Distributed Process Discovery and Conformance Checking
|
|
- Robert Fowler
- 5 years ago
- Views:
Transcription
1 Distributed Process Discovery and Conformance Checking prof.dr.ir. Wil van der Aalst
2 On the different roles of (process) models PAGE 1
3 Play-Out PAGE 2
4 Play-Out (Classical use of models) A BCD A E D A E D A C B D A B C D A E D A C B D A C B D PAGE 3
5 Play-In PAGE 4
6 Play-In A B C D A E D A E D A C B D A B C D A E D A C B D A C B D PAGE 5
7 Example Process Discovery (Vestia, Dutch housing agency, 208 cases, 5987 events) PAGE 6
8 Example Process Discovery (ASML, test process lithography systems, events) PAGE 7
9 Example Process Discovery (AMC, 627 gynecological oncology patients, events) PAGE 8
10 Replay PAGE 9
11 Replay A BCD PAGE 10
12 Replay A ED PAGE 11
13 Replay can detect problems ACD Problem! token left behind Problem! missing token PAGE 12
14 Conformance Checking (WOZ objections Dutch municipality, 745 objections, 9583 event, f= 0.988) PAGE 13
15 Replay can extract timing information A 5 B 8 C 9 D PAGE 14
16 Performance Analysis Using Replay (WOZ objections Dutch municipality, 745 objections, 9583 event, f= 0.988) PAGE 15
17 Big Data PAGE 16
18 Big Data All of the world's music can be stored on a $600 disk drive. Enterprises globally stored more than 7 exabytes of new data on disk drives in 2010, while consumers stored more than 6 exabytes of new data on devices such as PCs and notebooks. Source: Big Data: The Next Frontier for Innovation, Competition, and Productivity McKinsey Global Institute, Indeed, we are generating so much data today that it is physically impossible to store it all. Health care providers, for instance, discard 90 percent of the data that they generate. PAGE 17
19 Hilbert and Lopez. The World's Technological Capacity to Store, Communicate, and Compute Information. Science, 332(6025):60-65, PAGE 18
20 PAGE 19
21 PAGE 20
22 PAGE 21
23 Evidence-Based Computer Science PAGE 22
24 How good is my model? PAGE 23
25 Four Competing Quality Criteria able to replay event log Occam s razor not overfitting the log not underfitting the log PAGE 24
26 Example: one log four models start a register b examine thoroughly c examine casually d check ticket e decide f reinitiate g pay compensation h reject N 1 : fitness = +, precision = +, generalization = +, simplicity = + end # trace 455 acdeh 191 abdeg 177 adceh 144 abdeh able to replay event log fitness process discovery Occam s razor simplicity start start a register c examine casually examine thoroughly b d check ticket d check ticket decide pay compensation reject N 2 : fitness = -, precision = +, generalization = -, simplicity = + a register examine casually c reinitiate decide e f h reject N 3 : fitness = +, precision = -, generalization = +, simplicity = + e g h end end 111 acdeg 82 adceg 56 adbeh 47 acdefdbeh 38 adbeg 33 acdefbdeh 14 acdefbdeg 11 acdefdbeg 9 adcefcdeh 8 adcefdbeh generalization not overfitting the log precision not underfitting the log start a register a register a register a register d check ticket c examine casually d check ticket c examine casually c examine casually d check ticket c examine casually d check ticket e decide e decide e decide e decide g pay compensation g pay compensation h reject h reject end 5 adcefbdeg 3 acdefbdefdbeg 2 adcefdbeg 2 adcefbdefbdeg 1 adcefdbefbdeh 1 adbefbdefdbeg 1 adcefdbefcdefdbeg 1391 (all 21 variants seen in the log) a b d register examine thoroughly check ticket e decide g pay compensation a register d check ticket b examine thoroughly e decide h reject a register b examine thoroughly d check ticket decide reject N 4 : fitness = +, precision = +, generalization = -, simplicity = - e h PAGE 25
27 Model N 1 PAGE 26 acdeh abdeg adceh abdeh acdeg adceg adbeh acdefdbeh adbeg acdefbdeh acdefbdeg acdefdbeg adcefcdeh adcefdbeh adcefbdeg acdefbdefdbeg adcefdbeg adcefbdefbdeg adcefdbefbdeh adbefbdefdbeg adcefdbefcdefdbeg # trace 1391
28 Model N 2 PAGE 27 acdeh abdeg adceh abdeh acdeg adceg adbeh acdefdbeh adbeg acdefbdeh acdefbdeg acdefdbeg adcefcdeh adcefdbeh adcefbdeg acdefbdefdbeg adcefdbeg adcefbdefbdeg adcefdbefbdeh adbefbdefdbeg adcefdbefcdefdbeg # trace 1391
29 Model N 3 PAGE 28 acdeh abdeg adceh abdeh acdeg adceg adbeh acdefdbeh adbeg acdefbdeh acdefbdeg acdefdbeg adcefcdeh adcefdbeh adcefbdeg acdefbdefdbeg adcefdbeg adcefbdefbdeg adcefdbefbdeh adbefbdefdbeg adcefdbefcdefdbeg # trace 1391
30 # trace Model N acdeh abdeg adceh 144 abdeh a register d check ticket c examine casually e decide g pay compensation acdeg adceg a register c examine casually d check ticket e decide g pay compensation adbeh acdefdbeh a d c e h 38 adbeg register check ticket examine casually decide reject 33 acdefbdeh start a register c examine casually d check ticket e decide h reject end acdefbdeg acdefdbeg 9 adcefcdeh (all 21 variants seen in the log) 8 adcefdbeh a b d register a register a register examine thoroughly d check ticket b examine thoroughly check ticket b examine thoroughly d check ticket decide decide reject N 4 : fitness = +, precision = +, generalization = -, simplicity = - e decide e e g pay compensation h reject h adcefbdeg acdefbdefdbeg adcefdbeg adcefbdefbdeg adcefdbefbdeh adbefbdefdbeg adcefdbefcdefdbeg PAGE 29
31 Process Discovery PAGE 30
