
More informationConformance Checking of Interacting Processes With Overlapping Instances
Conformance Checking of Interacting Processes With Overlapping Instances Dirk Fahland, Massimiliano de Leoni, Boudewijn F. van Dongen, and Wil M.P. van der Aalst Eindhoven University of Technology, The
More informationTime and Timed Petri Nets
Time and Timed Petri Nets Serge Haddad LSV ENS Cachan & CNRS & INRIA haddad@lsv.ens-cachan.fr DISC 11, June 9th 2011 1 Time and Petri Nets 2 Timed Models 3 Expressiveness 4 Analysis 1/36 Outline 1 Time
More informationImproved TBL algorithm for learning context-free grammar
Proceedings of the International Multiconference on ISSN 1896-7094 Computer Science and Information Technology, pp. 267 274 2007 PIPS Improved TBL algorithm for learning context-free grammar Marcin Jaworski
More informationThe State Explosion Problem
The State Explosion Problem Martin Kot August 16, 2003 1 Introduction One from main approaches to checking correctness of a concurrent system are state space methods. They are suitable for automatic analysis
More informationProcess Mining. Knut Hinkelmann. Prof. Dr. Knut Hinkelmann MSc Business Information Systems
Knut Hinkelmann Prof. r. Knut Hinkelmann MSc usiness Information Systems Learning Objective Topic: Learning Process knowledge from experience learning a process/decision model ase-ased Reasoning (R) reusing
More information1 Impact-Driven Process Model Repair
1 Impact-Driven Process Model Repair ARTEM POLYVYANYY, Queensland University of Technology, Brisbane, Australia WIL M.P. VAN DER AALST, Eindhoven University of Technology, Eindhoven, The Netherlands, and
More informationarxiv: v1 [cs.ds] 17 Mar 2017
arxiv:1703.06733v1 [cs.ds] 17 Mar 2017 Discovering Relaxed Sound Workflow Nets using Integer Linear Programming S.J. van Zelst, B.F. van Dongen, W.M.P. van der Aalst, and H.M.W. Verbeek Department of Mathematics
More informationAn Intuitive Formal Approach to Dynamic Workflow Modeling and Analysis
An Intuitive Formal Approach to Dynamic Workflow Modeling and Analysis Jiacun Wang, Daniela Rosca, William Tepfenhart, Allen Milewski, and Michael Stoute 2 Department of Software Engineering, Monmouth
More informationSOBER Cryptanalysis. Daniel Bleichenbacher and Sarvar Patel Bell Laboratories Lucent Technologies
SOBER Cryptanalysis Daniel Bleichenbacher and Sarvar Patel {bleichen,sarvar}@lucent.com Bell Laboratories Lucent Technologies Abstract. SOBER is a new stream cipher that has recently been developed by
More informationReducing Complexity of Large EPCs
Reducing Complexity of Large EPCs Artem Polyvyanyy, Sergey Smirnov, and Mathias Weske Business Process Technology Group Hasso Plattner Institute at the University of Potsdam D-14482 Potsdam, Germany (artem.polyvyanyy,sergey.smirnov,mathias.weske)@hpi.uni-potsdam.de
More informationProcess Mining for Ubiquitous Mobile Systems: An Overview and a Concrete Algorithm
Process Mining for Ubiquitous Mobile Systems: An Overview and a Concrete Algorithm A.K.A. de Medeiros, B.F. van Dongen, W.M.P. van der Aalst, and A.J.M.M. Weijters Department of Technology Management,
More informationChecking Behavioral Conformance of Artifacts
Checking Behavioral Conformance of Artifacts Dirk Fahland Massimiliano de Leoni Boudewijn F. van Dongen Wil M.P. van der Aalst, Eindhoven University of Technology, The Netherlands (d.fahland m.d.leoni
More informationarxiv: v1 [cs.db] 3 Nov 2017
Noname manuscript No. (will be inserted by the editor) Discovering More Precise Process Models from Event Logs by Filtering Out Chaotic Activities Niek Tax Natalia Sidorova Wil M. P. van der Aalst Received:
More informationTime(d) Petri Net. Serge Haddad. Petri Nets 2016, June 20th LSV ENS Cachan, Université Paris-Saclay & CNRS & INRIA
Time(d) Petri Net Serge Haddad LSV ENS Cachan, Université Paris-Saclay & CNRS & INRIA haddad@lsv.ens-cachan.fr Petri Nets 2016, June 20th 2016 1 Time and Petri Nets 2 Time Petri Net: Syntax and Semantic
