SlideShare une entreprise Scribd logo
1  sur  88
Télécharger pour lire hors ligne
Discovering Concurrency
Learning (Business) Process Models from Examples

Invited Talk CONCUR 2011, 8-9-2011, Aachen.


prof.dr.ir. Wil van der Aalst
www.processmining.org
Business Process Management ?




                                PAGE 1
Business
Process
Management !!

          PAGE 2
Types of Process Models Used in BPM




                                    Emphasis on
                               graphical models
                                    supporting a
                              substantial part of
                                    the so-called
                              workflow patterns
                             (incl. concurrency)
                                          PAGE 3
Classical Challenges in BPM

 •   Verification (cf. soundness problem in WF-nets)
 •   Performance analysis (e.g., simulation)
 •   Converting models into running systems
 •   Providing flexibility without loosing control
 •   …

Many problems have been “solved”:
  the real problem is adoption in
              practice!
                                                       PAGE 4
A more interesting challenge: Dealing
with variability




• Variants of the same process exist in various
  domains, e.g., Dutch Municipalities, Hertz, Suncorp,
  Salesforce, Easychair, etc.
• Configurable process models to generate concrete
  processes, cf. C-YAWL.
• Merging process models is a challenging problem.
• Model similarity (rather than equivalence).
                                                     PAGE 5
So we are interested in processes …




 … but most of us do not study them!


                                  PAGE 6
Desire lines in process models




                                 PAGE 7
Data explosion




                 PAGE 8
Process Mining =

     Event Data + Processes
  Data Mining + Process Analysis

Machine Learning + Formal Methods
                               PAGE 9
Process Mining

                 • Process discovery: "What is
                   really happening?"
                 • Conformance checking: "Do
                   we do what was agreed
                   upon?"
                 • Performance analysis:
                   "Where are the bottlenecks?"
                 • Process prediction: "Will this
                   case be late?"
                 • Process improvement: "How
                   to redesign this process?"
                 • Etc.
                                            PAGE 10
Process Mining
Starting point: event log




                        XES, MXML, SA-MXML, CSV, etc.

                                                PAGE 12
Simplified event log




                       a = register request,
                       b = examine thoroughly,
                       c = examine casually,
                       d = check ticket,
                       e = decide,
                       f = reinitiate request,
                       g = pay compensation,
                       and h = reject request
                                          PAGE 13
Process
discovery




            PAGE 14
Conformance
checking




              case 7: e is
               executed
                without
                             case 8: g or
                 being
                             h is missing
               enabled




                case 10: e
                is missing
                in second
                   round


                                  PAGE 15
Extension: Adding perspectives to
model based on event log




                                    PAGE 16
We applied ProM in >100 organizations

• Municipalities (e.g., Alkmaar, Heusden, Harderwijk, etc.)
• Government agencies (e.g., Rijkswaterstaat, Centraal
  Justitieel Incasso Bureau, Justice department)
• Insurance related agencies (e.g., UWV)
• Banks (e.g., ING Bank)
• Hospitals (e.g., AMC hospital, Catharina hospital)
• Multinationals (e.g., DSM, Deloitte)
• High-tech system manufacturers and their customers
  (e.g., Philips Healthcare, ASML, Ricoh, Thales)
• Media companies (e.g. Winkwaves)
• ...
                                                        PAGE 17
All supported by …




• Open-source (L-GPL), cf. www.processmining.org
• Plug-in architecture
• Plug-ins cover the whole process mining spectrum and
  also support classical forms of process analysis
                                                    PAGE 18
Process discovery

                              supports/
                               controls
                 business
                processes
   people   machines
        components
           organizations                          records
                                               events, e.g.,
                                                messages,
                                   specifies   transactions,
    models
                                  configures        etc.
   analyzes
                                 implements
                                   analyzes




                            conformance

                            enhancement
                                                               PAGE 19
Process Discovery Techniques
 (small selection)
                                      distributed genetic mining
    automata-based learning
                                             language-based regions
         heuristic mining

                                                     state-based regions
                     partial-order based mining
   genetic mining                                  LTL mining
                        pattern-based mining
                                                     neural networks
                 stochastic task graphs
fuzzy mining
                      mining block structures       hidden Markov models

   α algorithm          multi-phase mining      conformal process graph

               α# algorithm
                                          ILP mining
                    α++ algorithm
                                                                           PAGE 20
Why is process discovery such a difficult
problem?

• There are no negative examples (i.e., a log shows
  what has happened but does not show what could
  not happen).
• Due to concurrency, loops, and choices the search
  space has a complex structure and the log typically
  contains only a fraction of all possible behaviors.
• There is no clear relation between the size of a model
  and its behavior (i.e., a smaller model may generate
  more or less behavior although classical analysis
  and evaluation methods typically assume some
  monotonicity property).