32 Process Discovery (small selection) automata-based learning heuristic mining distributed genetic mining language-based regions genetic mining stochastic task graphs state-based regions LTL mining neural networks fuzzy mining mining block structures hidden Markov models α algorithm α# algorithm conformal process graph multi-phase mining partial-order based mining α++ algorithm ILP mining PAGE 31
33 Petri net view: Just discover the places Adding a place limits behavior: overfitting adding too many places underfitting adding too few places PAGE 32
34 Example: Process Discovery Using State-Based Regions a b [ a,b] e [a,e] d [a,d,e] [ ] [a] c b c d [a,c] [a,b,c] [a,b,c,d] b a p1 e p3 d start end p2 c p4 PAGE 33
35 Example of Region a b [ a,b] e [a,e] d [a,d,e] [ ] [a] c b c d [a,c] [a,b,c] [a,b,c,d] enter: b,e leave: d do-not-cross: a,c b a p1 e p3 d start end p2 c p4 PAGE 34
36 Example: Process Discovery Using Language-Based Regions A place is feasible if it can be added without disabling any of the traces in the event log. R PAGE 35
37 Conformance Checking PAGE 36
38 Replaying trace abeg abeg r=1 m= = PAGE 37
39 # trace Can be lifted to log level acdeh abdeg adceh N 1 b 144 abdeh start a register p1 p2 examine thoroughly c examine casually d check ticket p3 p4 e decide f p5 reinitiate g pay compensation h reject end acdeg adceg adbeh acdefdbeh adbeg acdefbdeh 14 acdefbdeg 11 acdefdbeg 9 adcefcdeh 8 adcefdbeh 5 adcefbdeg 3 acdefbdefdbeg 2 adcefdbeg 2 adcefbdefbdeg 1 adcefdbefbdeh 1 adbefbdefdbeg 1 adcefdbefcdefdbeg 1391 PAGE 38
40 From playing the token game to optimal alignments observed trace: abeg a b» e g a b d e g move in model only PAGE 39
41 Another alignment observed trace: abcdeg a b c d e g a b» d e g move in log only PAGE 40
42 Moves in an alignment move in log trace in event log a b» d e g a» c d e g possible run of model move in model move in both Optimal alignment describes modeled behavior closest to observed behavior PAGE 41
43 Moves have costs a»» a a a Standard cost function: c(x,») = 1 c(»,y) = 1 c(x,y) = 0, if x=y c(x,y) =, if x y PAGE a b 42
44 Non-fitting trace: abefdeg abefdeg a b» e f d» e g a b d e f d b e g 2 a b e f d e g a b»» d e g 2 PAGE 43
45 Any cost structure is possible send-letter(john,2 weeks, $400) send- (sue,3 weeks,$500) Similar activities (more similarity implies lower costs). Resource conformance (done by someone that does not have the specified role). Data conformance (path is not possible for this customer). Time conformance (missed the legal deadline) PAGE 44
46 Fitness 1.0 start a register b examine thoroughly c examine casually d check ticket e decide f reinitiate g pay compensation h reject N 1 : fitness = +, precision = +, generalization = +, simplicity = + end # trace 455 acdeh 191 abdeg 177 adceh 144 abdeh Our A* algorithm exploits the Petri net marking equation and uses other tricks to prune the search space start start start a register c examine casually examine thoroughly b d check ticket d check ticket decide pay compensation reject N 2 : fitness = -, precision = +, generalization = -, simplicity = + a register examine casually c reinitiate decide e f h reject N 3 : fitness = +, precision = -, generalization = +, simplicity = + a register a register a register a register d check ticket c examine casually d check ticket c examine casually c examine casually d check ticket c examine casually d check ticket e e decide e decide e decide e decide g h g g h reject h reject end end pay compensation pay compensation end 111 acdeg 82 adceg 56 adbeh 47 acdefdbeh 38 adbeg 33 acdefbdeh 14 acdefbdeg 11 acdefdbeg 9 adcefcdeh 8 adcefdbeh 5 adcefbdeg 3 acdefbdefdbeg 2 adcefdbeg 2 adcefbdefbdeg 1 adcefdbefbdeh 1 adbefbdefdbeg 1 adcefdbefcdefdbeg 1391 (all 21 variants seen in the log) Aligned event log is starting point for other types of analysis. a b d register a register a register examine thoroughly d check ticket b examine thoroughly check ticket b examine thoroughly d check ticket decide decide decide reject N 4 : fitness = +, precision = +, generalization = -, simplicity = - e e e g pay compensation h reject h PAGE 45
47 Distributing/Decomposing Big Data Process Mining Problems PAGE 46
48 PAGE 47
49 What if? there are more than events? there are more than 1000 different activities? acefgijkl acddefhkjil abdefjkgil acdddefkhijl acefgijkl abefgjikl... process discovery b skip extra insurance conformance checking d change booking c4 c5 add extra insurance skip extra insurance g h i c8 c9 a c select car in book car c1 add extra insurance c2 e confirm c3 f initiate check-in c6 j check driver s license c10 l supply car out there are more than cases? c7 k charge credit card c11 PAGE 48
50 Distributed computing multicore CPU manycore GPU cluster computing grid computing cloud computing PAGE 49
51 How to distribute process discovery? PAGE 50
52 How to distribute conformance checking? abcdeg adcefbcfdeg abdceg abcdefbcdeg abdfcefdceg acdefbdceg abcdeg abdceg abdcefbdcefbdceg abcdeg abcdefbcdefbdceg abcdefbdceg acdefg adcfeg abdcefcdfeg abcdeg in a c1 b c2 c3 f c d c4 c5 e c6 g out abcdeg abdceg abcdefbcdeg abcdeg abdceg abdcefbdcefbdceg abcdeg abcdefbcdefbdceg abcdefbdceg abcdeg f occurs too often f c a b c2 c4 e g in c1 d c6 out adcefbcfdeg abdfcefdceg acdefbdceg acdefg adcfeg abdcefcdfeg b is often skipped c3 c5 PAGE 51