More informationEncoding Process Discovery Problems in SMT
Software and Systems Modeling manuscript No. (will be inserted by the editor) Encoding Process Discovery Problems in SMT Marc Solé Josep Carmona Received: date / Accepted: date Abstract Information Systems,
More informationMethods for the specification and verification of business processes MPB (6 cfu, 295AA)
Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Roberto Bruni http://www.di.unipi.it/~bruni 20 - Workflow modules 1 Object We study Workflow modules to model interaction
More informationFinal Exam December 12, 2017
Introduction to Artificial Intelligence CSE 473, Autumn 2017 Dieter Fox Final Exam December 12, 2017 Directions This exam has 7 problems with 111 points shown in the table below, and you have 110 minutes
More informationFinal Exam December 12, 2017
Introduction to Artificial Intelligence CSE 473, Autumn 2017 Dieter Fox Final Exam December 12, 2017 Directions This exam has 7 problems with 111 points shown in the table below, and you have 110 minutes
More informationBayesian Methods in Artificial Intelligence
WDS'10 Proceedings of Contributed Papers, Part I, 25 30, 2010. ISBN 978-80-7378-139-2 MATFYZPRESS Bayesian Methods in Artificial Intelligence M. Kukačka Charles University, Faculty of Mathematics and Physics,
More informationCSL302/612 Artificial Intelligence End-Semester Exam 120 Minutes
CSL302/612 Artificial Intelligence End-Semester Exam 120 Minutes Name: Roll Number: Please read the following instructions carefully Ø Calculators are allowed. However, laptops or mobile phones are not
More informationSecurity as a Resource in Process-Aware Information Systems
Security as a Resource in Process-Aware Information Systems 14 October 2011 Joint Work with: Jason Crampton Information Security Group Royal Holloway Jim Huan-Pu Kuo Department of Computing Imperial College
More informationPROCESS mining [1] is a family of methods concerned
1 Complete and Interpretable Conformance Checking of Business Processes Luciano García-Bañuelos, Nick RTP van Beest, Marlon Dumas and Marcello La Rosa Abstract This article presents a method for checking
More informationSystems engineering. Organization of the course, background knowledge Systems analysis introduction L E C T U R E. Ing. Zuzana Bělinová, Ph.D.
L E C T U R E 1 Systems engineering Organization of the course, background knowledge Systems analysis introduction Ing., Ph.D. LECTURE 1 - OVERVIEW Organizational Issues Background knowledge - Systems
More informationCompositional Discovery of Workflow Nets from Event Logs Using Morphisms
Compositional Discovery of Workflow Nets from Event Logs Using Morphisms Luca Bernardinello 2, Irina Lomazova 1, Roman Nesterov 1,2, and Lucia Pomello 2 1 National Research University Higher School of
More informationProbabilistic Models
Bayes Nets 1 Probabilistic Models Models describe how (a portion of) the world works Models are always simplifications May not account for every variable May not account for all interactions between variables
More informationPROCESS DISCOVERY: A NEW METHOD FITTED TO BIG EVENT LOGS
PROCESS DISCOVERY: A NEW METHOD FITTED TO BIG EVENT LOGS 1 SOUHAIL BOUSHABA, 2 MOHAMMAD ISSAM KABBAJ, 3 FATIMA-ZAHRA BELOUADHA, 4 ZOHRA BAKKOURY, 1 Ph.D candidate, 2 Assistant Professor, 3 Habilitated
More informationarxiv: v1 [cs.ma] 11 Jun 2018
Compositional Discovery of Workflow Nets from Event Logs Using Morphisms Luca Bernardinello 2, Irina Lomazova 1, Roman Nesterov 1,2, and Lucia Pomello 2 arxiv:1806.04254v1 [cs.ma] 11 Jun 2018 1 National
More informationMethods for the specification and verification of business processes MPB (6 cfu, 295AA)
Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Roberto Bruni http://www.di.unipi.it/~bruni 20 - Workflow modules 1 Object We study Workflow modules to model interaction