                                                     PAGE 21
Challenge: four competing quality
criteria

“able to replay event log”     “Occam’s razor”




“not overfitting the log”    “not underfitting the log”



                                                   PAGE 22
Example: one log four models
                                                                                                               b
                                                                                                            examine
                                                                                                           thoroughly
                                                                                                                                                                            g
                                                                                                                                                                         pay
                                                                                                               c                                                     compensation
                                                                                          a                examine                                 e
                                                                           start     register              casually                           decide                                   end
                                                                                                                                                                                                     #     trace
                                                                                     request
                                                                                                                                                                            h                        455 acdeh
                                                                                                               d                                                         reject
                                                                                                          check ticket                                                  request                      191 abdeg
                                                                                                                                               f     reinitiate
                                                                                                                                                      request                                        177 adceh
                                                                               N1 : fitness = +, precision = +, generalization = +, simplicity = +
                                                                                                                                                                                                     144 abdeh
                                                                                                                                                                                                     111 acdeg
                                                                                     a               c                        d                          e                      h
                                                                                                                                                                                                      82 adceg
                                                                          start    register       examine                   check                      decide                reject     end
                                                                                   request        casually                  ticket                                          request
                                                                                                                                                                                                      56 adbeh
                                                                               N2 : fitness = -, precision = +, generalization = -, simplicity = +
                                                                                                                                                                                                      47 acdefdbeh
 “able to replay event log”                 “Occam’s razor”
                                                                                                                                                                                                      38 adbeg
                                                                                                       examine                                check
                                                                                                      thoroughly        b             d       ticket                        g                         33 acdefbdeh
          fitness                             simplicity                                                                                                            pay
                                                                                                                                                                compensation
                                                                                          a                                                                                                           14 acdefbdeg
                                                                           start     register   examine
                                                                                                             c                                                                         end            11 acdefdbeg
                                                                                     request    casually
                                                                                                                         e                f        reinitiate               h
                               process                                                                        decide                                request        reject
                                                                                                                                                                  request
                                                                                                                                                                                                         9 adcefcdeh
                              discovery                                        N3 : fitness = +, precision = -, generalization = +, simplicity = +                                                       8 adcefdbeh
                                                                                                                                                                                                         5 adcefbdeg
                                                                                       a              d                        c                           e                    g
                                                                                                                                                                                                         3 acdefbdefdbeg
generalization                                precision                             register
                                                                                    request
                                                                                                    check
                                                                                                    ticket
                                                                                                                            examine
                                                                                                                            casually
                                                                                                                                                        decide              pay
                                                                                                                                                                        compensation
                                                                                                                                                                                                         2 adcefdbeg
                                                                                       a              c                        d                          e                     g                        2 adcefbdefbdeg
 “not overfitting the log”                “not underfitting the log”                register      examine                    check                      decide              pay
                                                                                    request       casually                   ticket                                     compensation                     1 adcefdbefbdeh
                                                                                       a              d                        c                           e                    h                        1 adbefbdefdbeg
                                                                                    register        check                   examine                     decide                reject
                                                                                    request         ticket                  casually                                         request                     1 adcefdbefcdefdbeg
                                                                                      a               c                       d                           e                     h                   1391
                                                                       start                                                                                                                  end
                                                                                   register       examine                   check                      decide                reject
                                                                                   request        casually                  ticket                                          request


                                                                                                                   (all 21 variants seen in the log)


                                                                                      a              b                        d                           e                     g
                                                                                   register        examine                  check                      decide               pay
                                                                                   request        thoroughly                ticket                                      compensation

                                                                                      a              d                        b                           e                     h
                                                                                   register         check                 examine                      decide                reject
                                                                                   request          ticket               thoroughly                                         request