53 Classification based on partitioning of event log: vertical and horizontal sets of cases sets of activities PAGE 52
54 Replication: Same event log on all computing nodes Only makes sense if random elements, e.g., genetic process mining. PAGE 53
55 Vertical distribution I: Split cases arbitrarily sets of cases abcdeg abdcefbcdeg abdceg abcdefbcdeg abdcefbdceg abcdefbdceg abcdeg abdceg abdcefbdcefbdceg abcdeg abcdefbcdefbdceg abcdefbdceg abcdeg abdceg abdcefbcdeg abcdeg abcdeg abdcefbcdeg abdceg abcdefbcdeg abdcefbdceg abcdefbdceg abcdeg abdceg abdcefbdcefbdceg abcdeg abcdefbcdefbdceg abcdefbdceg abcdeg abdceg abdcefbcdeg abcdeg PAGE 54
56 Vertical distribution II: Split cases based on a specific feature abcdeg abdcefbcdeg abdceg abcdefbcdeg abdcefbdceg abcdefbdceg abcdeg abdceg abdcefbdcefbdceg abcdeg abcdefbcdefbdceg abcdefbdceg abcdeg abdceg abdcefbcdeg abcdeg abcdeg abdceg abcdeg abdceg abcdeg abcdeg abdceg abcdeg abdcefbcdeg abcdefbcdeg abdcefbdceg abcdefbdceg abcdefbdceg abdcefbcdeg abdcefbdcefbdceg abcdefbcdefbdceg PAGE 55
57 Horizontal distribution sets of activities PAGE 56
58 Horizontal distribution: The key idea projected on a,b,e,f,g projected on b,c,d,e PAGE 57
59 Passages for Horizontal Distribution PAGE 58
60 Passages PAGE 59
61 Passage P=(X,Y) causal dependency: may trigger or enable PAGE 60
62 Minimal passages a passage is minimal if it does not contain smaller passages PAGE 61
63 Passages define an equivalence relation on the edges in the graph PAGE 62
64 Minimal passage 1: ({a},{b,c}) PAGE 63
65 Minimal passage 2: ({b,c,d},{d,e,f}) PAGE 64
66 Minimal passage 3: ({e},{g}) PAGE 65
67 Minimal passage 4: ({f},{h}) PAGE 66
68 Minimal passage 5: ({g,h},{i}) PAGE 67
69 So What? Any process model can be partitioned in minimal passages. Discovery and conformance checking can be done per passage! i a b d e f g h i clouds may contain arbitrary subprocesses not k n explicitly recorded in the event log (invisible activities o or small networks used for routing, e.g. XOR/AND/ORsplit/joins) l p o c j m PAGE 68
70 Example result for Petri nets The event log fits all passages if and only if the event log fits the whole model. i a b c d e f g h i j k l m n o p o Key insight: interface transitions controlled by event log PAGE 69
71 Discovery example a g in out f f b e a g c c causal b structure obtained e using heuristics d & domain d knowledge f c a b c2 c4 e g in c1 d c6 out c3 c5 PAGE 70
72 Conformance checking acefl acddefl abdefl acdddefl acefl abefl... b skip extra insurance d change booking c4 c5 add extra insurance skip extra insurance g h i c8 c9 a c select car in book car c1 add extra insurance c2 e confirm c3 f initiate check-in c6 j check driver s license c10 l supply car out c7 k charge credit card c11 PAGE 71
73 Create Skeleton PAGE 72
74 Net fragments per passage PAGE 73
75 Initial implementation in ProM PAGE 74
76 Super linear speedups possible (even when using a single computer decomposition helps) PAGE 75
77 Conclusion PAGE 76
78 Conclusion a d f h k n o i b e g i l p o c j m Big Data PAGE 77
79 PAGE 78
Process Mining Enabling Data-Driven Process Discovery and Analysis Using ProM
Process ining Enabling Data-Driven Process Discovery and Analysis Using Pro Keynote SIPDA 2011 Campione d Italia, June 29, 2011 prof.dr.ir. Wil van der Aalst www.processmining.org Baarle-Nassau (NL) /Baarle-Hertog
More informationMine Your Own Business
33 Mine Your Own Business Using process mining to turn big data into better processes and systems prof.dr.ir. Wil van der Aalst PAGE 0 Season 1, Episode 4 (1969) PAGE 1 "Mine Your Own Business" (2006)
More informationProcess Discovery and Conformance Checking Using Passages
Fundamenta Informaticae XX (2012) 1 35 1 DOI 10.3233/FI-2012-0000 IOS Press Process Discovery and Conformance Checking Using Passages W.M.P. van der Aalst Department of Mathematics and Computer Science,
More informationChapter 8 Mining Additional Perspectives
Chapter 8 Mining Additional Perspectives prof.dr.ir. Wil van der Aalst www.processmining.org Overview Chapter 1 Introduction Part I: Preliminaries Chapter 2 Process Modeling and Analysis Chapter 3 Data
More informationPAGE 2
PAGE 1 PAGE 2 PAGE 3 PAGE 4 Vision PAGE 5 Desire Lines of Cow Paths? PAGE 6 www.olifantenpaadjes.nl PAGE 7 Desire Lines: Join Them or Fight Them (but never ignore them ) desire line expected or normative
More informationAn Experimental Evaluation of Passage-Based Process Discovery
An Experimental Evaluation of Passage-Based Process Discovery H.M.W. Verbeek and W.M.P. van der Aalst Technische Universiteit Eindhoven Department of Mathematics and Computer Science P.O. Box 513, 5600
More informationDiscovering Petri Nets
Discovering Petri Nets It s a kind of magic Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology Department of Information and Technology P.O. Box 513, 5600 MB Eindhoven The Netherlands w.m.p.v.d.aalst@tm.tue.nl
More informationPROCESS DISCOVERY: A NEW METHOD FITTED TO BIG EVENT LOGS
PROCESS DISCOVERY: A NEW METHOD FITTED TO BIG EVENT LOGS 1 SOUHAIL BOUSHABA, 2 MOHAMMAD ISSAM KABBAJ, 3 FATIMA-ZAHRA BELOUADHA, 4 ZOHRA BAKKOURY, 1 Ph.D candidate, 2 Assistant Professor, 3 Habilitated
More informationarxiv: v1 [cs.ds] 17 Mar 2017