More informationBayesian Networks: Construction, Inference, Learning and Causal Interpretation. Volker Tresp Summer 2016
Bayesian Networks: Construction, Inference, Learning and Causal Interpretation Volker Tresp Summer 2016 1 Introduction So far we were mostly concerned with supervised learning: we predicted one or several
More informationHeuristics for High-Utility Local Process Model Mining
Heuristics for High-Utility Local Process Model Mining Benjamin Dalmas 1, Niek Tax 2, and Sylvie Norre 1 1 Clermont-Auvergne University, LIMOS CNRS UMR 6158, Aubière, France {benjamin.dalmas,sylvie.norre}@isima.fr
More informationILP-Based Process Discovery Using Hybrid Regions
ILP-Based Process Discovery Using Hybrid Regions S.J. van Zelst, B.F. van Dongen, and W.M.P. van der Aalst Department of Mathematics and Computer Science Eindhoven University of Technology, The Netherlands
More informationBayesian Networks: Construction, Inference, Learning and Causal Interpretation. Volker Tresp Summer 2014
Bayesian Networks: Construction, Inference, Learning and Causal Interpretation Volker Tresp Summer 2014 1 Introduction So far we were mostly concerned with supervised learning: we predicted one or several
More informationStochastic Petri Net. Ben, Yue (Cindy) 2013/05/08
Stochastic Petri Net 2013/05/08 2 To study a formal model (personal view) Definition (and maybe history) Brief family tree: the branches and extensions Advantages and disadvantages for each Applications
More informationSample questions for COMP-424 final exam
Sample questions for COMP-44 final exam Doina Precup These are examples of questions from past exams. They are provided without solutions. However, Doina and the TAs would be happy to answer questions
More informationChapter 5 Process Discovery: An Introduction
Chapter 5 Process Discovery: An Introduction Process discovery is one of the most challenging process mining tasks. Based on an event log, a process model is constructed thus capturing the behavior seen
More informationDiscrete Event Systems Exam
Computer Engineering and Networks Laboratory TEC, NSG, DISCO HS 2016 Prof. L. Thiele, Prof. L. Vanbever, Prof. R. Wattenhofer Discrete Event Systems Exam Friday, 3 rd February 2017, 14:00 16:00. Do not
More informationA graph contains a set of nodes (vertices) connected by links (edges or arcs)
BOLTZMANN MACHINES Generative Models Graphical Models A graph contains a set of nodes (vertices) connected by links (edges or arcs) In a probabilistic graphical model, each node represents a random variable,
More informationTractable Inference in Hybrid Bayesian Networks with Deterministic Conditionals using Re-approximations
Tractable Inference in Hybrid Bayesian Networks with Deterministic Conditionals using Re-approximations Rafael Rumí, Antonio Salmerón Department of Statistics and Applied Mathematics University of Almería,
More informationBounded Approximation Algorithms
Bounded Approximation Algorithms Sometimes we can handle NP problems with polynomial time algorithms which are guaranteed to return a solution within some specific bound of the optimal solution within
More informationProcess Mining. prof.dr.ir. Wil van der Aalst
Process Mining Tutorial Computational Intelligence in HealthCare 20-24 September 2010, Eindhoven, the Netherlands prof.dr.ir. Wil van der Aalst www.processmining.org Focus of most modeling and analysis
More informationBusiness Process Management
Business Process Management Theory: The Pi-Calculus Frank Puhlmann Business Process Technology Group Hasso Plattner Institut Potsdam, Germany 1 What happens here? We discuss the application of a general
More informationAutomatic Partitions Extraction to Distribute the Runtime Verification of a Global Specification
Automatic Partitions Extraction to Distribute the Runtime Verification of a Global Specification Angelo Ferrando DIBRIS, University of Genova, Italy angelo.ferrando@dibris.unige.it Abstract. Trace expressions