                                                                                      a              b                        d                           e                     h
                                                                                   register        examine                  check                      decide                reject
                                                                                   request        thoroughly                ticket                                          request                      PAGE 23
                                                                                N4 : fitness = +, precision = +, generalization = -, simplicity = -
#     trace
            455 acdeh
Model N1    191 abdeg
            177 adceh
            144 abdeh
            111 acdeg
             82 adceg
             56 adbeh
             47 acdefdbeh
             38 adbeg
             33 acdefbdeh
             14 acdefbdeg
             11 acdefdbeg
                9 adcefcdeh
                8 adcefdbeh
                5 adcefbdeg
                3 acdefbdefdbeg
                2 adcefdbeg
                2 adcefbdefbdeg
                1 adcefdbefbdeh
                1 adbefbdefdbeg
                1 adcefdbefcdefdbeg
                          PAGE 24
           1391
#     trace
            455 acdeh
Model N2    191 abdeg
            177 adceh
            144 abdeh
            111 acdeg
             82 adceg
             56 adbeh
             47 acdefdbeh
             38 adbeg
             33 acdefbdeh
             14 acdefbdeg
             11 acdefdbeg
                9 adcefcdeh
                8 adcefdbeh
                5 adcefbdeg
                3 acdefbdefdbeg
                2 adcefdbeg
                2 adcefbdefbdeg
                1 adcefdbefbdeh
                1 adbefbdefdbeg
                1 adcefdbefcdefdbeg
                          PAGE 25
           1391
#     trace
            455 acdeh
Model N3    191 abdeg
            177 adceh
            144 abdeh
            111 acdeg
             82 adceg
             56 adbeh
             47 acdefdbeh
             38 adbeg
             33 acdefbdeh
             14 acdefbdeg
             11 acdefdbeg
                9 adcefcdeh
                8 adcefdbeh
                5 adcefbdeg
                3 acdefbdefdbeg
                2 adcefdbeg
                2 adcefbdefbdeg
                1 adcefdbefbdeh
                1 adbefbdefdbeg
                1 adcefdbefcdefdbeg
                          PAGE 26
           1391
#     trace
                                                                                               455 acdeh
Model N4                                                                                       191 abdeg
                                                                                               177 adceh
                                                                                               144 abdeh
              a             d                 c                e              g                111 acdeg
           register       check           examine            decide          pay
           request        ticket          casually                       compensation           82 adceg
              a             c                 d                e              g                 56 adbeh
           register     examine             check           decide           pay
           request      casually            ticket                       compensation           47 acdefdbeh
              a             d                 c                e              h                 38 adbeg
           register       check           examine           decide           reject
           request        ticket          casually                          request             33 acdefbdeh
              a            c                 d                e               h                 14 acdefbdeg
start                                                                                   end
           register     examine            check            decide           reject
           request      casually           ticket                           request             11 acdefdbeg
                                                                                                   9 adcefcdeh
                                     (all 21 variants seen in the log)
                                                                                                   8 adcefdbeh
                                                                                                   5 adcefbdeg
             a             b                 d                e               g
           register     examine            check            decide           pay                   3 acdefbdefdbeg
           request     thoroughly          ticket                        compensation
                                                                                                   2 adcefdbeg
             a             d                 b                e               h
           register       check            examine          decide           reject                2 adcefbdefbdeg
           request        ticket          thoroughly                        request
                                                                                                   1 adcefdbefbdeh
             a             b                 d                e               h
          register       examine           check            decide          reject                 1 adbefbdefdbeg
          request       thoroughly         ticket                          request
                                                                                                   1 adcefdbefcdefdbeg
        N4 : fitness = +, precision = +, generalization = -, simplicity = -
                                                                                                             PAGE 27
                                                                                              1391
Example of a process discovery technique:
Genetic Mining




• Characteristics
 • requires a lot of computing power, but can be distributed easily,
 • can deal with noise, infrequent behavior, duplicate tasks, invisible tasks,
 • allows for incremental improvement and combinations with other
   approaches (heuristics post-optimization, etc.).

                                                                         PAGE 28
Genetic process mining: Overview




                                   PAGE 29
Example: crossover




                     PAGE 30
Example: mutation



                                  remove place

                        b                                                                           b
                    examine                                                                     examine
                   thoroughly                                                                  thoroughly
                                                            g                                                                           g
                                                           pay                                                                         pay
                        c                                                                           c
                                                       compensation                                                                compensation
           a                          e                                                a                          e
                    examine                                                                     examine
start   register    casually      decide                              end   start   register    casually      decide                              end
        request                                                                     request
                                                            h                                                                           h
                        d                                                                           d
                                                          reject                                                                      reject
                   check ticket                          request                               check ticket                          request
                                  f                                                                           f
                                          reinitiate                                                                  reinitiate
                                           request
                                                                            added arc                                  request




                                                                                                                                        PAGE 31
Example of a process discovery
technique: Theory of Regions
• Two types of regions theory:
   − State-based regions
   − Language-based regions




                                 All about
                                 discovering
                                 places!

                                               PAGE 32
State-based regions: Two step approach

                                                        d
                                          e
                                               [a,e]            [a,d,e]
                                 [ a,b]
               a             b
          []       [a]                    c
                         c
                             b                          d
                    [a,c]                     [a,b,c]           [a,b,c,d]




                                 b



          a        p1            e              p3          d

  start                                                                end

                   p2            c              p4
                                                                             PAGE 33
Example region
a enters, b and e exit, c and d do not cross

                                                           d
                                             e
                                                  [a,e]            [a,d,e]
                                    [ a,b]
                  a             b
             []       [a]                    c
                            c
                                b                          d
                       [a,c]                     [a,b,c]           [a,b,c,d]




                                    b



             a        p1            e              p3          d

     start                                                                end

                      p2            c              p4
                                                                                PAGE 34
Language-based regions

                         A place is feasible if it
                         can be added without
                         disabling any of the
                         traces in the event log.