arxiv:1703.06733v1 [cs.ds] 17 Mar 2017 Discovering Relaxed Sound Workflow Nets using Integer Linear Programming S.J. van Zelst, B.F. van Dongen, W.M.P. van der Aalst, and H.M.W. Verbeek Department of Mathematics
More informationChapter 6 Process Discovery: An Introduction
Chapter 6 Process Discovery: An Introduction Process discovery is one of the most challenging process mining tasks. Based on an event log a process model is constructed thus capturing the behavior seen
More informationChapter 5 Process Discovery: An Introduction
Chapter 5 Process Discovery: An Introduction Process discovery is one of the most challenging process mining tasks. Based on an event log, a process model is constructed thus capturing the behavior seen
More informationProcess Mining in the Large: A Tutorial
Process Mining in the Large: A Tutorial Wil M.P. van der Aalst Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, The Netherlands; Business Process Management
More informationBusiness Process Technology Master Seminar
Business Process Technology Master Seminar BPT Group Summer Semester 2008 Agenda 2 Official Information Seminar Timeline Tasks Outline Topics Sergey Smirnov 17 April 2008 Official Information 3 Title:
More informationarxiv: v1 [cs.db] 3 Nov 2017
Noname manuscript No. (will be inserted by the editor) Discovering More Precise Process Models from Event Logs by Filtering Out Chaotic Activities Niek Tax Natalia Sidorova Wil M. P. van der Aalst Received:
More informationLearning Hybrid Process Models From Events
Learning Hybrid Process Models From Events Process Discovery Without Faking Confidence (Experimental Results) Wil M.P. van der Aalst 1,2 and Riccardo De Masellis 2 and Chiara Di Francescomarino 2 and Chiara
More informationMarkings in Perpetual Free-Choice Nets Are Fully Characterized by Their Enabled Transitions
Markings in Perpetual Free-Choice Nets Are Fully Characterized by Their Enabled Transitions Wil M.P. van der Aalst Process and Data Science (PADS), RWTH Aachen University, Germany. wvdaalst@pads.rwth-aachen.de
More informationAutomatic Root Cause Identification Using Most Probable Alignments
Automatic Root Cause Identification Using Most Probable Alignments Marie Koorneef, Andreas Solti 2, Henrik Leopold, Hajo A. Reijers,3 Department of Computer Sciences, Vrije Universiteit Amsterdam, The
More informationCausal Nets: A Modeling Language Tailored towards Process Discovery
Causal Nets: A Modeling Language Tailored towards Process Discovery Wil van der Aalst, Arya Adriansyah, and Boudewijn van Dongen Department of Mathematics and Computer Science, Technische Universiteit
More informationDrFurby Classifier. Process Discovery BPM Where innovation starts
Den Dolech 2, 5612 AZ Eindhoven P.O. Box 513, 5600 MB Eindhoven The Netherlands www.tue.nl Author Eric Verbeek and Felix Mannhardt Date June 14, 2016 Version 1.2 DrFurby Classifier Process Discovery Contest
More informationDATA MINING LECTURE 9. Minimum Description Length Information Theory Co-Clustering
DATA MINING LECTURE 9 Minimum Description Length Information Theory Co-Clustering MINIMUM DESCRIPTION LENGTH Occam s razor Most data mining tasks can be described as creating a model for the data E.g.,
More informationCSE 417T: Introduction to Machine Learning. Final Review. Henry Chai 12/4/18
CSE 417T: Introduction to Machine Learning Final Review Henry Chai 12/4/18 Overfitting Overfitting is fitting the training data more than is warranted Fitting noise rather than signal 2 Estimating! "#$
More informationFlexible Heuristics Miner (FHM)
Flexible Heuristics Miner (FHM) A.J.M.M. Weijters Eindhoven University of Technology Email: a.j.m.m.weijters@tue.nl J.T.S. Ribeiro Eindhoven University of Technology Email: j.t.s.ribeiro@tue.nl Abstract
More informationThe Alignment of Formal, Structured and Unstructured Process Descriptions. Josep Carmona
The Alignment of Formal, Structured and Unstructured Process Descriptions Josep Carmona Thomas Chatain Luis delicado Farbod Taymouri Boudewijn van Dongen Han van der Aa Lluís Padró Josep Sànchez-Ferreres
More informationMining Process Models with Prime Invisible Tasks
Mining Process Models with Prime Invisible Tasks Lijie Wen 1,2, Jianmin Wang 1,4,5, Wil M.P. van der Aalst 3, Biqing Huang 2, and Jiaguang Sun 1,4,5 1 School of Software, Tsinghua University, Beijing,
More informationAssociation Rules. Fundamentals
Politecnico di Torino Politecnico di Torino 1 Association rules Objective extraction of frequent correlations or pattern from a transactional database Tickets at a supermarket counter Association rule
More informationCover Page. The handle holds various files of this Leiden University dissertation
Cover Page The handle http://hdl.handle.net/1887/39637 holds various files of this Leiden University dissertation Author: Smit, Laurens Title: Steady-state analysis of large scale systems : the successive
More informationD B M G Data Base and Data Mining Group of Politecnico di Torino
Data Base and Data Mining Group of Politecnico di Torino Politecnico di Torino Association rules Objective extraction of frequent correlations or pattern from a transactional database Tickets at a supermarket
More informationD B M G. Association Rules. Fundamentals. Fundamentals. Elena Baralis, Silvia Chiusano. Politecnico di Torino 1. Definitions.