More informationTRAITS to put you on the map
TRAITS to put you on the map Know what s where See the big picture Connect the dots Get it right Use where to say WOW Look around Spread the word Make it yours Finding your way Location is associated with
More informationADVANCED ROBOTICS. PLAN REPRESENTATION Generalized Stochastic Petri nets and Markov Decision Processes
ADVANCED ROBOTICS PLAN REPRESENTATION Generalized Stochastic Petri nets and Markov Decision Processes Pedro U. Lima Instituto Superior Técnico/Instituto de Sistemas e Robótica September 2009 Reviewed April
More informationTHROUGHPUT ANALYSIS OF MANUFACTURING CELLS USING TIMED PETRI NETS
c 1994 IEEE. Published in the Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, San Antonio, TX, October 2 5, 1994. Personal use of this material is permitted. However,
More informationA Hierarchical Markov Model to Understand the Behaviour of Agents in Business Processes
A Hierarchical Markov Model to Understand the Behaviour of Agents in Business Processes Diogo R. Ferreira 1, Fernando Szimanski 2, Célia Ghedini Ralha 2 1 IST Technical University of Lisbon, Portugal diogo.ferreira@ist.utl.pt
More informationPlanning Under Uncertainty II
Planning Under Uncertainty II Intelligent Robotics 2014/15 Bruno Lacerda Announcement No class next Monday - 17/11/2014 2 Previous Lecture Approach to cope with uncertainty on outcome of actions Markov
More information7. Queueing Systems. 8. Petri nets vs. State Automata
Petri Nets 1. Finite State Automata 2. Petri net notation and definition (no dynamics) 3. Introducing State: Petri net marking 4. Petri net dynamics 5. Capacity Constrained Petri nets 6. Petri net models
More informationCS 5522: Artificial Intelligence II
CS 5522: Artificial Intelligence II Bayes Nets Instructor: Alan Ritter Ohio State University [These slides were adapted from CS188 Intro to AI at UC Berkeley. All materials available at http://ai.berkeley.edu.]
More informationSemi-asynchronous. Fault Diagnosis of Discrete Event Systems ALEJANDRO WHITE DR. ALI KARIMODDINI OCTOBER
Semi-asynchronous Fault Diagnosis of Discrete Event Systems ALEJANDRO WHITE DR. ALI KARIMODDINI OCTOBER 2017 NC A&T State University http://www.ncat.edu/ Alejandro White Semi-asynchronous http://techlav.ncat.edu/
More informationProcess Mining: A Two-Step Approach to Balance Between Underfitting and Overfitting
Process Mining: Two-Step pproach to alance etween Underfitting and Overfitting W.M.P. van der alst 1, V. Rubin 2,1, H.M.W. Verbeek 1,.F. van ongen 1,. Kindler 3, and.w. Günther 1 1 indhoven University
More informationComparison of Shannon, Renyi and Tsallis Entropy used in Decision Trees
Comparison of Shannon, Renyi and Tsallis Entropy used in Decision Trees Tomasz Maszczyk and W lodzis law Duch Department of Informatics, Nicolaus Copernicus University Grudzi adzka 5, 87-100 Toruń, Poland
More informationDistributed Genetic Algorithm for feature selection in Gaia RVS spectra. Application to ANN parameterization
Distributed Genetic Algorithm for feature selection in Gaia RVS spectra. Application to ANN parameterization Diego Fustes, Diego Ordóñez, Carlos Dafonte, Minia Manteiga and Bernardino Arcay Abstract This
More informationChapter 6 Process Discovery: An Introduction
Chapter 6 Process Discovery: An Introduction Process discovery is one of the most challenging process mining tasks. Based on an event log a process model is constructed thus capturing the behavior seen
More informationIntelligent Systems Statistical Machine Learning
Intelligent Systems Statistical Machine Learning Carsten Rother, Dmitrij Schlesinger WS2014/2015, Our tasks (recap) The model: two variables are usually present: - the first one is typically discrete k
More informationExtending Process Logs with Events from Supplementary Sources. Felix Mannhardt Massimiliano de Leoni, Hajo A.