               R




                                             PAGE 35
Conformance checking

                             supports/
                              controls
                business
               processes
  people   machines
       components
          organizations                          records
                                              events, e.g.,
                                               messages,
                                  specifies   transactions,
    models
                                 configures        etc.
   analyzes
                                implements
                                  analyzes


                            discovery




                           enhancement
                                                              PAGE 36
Four models, one log
N1                            b
                          examine
                         thoroughly
                                                                   g
                   p1                   p3                        pay
                              c                               compensation
          a               examine                e
start   register          casually           decide     p5                   end
        request
                                                                   h
                    p2        d         p4                       reject
                         check ticket                           request
                                             f   reinitiate
                                                  request




                                                                                   PAGE 37
PAGE 38
Replaying (1/7)
  σ1 on N1




p’ = p+1




 p = produced
 c = consumed
 m = missing ≤ c
 r = remaining ≤ p
                     PAGE 39
Replaying (2/7)
σ1 on N1




                  p’ = p+2
                  c’ = c+1




                    PAGE 40
Replaying (3/7)
σ1 on N1




                  p’ = p+1
                  c’ = c+1




                    PAGE 41
Replaying (4/7)
σ1 on N1




                  p’ = p+1
                  c’ = c+1




                    PAGE 42
Replaying (5/7)
σ1 on N1




                  p’ = p+1
                  c’ = c+2




                    PAGE 43
Replaying (6/7)
σ1 on N1




                  p’ = p+1
                  c’ = c+1




                    PAGE 44
Replaying (7/7)
 σ1 on N1


    p=7     p=7
    c=6     c=7
    m=0     m=0
    r=0     r=0
                  p1      p3


    start                      p5   end   c’ = c+1
                   p2     p4




m=0
r=0
no problems encountered
                                          PAGE 45
Replaying (1/7)
  σ3 on N2




p’ = p+1




 p = produced
 c = consumed
 m = missing ≤ c
 r = remaining ≤ p
                     PAGE 46
Replaying (2/7)
σ3 on N2




                  p’ = p+1
                  c’ = c+1




                    PAGE 47
Replaying (3/7)
σ3 on N2




                  p’ = p+1
                  c’ = c+1
                  m’ = m+1




                    PAGE 48
Replaying (4/7)
σ3 on N2




                  p’ = p+1
                  c’ = c+1




                    PAGE 49
Replaying (5/7)
σ3 on N2




                  p’ = p+1
                  c’ = c+1




                    PAGE 50
Replaying (6/7)
σ3 on N2




                  p’ = p+1
                  c’ = c+1




                    PAGE 51
Replaying (7/7)
σ3 on N2

                            r’ = r+1




                                                        c’ = c+1




Problems:
• m = 1 : d was forced to occur without being enabled
• r = 1 : output of c was not used by d
                                                            PAGE 52
Computing fitness at trace level




                                   PAGE 53
Computing fitness at the log level




                                     PAGE 54
Example values
N1                            b
                          examine
                         thoroughly
                                                                   g
                   p1                   p3                        pay
                              c                               compensation
          a               examine                e
start   register          casually           decide     p5                   end
        request
                                                                   h
                    p2        d         p4                       reject
                         check ticket                           request
                                             f   reinitiate
                                                  request




                                                                                   PAGE 55
Diagnostics
                       problem                                       problem
             430 tokens remain in place p1,                566 tokens were missing in
            because c did not happen while                   place p3 during replay,
            the model expected c to happen                   because e happened
                                                           while this was not possible
                                                             according to the model
                problem
10 tokens were missing in place p1 during
 replay, because c happened while this
 was not possible according to the model
                                                             971          971
                                                  1391                                   1537
                                                          +430
                                        1391               -10
                                                                      c           -566             1537        930          930
                                                           p1      examine         p3
                                                                   casually
                                                  a                                         e         +607           h        -461
                                     start     register                                   decide          p5      reject          end
                                               request                                                           request
                                                          -146        d
                                                                                         1537
                                                           p2       check          p4
                                                 1391
                                                                    ticket
                                                            1537                1537
                         problem                                                                              problem
                146 tokens were missing in                           problem                              461 of the 1391
              place p2 during replay, because              607 tokens remain in place p5,                   cases did not
              d happened while this was not               because h did not happen while                  reach place end
              possible according to the model             the model expected h to happen


                                                                                                                              PAGE 56
Challenges related to
conformance checking

• Not as simple as it seems!
• In case of duplicate tasks (two transition with the
  same label) or silent tasks (τ labeled transitions),
  multiple paths need to be considered (state space
  analysis, heuristics, or optimization).
• More general formulation of the problem with costs
  associated to skipping/inserting particular tasks, see
  ProM latest conformance checker (A* algorithm).
• Computing the most likely alignment is needed for
  other types of process mining (time analysis,
  measuring precision, social network analysis, etc.).

                                                     PAGE 57
How can process mining help?