Definitions Data Base and Data Mining Group of Politecnico di Torino Politecnico di Torino Itemset is a set including one or more items Example: {Beer, Diapers} k-itemset is an itemset that contains k
More informationD B M G. Association Rules. Fundamentals. Fundamentals. Association rules. Association rule mining. Definitions. Rule quality metrics: example
Association rules Data Base and Data Mining Group of Politecnico di Torino Politecnico di Torino Objective extraction of frequent correlations or pattern from a transactional database Tickets at a supermarket
More informationCSC 411 Lecture 3: Decision Trees
CSC 411 Lecture 3: Decision Trees Roger Grosse, Amir-massoud Farahmand, and Juan Carrasquilla University of Toronto UofT CSC 411: 03-Decision Trees 1 / 33 Today Decision Trees Simple but powerful learning
More informationDEEP LEARNING AND NEURAL NETWORKS: BACKGROUND AND HISTORY
DEEP LEARNING AND NEURAL NETWORKS: BACKGROUND AND HISTORY 1 On-line Resources http://neuralnetworksanddeeplearning.com/index.html Online book by Michael Nielsen http://matlabtricks.com/post-5/3x3-convolution-kernelswith-online-demo
More informationPROCESS mining [1] is a family of methods concerned
1 Complete and Interpretable Conformance Checking of Business Processes Luciano García-Bañuelos, Nick RTP van Beest, Marlon Dumas and Marcello La Rosa Abstract This article presents a method for checking
More informationDecomposing Conformance Checking on Petri Nets with Data
Decomposing Conformance Checking on Petri Nets with Data Massimiliano de Leoni 1,2, Jorge Munoz-Gama 3, Josep Carmona 3, and Wil M.P. van der Aalst 2 1 University of Padua, Padua (Italy) 2 Eindhoven University
More informationFinal Exam December 12, 2017
Introduction to Artificial Intelligence CSE 473, Autumn 2017 Dieter Fox Final Exam December 12, 2017 Directions This exam has 7 problems with 111 points shown in the table below, and you have 110 minutes
More informationDeep learning / Ian Goodfellow, Yoshua Bengio and Aaron Courville. - Cambridge, MA ; London, Spis treści
Deep learning / Ian Goodfellow, Yoshua Bengio and Aaron Courville. - Cambridge, MA ; London, 2017 Spis treści Website Acknowledgments Notation xiii xv xix 1 Introduction 1 1.1 Who Should Read This Book?
More informationDISCOVERING BLOCK STRUCTURED PARALLEL PROCESS MODELS FROM CAUSALLY COMPLETE EVENT LOGS
Journal of ELECTRICAL ENGINEERING, VOL 67 (2016), NO2, 111 123 DISCOVERING BLOCK STRUCTURED PARALLEL PROCESS MODELS FROM CAUSALLY COMPLETE EVENT LOGS Julijana Lekić Dragan Milićev α-algorithm is suitable
More informationFinal Examination CS 540-2: Introduction to Artificial Intelligence
Final Examination CS 540-2: Introduction to Artificial Intelligence May 7, 2017 LAST NAME: SOLUTIONS FIRST NAME: Problem Score Max Score 1 14 2 10 3 6 4 10 5 11 6 9 7 8 9 10 8 12 12 8 Total 100 1 of 11
More informationFinal Exam December 12, 2017
Introduction to Artificial Intelligence CSE 473, Autumn 2017 Dieter Fox Final Exam December 12, 2017 Directions This exam has 7 problems with 111 points shown in the table below, and you have 110 minutes
More informationData Mining Part 5. Prediction
Data Mining Part 5. Prediction 5.5. Spring 2010 Instructor: Dr. Masoud Yaghini Outline How the Brain Works Artificial Neural Networks Simple Computing Elements Feed-Forward Networks Perceptrons (Single-layer,
More informationFrequent Itemsets and Association Rule Mining. Vinay Setty Slides credit:
Frequent Itemsets and Association Rule Mining Vinay Setty vinay.j.setty@uis.no Slides credit: http://www.mmds.org/ Association Rule Discovery Supermarket shelf management Market-basket model: Goal: Identify
More informationExercises NP-completeness
Exercises NP-completeness Exercise 1 Knapsack problem Consider the Knapsack problem. We have n items, each with weight a j (j = 1,..., n) and value c j (j = 1,..., n) and an integer B. All a j and c j
More informationProxel-Based Simulation of Stochastic Petri Nets Containing Immediate Transitions
Electronic Notes in Theoretical Computer Science Vol. 85 No. 4 (2003) URL: http://www.elsevier.nl/locate/entsc/volume85.html Proxel-Based Simulation of Stochastic Petri Nets Containing Immediate Transitions
More informationDATA MINING LECTURE 3. Frequent Itemsets Association Rules
DATA MINING LECTURE 3 Frequent Itemsets Association Rules This is how it all started Rakesh Agrawal, Tomasz Imielinski, Arun N. Swami: Mining Association Rules between Sets of Items in Large Databases.