Extending Process Logs with Events from Supplementary Sources Felix Mannhardt (@fmannhardt), Massimiliano de Leoni, Hajo A. Reijers Heterogeneous Information Systems Systems Databases Join Event Logs?
More informationCS 188: Artificial Intelligence Fall 2009
CS 188: Artificial Intelligence Fall 2009 Lecture 14: Bayes Nets 10/13/2009 Dan Klein UC Berkeley Announcements Assignments P3 due yesterday W2 due Thursday W1 returned in front (after lecture) Midterm
More informationComputer Simulation and Applications in Life Sciences. Dr. Michael Emmerich & Dr. Andre Deutz LIACS
Computer Simulation and Applications in Life Sciences Dr. Michael Emmerich & Dr. Andre Deutz LIACS Part 0: Course Preliminaries Course Preliminaries The course consists of 13 lectures + exercises Exercises
More informationAligning Event Logs and Process Models for Multi-Perspective Conformance Checking: An Approach Based on Integer Linear Programming
Aligning Event Logs and Process Models for Multi-Perspective Conformance Checking: An Approach Based on Integer Linear Programming Massimiliano de Leoni and Wil M. P. van der Aalst Eindhoven University
More informationDistributed systems Lecture 4: Clock synchronisation; logical clocks. Dr Robert N. M. Watson
Distributed systems Lecture 4: Clock synchronisation; logical clocks Dr Robert N. M. Watson 1 Last time Started to look at time in distributed systems Coordinating actions between processes Physical clocks
More informationData Warehousing & Data Mining
13. Meta-Algorithms for Classification Data Warehousing & Data Mining Wolf-Tilo Balke Silviu Homoceanu Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 13.
More informationSoundness of Workflow Nets with an Unbounded Resource is Decidable
Soundness of Workflow Nets with an Unbounded Resource is Decidable Vladimir A. Bashkin 1 and Irina A. Lomazova 2,3 1 Yaroslavl State University, Yaroslavl, 150000, Russia v_bashkin@mail.ru 2 National Research
More informationUsing first-order logic, formalize the following knowledge:
Probabilistic Artificial Intelligence Final Exam Feb 2, 2016 Time limit: 120 minutes Number of pages: 19 Total points: 100 You can use the back of the pages if you run out of space. Collaboration on the
More informationCS 343: Artificial Intelligence
CS 343: Artificial Intelligence Bayes Nets Prof. Scott Niekum The University of Texas at Austin [These slides based on those of Dan Klein and Pieter Abbeel for CS188 Intro to AI at UC Berkeley. All CS188
More informationDistributed Deadlock-Avoidance. IMDEA Software Institute, Spain
Distributed Deadlock-voidance César Sánchez IMDE Software Institute, Spain DRV Workshop, ertinoro 19-May, 216 Distributed Deadlock-voidance little story about how static knowledge can help solve unsolvable
More informationName: UW CSE 473 Final Exam, Fall 2014
P1 P6 Instructions Please answer clearly and succinctly. If an explanation is requested, think carefully before writing. Points may be removed for rambling answers. If a question is unclear or ambiguous,
More informationBasic Statistics for Astrologers
Page 1 of 5 Basic Statistics for Astrologers Written by Sergey Tarassov The statistics is the most tricky science I have ever dealt with. A decent person from the street who is not a statistician might
More informationRobust process mining with guarantees
Robust process mining with guarantees Leemans, S.J.J. Published: 09/05/2017 Document Version Publisher s PDF, also known as Version of Record (includes final page, issue and volume numbers) Please check
More informationReliability of Technical Systems. Advanced Methods for Systems Modelling and Simulation I : Petri Nets
Reliability of Technical Systems Advanced Methods for Systems Modelling and Simulation I : Petri Nets Petri Nets - Overview Introduction Basic elements and rules Notation Extensions/Tools Applications
More informationWhat happens to the value of the expression x + y every time we execute this loop? while x>0 do ( y := y+z ; x := x:= x z )
Starter Questions Feel free to discuss these with your neighbour: Consider two states s 1 and s 2 such that s 1, x := x + 1 s 2 If predicate P (x = y + 1) is true for s 2 then what does that tell us about
More information