• Detect bottlenecks        • Provide mirror
• Detect deviations         • Highlight important
• Performance                 problems
  measurement               • Avoid ICT failures
• Suggest improvements      • Avoid management by
• Decision support (e.g.,     PowerPoint
  recommendation and        • From “politics” to
  prediction)                 “analytics”




                                                PAGE 58
PAGE 59
Example of a Lasagna process: WMO
    process of a Dutch municipality




Each line corresponds to one of the 528 requests that were
handled in the period from 4-1-2009 until 28-2-2010. In total
there are 5498 events represented as dots. The mean time
needed to handled a case is approximately 25 days.              PAGE 60
WMO process
  (Wet Maatschappelijke Ondersteuning)

• WMO refers to the social support act that came into
  force in The Netherlands on January 1st, 2007.
• The aim of this act is to assist people with disabilities
  and impairments. Under the act, local authorities are
  required to give support to those who need it, e.g.,
  household help, providing wheelchairs and
  scootmobiles, and adaptations to homes.
• There are different processes for the different kinds of
  help. We focus on the process for handling requests
  for household help.
• In a period of about one year, 528 requests for
  household WMO support were received.
• These 528 requests generated 5498 events.
                                                         PAGE 61
C-net discovered using
heuristic miner (1/3)




                         PAGE 62
C-net discovered using
heuristic miner (2/3)




                         PAGE 63
C-net discovered using
heuristic miner (3/3)




                         PAGE 64
Conformance check WMO process (1/3)




                                  PAGE 65
Conformance check WMO process (2/3)




                                  PAGE 66
Conformance check WMO process (3/3)




            The fitness of the discovered
            process is 0.99521667. Of the 528
            cases, 496 cases fit perfectly
            whereas for 32 cases there are
            missing or remaining tokens.



                                                PAGE 67
Bottleneck analysis WMO process (1/3)




                                        PAGE 68
Bottleneck analysis WMO process (2/3)




                                        PAGE 69
Bottleneck analysis WMO process (3/3)




flow time of
approx. 25 days
with a standard
deviation of
approx. 28




                                        PAGE 70
Two additional Lasagna processes

                                   RWS
                            (“Rijkswaterstaat”)
                                  process




                           WOZ (“Waardering
                           Onroerende Zaken”)
                                process

                                           PAGE 71
RWS Process

• The Dutch national public works department, called
  “Rijkswaterstaat” (RWS), has twelve provincial offices.
  We analyzed the handling of invoices in one of these
  offices.
• The office employs about 1,000 civil servants and is
  primarily responsible for the construction and
  maintenance of the road and water infrastructure in its
  province.
• To perform its functions, the RWS office subcontracts
  various parties such as road construction companies,
  cleaning companies, and environmental bureaus. Also,
  it purchases services and products to support its
  construction, maintenance, and administrative
  activities.                                        PAGE 72
C-net discovered using heuristic miner




                                         PAGE 73
Social network constructed based on
handovers of work



                          Each of the 271 nodes
                          corresponds to a civil
                          servant. Two civil
                          servants are
                          connected if one
                          executed an activity
                          causally following an
                          activity executed by the
                          other civil servant




                                              PAGE 74
Social network consisting of civil servants that
executed more than 2000 activities in a 9 month period.




                                         The darker arcs
                                         indicate the strongest
                                         relationships in the
                                         social network.
                                         Nodes having the
                                         same color belong to
                                         the same clique.




                                                          PAGE 75
WOZ process

• Event log containing information about 745 objections
  against the so-called WOZ (“Waardering Onroerende
  Zaken”) valuation.
• Dutch municipalities need to estimate the value of
  houses and apartments. The WOZ value is used as a
  basis for determining the real-estate property tax.
• The higher the WOZ value, the more tax the owner needs
  to pay. Therefore, there are many objections (i.e.,
  appeals) of citizens that assert that the WOZ value is too
  high.
• “WOZ process” discovered for another municipality (i.e.,
  different from the one for which we analyzed the WMO
  process).
                                                        PAGE 76
Discovered process model




The log contains events related to 745 objections against the
so-called WOZ valuation. These 745 objections generated 9583
events. There are 13 activities. For 12 of these activities both
start and complete events are recorded. Hence, the WF-net has
                                                                   PAGE 77
25 transitions.
Conformance checker:
(fitness is 0.98876214)




                          PAGE 78
Performance analysis




                       PAGE 79
Resource-activity matrix
(four groups discovered)




                           PAGE 80
PAGE 81
Example of a Spaghetti process




Spaghetti process describing the diagnosis and treatment of 2765
patients in a Dutch hospital. The process model was constructed
based on an event log containing 114,592 events. There are 619
different activities (taking event types into account) executed by 266
different individuals (doctors, nurses, etc.).
                                                                         PAGE 82
Fragment
18 activities of the 619 activities (2.9%)




                                             PAGE 83
Another example
(event log of Dutch housing agency)




   The event log contains 208
   cases that generated 5987
   events. There are 74
   different activities.
                                      PAGE 84
PAGE 85
Conclusion

• Many concurrency-related BPM challenges.
• Process leave traces in event logs. So, if you are
  interested in processes, use them!
• Process mining: challenging and highly relevant.
• Process discovery challenge
   − balancing between different objectives
   − only example behavior
• Conformance checking challenge
   − finding the most likely trace
   − dealing with silent/duplicate steps
• Eldorado for exciting concurrency research!