More informationFuzzy Systems. Introduction
Fuzzy Systems Introduction Prof. Dr. Rudolf Kruse Christian Moewes {kruse,cmoewes}@iws.cs.uni-magdeburg.de Otto-von-Guericke University of Magdeburg Faculty of Computer Science Department of Knowledge
More informationLecture Notes for Chapter 6. Introduction to Data Mining
Data Mining Association Analysis: Basic Concepts and Algorithms Lecture Notes for Chapter 6 Introduction to Data Mining by Tan, Steinbach, Kumar Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004
More informationChecking Behavioral Conformance of Artifacts
Checking Behavioral Conformance of Artifacts Dirk Fahland Massimiliano de Leoni Boudewijn F. van Dongen Wil M.P. van der Aalst, Eindhoven University of Technology, The Netherlands (d.fahland m.d.leoni
More informationProcess Mining. prof.dr.ir. Wil van der Aalst
Process Mining Tutorial Computational Intelligence in HealthCare 20-24 September 2010, Eindhoven, the Netherlands prof.dr.ir. Wil van der Aalst www.processmining.org Focus of most modeling and analysis
More informationCS 484 Data Mining. Association Rule Mining 2
CS 484 Data Mining Association Rule Mining 2 Review: Reducing Number of Candidates Apriori principle: If an itemset is frequent, then all of its subsets must also be frequent Apriori principle holds due
More informationDecision Trees (Cont.)
Decision Trees (Cont.) R&N Chapter 18.2,18.3 Side example with discrete (categorical) attributes: Predicting age (3 values: less than 30, 30-45, more than 45 yrs old) from census data. Attributes (split
More informationA Hybrid Method of CART and Artificial Neural Network for Short-term term Load Forecasting in Power Systems
A Hybrid Method of CART and Artificial Neural Network for Short-term term Load Forecasting in Power Systems Hiroyuki Mori Dept. of Electrical & Electronics Engineering Meiji University Tama-ku, Kawasaki
More informationData Informatics. Seon Ho Kim, Ph.D.
Data Informatics Seon Ho Kim, Ph.D. seonkim@usc.edu What is Machine Learning? Overview slides by ETHEM ALPAYDIN Why Learn? Learn: programming computers to optimize a performance criterion using example
More informationDiscrete Event Systems Exam
Computer Engineering and Networks Laboratory TEC, NSG, DISCO HS 2016 Prof. L. Thiele, Prof. L. Vanbever, Prof. R. Wattenhofer Discrete Event Systems Exam Friday, 3 rd February 2017, 14:00 16:00. Do not
More informationDecision Trees. Tirgul 5
Decision Trees Tirgul 5 Using Decision Trees It could be difficult to decide which pet is right for you. We ll find a nice algorithm to help us decide what to choose without having to think about it. 2
More informationFuzzy Systems. Introduction
Fuzzy Systems Introduction Prof. Dr. Rudolf Kruse Christoph Doell {kruse,doell}@iws.cs.uni-magdeburg.de Otto-von-Guericke University of Magdeburg Faculty of Computer Science Department of Knowledge Processing
More informationMathematical Induction Part Two
Mathematical Induction Part Two Recap from Last Time Let P be some predicate. The principle of mathematical induction states that if If it starts true and it stays P(0) is true true and k ℕ. (P(k) P(k+1))
More informationData Mining: Concepts and Techniques. (3 rd ed.) Chapter 6
Data Mining: Concepts and Techniques (3 rd ed.) Chapter 6 Jiawei Han, Micheline Kamber, and Jian Pei University of Illinois at Urbana-Champaign & Simon Fraser University 2013 Han, Kamber & Pei. All rights
More informationInteresting Patterns. Jilles Vreeken. 15 May 2015
Interesting Patterns Jilles Vreeken 15 May 2015 Questions of the Day What is interestingness? what is a pattern? and how can we mine interesting patterns? What is a pattern? Data Pattern y = x - 1 What
More informationLECTURE 10: LINEAR MODEL SELECTION PT. 1. October 16, 2017 SDS 293: Machine Learning
LECTURE 10: LINEAR MODEL SELECTION PT. 1 October 16, 2017 SDS 293: Machine Learning Outline Model selection: alternatives to least-squares Subset selection - Best subset - Stepwise selection (forward and
More informationwhere X is the feasible region, i.e., the set of the feasible solutions.