                                                       PAGE 86
www.processmining.org
  www.win.tue.nl/ieeetfpm/
                             PAGE 87

Contenu connexe

Tendances

TomTom for Business Process Managment (TomTom4BPM)
TomTom for Business Process Managment (TomTom4BPM)TomTom for Business Process Managment (TomTom4BPM)
TomTom for Business Process Managment (TomTom4BPM)Wil van der Aalst
 
Process Mining - Chapter 7 - Conformance Checking
Process Mining - Chapter 7 - Conformance CheckingProcess Mining - Chapter 7 - Conformance Checking
Process Mining - Chapter 7 - Conformance CheckingWil van der Aalst
 
Process Mining - Chapter 4 - Getting the Data
Process Mining - Chapter 4 - Getting the DataProcess Mining - Chapter 4 - Getting the Data
Process Mining - Chapter 4 - Getting the DataWil van der Aalst
 
Process Mining - Chapter 6 - Advanced Process Discovery_techniques
Process Mining - Chapter 6 - Advanced Process Discovery_techniquesProcess Mining - Chapter 6 - Advanced Process Discovery_techniques
Process Mining - Chapter 6 - Advanced Process Discovery_techniquesWil van der Aalst
 
Process Mining - Chapter 11 - Analyzing Lasagna Processes
Process Mining - Chapter 11 - Analyzing Lasagna ProcessesProcess Mining - Chapter 11 - Analyzing Lasagna Processes
Process Mining - Chapter 11 - Analyzing Lasagna ProcessesWil van der Aalst
 

Tendances (6)

TomTom for Business Process Managment (TomTom4BPM)
TomTom for Business Process Managment (TomTom4BPM)TomTom for Business Process Managment (TomTom4BPM)
TomTom for Business Process Managment (TomTom4BPM)
 
Process Mining - Chapter 7 - Conformance Checking
Process Mining - Chapter 7 - Conformance CheckingProcess Mining - Chapter 7 - Conformance Checking
Process Mining - Chapter 7 - Conformance Checking
 
Process Mining - Chapter 4 - Getting the Data
Process Mining - Chapter 4 - Getting the DataProcess Mining - Chapter 4 - Getting the Data
Process Mining - Chapter 4 - Getting the Data
 
Process Mining Book
Process Mining BookProcess Mining Book
Process Mining Book
 
Process Mining - Chapter 6 - Advanced Process Discovery_techniques
Process Mining - Chapter 6 - Advanced Process Discovery_techniquesProcess Mining - Chapter 6 - Advanced Process Discovery_techniques
Process Mining - Chapter 6 - Advanced Process Discovery_techniques
 
Process Mining - Chapter 11 - Analyzing Lasagna Processes
Process Mining - Chapter 11 - Analyzing Lasagna ProcessesProcess Mining - Chapter 11 - Analyzing Lasagna Processes
Process Mining - Chapter 11 - Analyzing Lasagna Processes
 

En vedette

Leadership challenge follow up clinic
Leadership challenge follow up clinicLeadership challenge follow up clinic
Leadership challenge follow up clinicChew jimmy
 
Modelling your way out of the poo: predicting the impact of early diagnosis o...
Modelling your way out of the poo: predicting the impact of early diagnosis o...Modelling your way out of the poo: predicting the impact of early diagnosis o...
Modelling your way out of the poo: predicting the impact of early diagnosis o...David Halsall
 
The Leadership Challenge
The Leadership ChallengeThe Leadership Challenge
The Leadership ChallengeAbbas Ali
 
Challenge The Process By Asking "Why?" With GoLeanSixSigma.com
Challenge The Process By Asking "Why?" With GoLeanSixSigma.comChallenge The Process By Asking "Why?" With GoLeanSixSigma.com
Challenge The Process By Asking "Why?" With GoLeanSixSigma.comGoLeanSixSigma.com
 
Group Discussion Success Tips Tricks
Group Discussion Success Tips TricksGroup Discussion Success Tips Tricks
Group Discussion Success Tips TricksIndian Dakiya
 

En vedette (6)

Leadership challenge follow up clinic
Leadership challenge follow up clinicLeadership challenge follow up clinic
Leadership challenge follow up clinic
 
Modelling your way out of the poo: predicting the impact of early diagnosis o...
Modelling your way out of the poo: predicting the impact of early diagnosis o...Modelling your way out of the poo: predicting the impact of early diagnosis o...
Modelling your way out of the poo: predicting the impact of early diagnosis o...
 
The Leadership Challenge
The Leadership ChallengeThe Leadership Challenge
The Leadership Challenge
 
Group discussion-strategies
Group discussion-strategiesGroup discussion-strategies
Group discussion-strategies
 
Challenge The Process By Asking "Why?" With GoLeanSixSigma.com
Challenge The Process By Asking "Why?" With GoLeanSixSigma.comChallenge The Process By Asking "Why?" With GoLeanSixSigma.com
Challenge The Process By Asking "Why?" With GoLeanSixSigma.com
 
Group Discussion Success Tips Tricks
Group Discussion Success Tips TricksGroup Discussion Success Tips Tricks
Group Discussion Success Tips Tricks
 

Similaire à Discovering Concurrency: Learning (Business) Process Models from Examples

Process mining chapter_01_introduction
Process mining chapter_01_introductionProcess mining chapter_01_introduction
Process mining chapter_01_introductionMuhammad Ajmal
 
Process mining chapter_06_advanced_process_discovery_techniques
Process mining chapter_06_advanced_process_discovery_techniquesProcess mining chapter_06_advanced_process_discovery_techniques
Process mining chapter_06_advanced_process_discovery_techniquesMuhammad Ajmal
 
Process mining chapter_07_conformance_checking
Process mining chapter_07_conformance_checkingProcess mining chapter_07_conformance_checking
Process mining chapter_07_conformance_checkingMuhammad Ajmal
 
Process Mining - Chapter 5 - Process Discovery
Process Mining - Chapter 5 - Process DiscoveryProcess Mining - Chapter 5 - Process Discovery
Process Mining - Chapter 5 - Process DiscoveryWil van der Aalst
 
Process mining chapter_05_process_discovery
Process mining chapter_05_process_discoveryProcess mining chapter_05_process_discovery
Process mining chapter_05_process_discoveryMuhammad Ajmal
 
Process mining chapter_11_analyzing_lasagna_processes
Process mining chapter_11_analyzing_lasagna_processesProcess mining chapter_11_analyzing_lasagna_processes
Process mining chapter_11_analyzing_lasagna_processesMuhammad Ajmal
 
Process mining chapter_12_analyzing_spaghetti_processes
Process mining chapter_12_analyzing_spaghetti_processesProcess mining chapter_12_analyzing_spaghetti_processes
Process mining chapter_12_analyzing_spaghetti_processesMuhammad Ajmal
 
Dsi 2021 Kaj zmore rudarjenje procesov
Dsi 2021 Kaj zmore rudarjenje procesovDsi 2021 Kaj zmore rudarjenje procesov
Dsi 2021 Kaj zmore rudarjenje procesovGregor Polančič
 
Process mining chapter_14_epilogue
Process mining chapter_14_epilogueProcess mining chapter_14_epilogue
Process mining chapter_14_epilogueMuhammad Ajmal
 
Process mining chapter_08_mining_additional_perspectives
Process mining chapter_08_mining_additional_perspectivesProcess mining chapter_08_mining_additional_perspectives
Process mining chapter_08_mining_additional_perspectivesMuhammad Ajmal
 
Adore Demonstration (AOSD'10)
Adore Demonstration (AOSD'10)Adore Demonstration (AOSD'10)
Adore Demonstration (AOSD'10)Sébastien Mosser
 
Borders of Decidability in Verification of Data-Centric Dynamic Systems
Borders of Decidability in Verification of Data-Centric Dynamic SystemsBorders of Decidability in Verification of Data-Centric Dynamic Systems
Borders of Decidability in Verification of Data-Centric Dynamic Systemsnet2-project
 
Top100summit christina
Top100summit christinaTop100summit christina
Top100summit christinaChristina Geng
 
Describing, Discovering, and Understanding Multi-Dimensional Processes
Describing, Discovering, and Understanding Multi-Dimensional ProcessesDescribing, Discovering, and Understanding Multi-Dimensional Processes
Describing, Discovering, and Understanding Multi-Dimensional ProcessesDirk Fahland
 
SIMPDA 2011 - An Open Source Platform for Business Process Mining
SIMPDA 2011 - An Open Source Platform for Business Process Mining SIMPDA 2011 - An Open Source Platform for Business Process Mining
SIMPDA 2011 - An Open Source Platform for Business Process Mining SpagoWorld
 
Discovering Petri Nets: Evidence-Based Business Process Management
Discovering Petri Nets: Evidence-Based Business Process ManagementDiscovering Petri Nets: Evidence-Based Business Process Management
Discovering Petri Nets: Evidence-Based Business Process ManagementWil van der Aalst
 
Quick fix generation for DSMLs
Quick fix generation for DSMLsQuick fix generation for DSMLs
Quick fix generation for DSMLsÁbel Hegedüs
 
Slides Cost Based Performance Modelling
Slides Cost Based Performance ModellingSlides Cost Based Performance Modelling
Slides Cost Based Performance ModellingEugene Margulis
 
OSCON 2014: Data Workflows for Machine Learning
OSCON 2014: Data Workflows for Machine LearningOSCON 2014: Data Workflows for Machine Learning
OSCON 2014: Data Workflows for Machine LearningPaco Nathan
 

Similaire à Discovering Concurrency: Learning (Business) Process Models from Examples (20)

Process mining chapter_01_introduction
Process mining chapter_01_introductionProcess mining chapter_01_introduction
Process mining chapter_01_introduction
 
Process mining chapter_06_advanced_process_discovery_techniques
Process mining chapter_06_advanced_process_discovery_techniquesProcess mining chapter_06_advanced_process_discovery_techniques
Process mining chapter_06_advanced_process_discovery_techniques
 