3.5 Branch and Bound Consider a generic Discrete Optimization problem (P) z = max{c(x) : x X }, where X is the feasible region, i.e., the set of the feasible solutions. Branch and Bound is a general semi-enumerative
More informationCS 584 Data Mining. Association Rule Mining 2
CS 584 Data Mining Association Rule Mining 2 Recall from last time: Frequent Itemset Generation Strategies Reduce the number of candidates (M) Complete search: M=2 d Use pruning techniques to reduce M
More informationCausal Inference with Big Data Sets
Causal Inference with Big Data Sets Marcelo Coca Perraillon University of Colorado AMC November 2016 1 / 1 Outlone Outline Big data Causal inference in economics and statistics Regression discontinuity
More informationLinear vs. Exponential Word Problems
Linear vs. Eponential Word Problems At separate times in the course, you ve learned about linear functions and eponential functions, and done word problems involving each type of function. Today s assignment
More informationProcess Mining in Non-Stationary Environments
and Machine Learning. Bruges Belgium), 25-27 April 2012, i6doc.com publ., ISBN 978-2-87419-049-0. Process Mining in Non-Stationary Environments Phil Weber, Peter Tiňo and Behzad Bordbar School of Computer
More informationBayesian Networks: Construction, Inference, Learning and Causal Interpretation. Volker Tresp Summer 2016
Bayesian Networks: Construction, Inference, Learning and Causal Interpretation Volker Tresp Summer 2016 1 Introduction So far we were mostly concerned with supervised learning: we predicted one or several
More informationCPSC 340: Machine Learning and Data Mining. More PCA Fall 2017
CPSC 340: Machine Learning and Data Mining More PCA Fall 2017 Admin Assignment 4: Due Friday of next week. No class Monday due to holiday. There will be tutorials next week on MAP/PCA (except Monday).
More informationProcess Mining. Knut Hinkelmann. Prof. Dr. Knut Hinkelmann MSc Business Information Systems
Knut Hinkelmann Prof. r. Knut Hinkelmann MSc usiness Information Systems Learning Objective Topic: Learning Process knowledge from experience learning a process/decision model ase-ased Reasoning (R) reusing
More informationAligning Event Logs and Process Models for Multi-Perspective Conformance Checking: An Approach Based on Integer Linear Programming
Aligning Event Logs and Process Models for Multi-Perspective Conformance Checking: An Approach Based on Integer Linear Programming Massimiliano de Leoni and Wil M. P. van der Aalst Eindhoven University
More informationESE 570: Digital Integrated Circuits and VLSI Fundamentals
ESE 570: Digital Integrated Circuits and VLSI Fundamentals Lec 21: April 4, 2017 Memory Overview, Memory Core Cells Penn ESE 570 Spring 2017 Khanna Today! Memory " Classification " ROM Memories " RAM Memory
More information1 Impact-Driven Process Model Repair
1 Impact-Driven Process Model Repair ARTEM POLYVYANYY, Queensland University of Technology, Brisbane, Australia WIL M.P. VAN DER AALST, Eindhoven University of Technology, Eindhoven, The Netherlands, and
More informationBayesian Networks: Construction, Inference, Learning and Causal Interpretation. Volker Tresp Summer 2014
Bayesian Networks: Construction, Inference, Learning and Causal Interpretation Volker Tresp Summer 2014 1 Introduction So far we were mostly concerned with supervised learning: we predicted one or several
More informationWeek Cuts, Branch & Bound, and Lagrangean Relaxation
Week 11 1 Integer Linear Programming This week we will discuss solution methods for solving integer linear programming problems. I will skip the part on complexity theory, Section 11.8, although this is
More information4 : Exact Inference: Variable Elimination
10-708: Probabilistic Graphical Models 10-708, Spring 2014 4 : Exact Inference: Variable Elimination Lecturer: Eric P. ing Scribes: Soumya Batra, Pradeep Dasigi, Manzil Zaheer 1 Probabilistic Inference
More informationFinal Examination CS540-2: Introduction to Artificial Intelligence
Final Examination CS540-2: Introduction to Artificial Intelligence May 9, 2018 LAST NAME: SOLUTIONS FIRST NAME: Directions 1. This exam contains 33 questions worth a total of 100 points 2. Fill in your
More informationDATA MINING - 1DL360
DATA MINING - 1DL36 Fall 212" An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/ht12 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology, Uppsala
More informationAnnouncements. Solution to Assignment 3 is posted Assignment 4 is available. c D. Poole and A. Mackworth 2017 CPSC 322 Lecture 8 1 / 25
Announcements Solution to Assignment 3 is posted Assignment 4 is available c D. Poole and A. Mackworth 2017 CPSC 322 Lecture 8 1 / 25 Review: So far... Constraint satisfaction problems defined in terms
More informationMVE165/MMG630, Applied Optimization Lecture 6 Integer linear programming: models and applications; complexity. Ann-Brith Strömberg
MVE165/MMG630, Integer linear programming: models and applications; complexity Ann-Brith Strömberg 2011 04 01 Modelling with integer variables (Ch. 13.1) Variables Linear programming (LP) uses continuous
More informationLecture 5: Logistic Regression. Neural Networks
Lecture 5: Logistic Regression. Neural Networks Logistic regression Comparison with generative models Feed-forward neural networks Backpropagation Tricks for training neural networks COMP-652, Lecture
More informationData Mining Concepts & Techniques
Data Mining Concepts & Techniques Lecture No. 04 Association Analysis Naeem Ahmed Email: naeemmahoto@gmail.com Department of Software Engineering Mehran Univeristy of Engineering and Technology Jamshoro
More informationStats 170A: Project in Data Science Predictive Modeling: Regression
Stats 170A: Project in Data Science Predictive Modeling: Regression Padhraic Smyth Department of Computer Science Bren School of Information and Computer Sciences University of California, Irvine Reading,
More informationEncoding Process Discovery Problems in SMT
Software and Systems Modeling manuscript No. (will be inserted by the editor) Encoding Process Discovery Problems in SMT Marc Solé Josep Carmona Received: date / Accepted: date Abstract Information Systems,
More informationUsing Genetic Algorithms to Mine Process Models: Representation, Operators and Results
Using Genetic Algorithms to Mine Process Models: Representation, Operators and Results A.K. Alves de Medeiros, A.J.M.M. Weijters and W.M.P. van der Aalst Department of Technology Management, Eindhoven
More informationDecision Tree Learning
Decision Tree Learning Berlin Chen Department of Computer Science & Information Engineering National Taiwan Normal University References: 1. Machine Learning, Chapter 3 2. Data Mining: Concepts, Models,
More informationMachine Learning. Neural Networks. (slides from Domingos, Pardo, others)
Machine Learning Neural Networks (slides from Domingos, Pardo, others) For this week, Reading Chapter 4: Neural Networks (Mitchell, 1997) See Canvas For subsequent weeks: Scaling Learning Algorithms toward
More informationAnnouncements. Friday Four Square! Problem Set 8 due right now. Problem Set 9 out, due next Friday at 2:15PM. Did you lose a phone in my office?
N P NP Completeness Announcements Friday Four Square! Today at 4:15PM, outside Gates. Problem Set 8 due right now. Problem Set 9 out, due next Friday at 2:15PM. Explore P, NP, and their connection. Did
More informationML in Practice: CMSC 422 Slides adapted from Prof. CARPUAT and Prof. Roth
ML in Practice: CMSC 422 Slides adapted from Prof. CARPUAT and Prof. Roth N-fold cross validation Instead of a single test-training split: train test Split data into N equal-sized parts Train and test
More informationLecture 21: Spectral Learning for Graphical Models
10-708: Probabilistic Graphical Models 10-708, Spring 2016 Lecture 21: Spectral Learning for Graphical Models Lecturer: Eric P. Xing Scribes: Maruan Al-Shedivat, Wei-Cheng Chang, Frederick Liu 1 Motivation
More informationDecision T ree Tree Algorithm Week 4 1
Decision Tree Algorithm Week 4 1 Team Homework Assignment #5 Read pp. 105 117 of the text book. Do Examples 3.1, 3.2, 3.3 and Exercise 3.4 (a). Prepare for the results of the homework assignment. Due date
More informationChapter 6. Frequent Pattern Mining: Concepts and Apriori. Meng Jiang CSE 40647/60647 Data Science Fall 2017 Introduction to Data Mining
Chapter 6. Frequent Pattern Mining: Concepts and Apriori Meng Jiang CSE 40647/60647 Data Science Fall 2017 Introduction to Data Mining Pattern Discovery: Definition What are patterns? Patterns: A set of
More informationThe Quadratic Entropy Approach to Implement the Id3 Decision Tree Algorithm
Journal of Computer Science and Information Technology December 2018, Vol. 6, No. 2, pp. 23-29 ISSN: 2334-2366 (Print), 2334-2374 (Online) Copyright The Author(s). All Rights Reserved. Published by American
More informationMitosis Detection in Breast Cancer Histology Images with Multi Column Deep Neural Networks
Mitosis Detection in Breast Cancer Histology Images with Multi Column Deep Neural Networks IDSIA, Lugano, Switzerland dan.ciresan@gmail.com Dan C. Cireşan and Alessandro Giusti DNN for Visual Pattern Recognition
More informationIntelligent Systems Statistical Machine Learning
Intelligent Systems Statistical Machine Learning Carsten Rother, Dmitrij Schlesinger WS2014/2015, Our tasks (recap) The model: two variables are usually present: - the first one is typically discrete k
More information11.3 Solving Linear Systems by Adding or Subtracting
Name Class Date 11.3 Solving Linear Systems by Adding or Subtracting Essential Question: How can you solve a system of linear equations by adding and subtracting? Resource Locker Explore Exploring the
More informationCards, decks and hands
Cards, decks and hands Blackjack The cards (in the mathematical sense) are the cards, aces have weight, cards from 2 to 9 have their point value as weight, 0s, jacks, queens and kings have weight 0, so
More informationDecomposition-based Methods for Large-scale Discrete Optimization p.1
Decomposition-based Methods for Large-scale Discrete Optimization Matthew V Galati Ted K Ralphs Department of Industrial and Systems Engineering Lehigh University, Bethlehem, PA, USA Départment de Mathématiques
More informationLinear Programming Duality
Summer 2011 Optimization I Lecture 8 1 Duality recap Linear Programming Duality We motivated the dual of a linear program by thinking about the best possible lower bound on the optimal value we can achieve
More informationA Unified Approach for Measuring Precision and Generalization Based on Anti-Alignments
A Unified Approach for Measuring Precision and Generalization Based on Anti-Alignments B.F. van Dongen 1, J. Carmona 2, and T. Chatain 3 1 Eindhoven University of Technology, The Netherlands b.f.v.dongen@tue.nl
More informationThe exam is closed book, closed calculator, and closed notes except your one-page crib sheet.
CS 188 Fall 2015 Introduction to Artificial Intelligence Final You have approximately 2 hours and 50 minutes. The exam is closed book, closed calculator, and closed notes except your one-page crib sheet.
More informationORIE 4741: Learning with Big Messy Data. Train, Test, Validate
ORIE 4741: Learning with Big Messy Data Train, Test, Validate Professor Udell Operations Research and Information Engineering Cornell December 4, 2017 1 / 14 Exercise You run a hospital. A vendor wants
More informationDiscovering Block-Structured Process Models From Event Logs - A Constructive Approach
Discovering Block-Structured Process Models From Event Logs - A Constructive Approach S.J.J. Leemans, D. Fahland, and W.M.P. van der Aalst Department of Mathematics and Computer Science, Eindhoven University
More informationEvolutionary Robotics
Evolutionary Robotics Previously on evolutionary robotics Evolving Neural Networks How do we evolve a neural network? Evolving Neural Networks How do we evolve a neural network? One option: evolve the
More information