Process mining chapter_07_conformance_checking
Process mining chapter_07_conformance_checkingProcess mining chapter_07_conformance_checking
Process mining chapter_07_conformance_checking
 
Process Mining - Chapter 5 - Process Discovery
Process Mining - Chapter 5 - Process DiscoveryProcess Mining - Chapter 5 - Process Discovery
Process Mining - Chapter 5 - Process Discovery
 
Process mining chapter_05_process_discovery
Process mining chapter_05_process_discoveryProcess mining chapter_05_process_discovery
Process mining chapter_05_process_discovery
 
Process mining chapter_11_analyzing_lasagna_processes
Process mining chapter_11_analyzing_lasagna_processesProcess mining chapter_11_analyzing_lasagna_processes
Process mining chapter_11_analyzing_lasagna_processes
 
Process mining chapter_12_analyzing_spaghetti_processes
Process mining chapter_12_analyzing_spaghetti_processesProcess mining chapter_12_analyzing_spaghetti_processes
Process mining chapter_12_analyzing_spaghetti_processes
 
Dsi 2021 Kaj zmore rudarjenje procesov
Dsi 2021 Kaj zmore rudarjenje procesovDsi 2021 Kaj zmore rudarjenje procesov
Dsi 2021 Kaj zmore rudarjenje procesov
 
Process mining chapter_14_epilogue
Process mining chapter_14_epilogueProcess mining chapter_14_epilogue
Process mining chapter_14_epilogue
 
Process mining chapter_08_mining_additional_perspectives
Process mining chapter_08_mining_additional_perspectivesProcess mining chapter_08_mining_additional_perspectives
Process mining chapter_08_mining_additional_perspectives
 
Adore Demonstration (AOSD'10)
Adore Demonstration (AOSD'10)Adore Demonstration (AOSD'10)
Adore Demonstration (AOSD'10)
 
Borders of Decidability in Verification of Data-Centric Dynamic Systems
Borders of Decidability in Verification of Data-Centric Dynamic SystemsBorders of Decidability in Verification of Data-Centric Dynamic Systems
Borders of Decidability in Verification of Data-Centric Dynamic Systems
 
Top100summit christina
Top100summit christinaTop100summit christina
Top100summit christina
 
Describing, Discovering, and Understanding Multi-Dimensional Processes
Describing, Discovering, and Understanding Multi-Dimensional ProcessesDescribing, Discovering, and Understanding Multi-Dimensional Processes
Describing, Discovering, and Understanding Multi-Dimensional Processes
 
SIMPDA 2011 - An Open Source Platform for Business Process Mining
SIMPDA 2011 - An Open Source Platform for Business Process Mining SIMPDA 2011 - An Open Source Platform for Business Process Mining
SIMPDA 2011 - An Open Source Platform for Business Process Mining
 
Discovering Petri Nets: Evidence-Based Business Process Management
Discovering Petri Nets: Evidence-Based Business Process ManagementDiscovering Petri Nets: Evidence-Based Business Process Management
Discovering Petri Nets: Evidence-Based Business Process Management
 
Quick fix generation for DSMLs
Quick fix generation for DSMLsQuick fix generation for DSMLs
Quick fix generation for DSMLs
 
Cooking with Data and Processes
Cooking with Data and ProcessesCooking with Data and Processes
Cooking with Data and Processes
 
Slides Cost Based Performance Modelling
Slides Cost Based Performance ModellingSlides Cost Based Performance Modelling
Slides Cost Based Performance Modelling
 
OSCON 2014: Data Workflows for Machine Learning
OSCON 2014: Data Workflows for Machine LearningOSCON 2014: Data Workflows for Machine Learning
OSCON 2014: Data Workflows for Machine Learning
 

Plus de Wil van der Aalst

Process Mining: BPM on Steroids (CPOs@BPM&O 2019 Keynote)
Process Mining: BPM on Steroids (CPOs@BPM&O 2019 Keynote)Process Mining: BPM on Steroids (CPOs@BPM&O 2019 Keynote)
Process Mining: BPM on Steroids (CPOs@BPM&O 2019 Keynote)Wil van der Aalst
 
Everything You Always Wanted To Know About Petri Nets, But Were Afraid To Ask
Everything You Always Wanted To Know About Petri Nets, But Were Afraid To AskEverything You Always Wanted To Know About Petri Nets, But Were Afraid To Ask
Everything You Always Wanted To Know About Petri Nets, But Were Afraid To AskWil van der Aalst
 
20 years of Process Mining Research (ICPM 2019 keynote)
20 years of Process Mining Research (ICPM 2019 keynote)20 years of Process Mining Research (ICPM 2019 keynote)
20 years of Process Mining Research (ICPM 2019 keynote)Wil van der Aalst
 
Earth Movers’ Stochastic Conformance Checking
Earth Movers’ Stochastic Conformance CheckingEarth Movers’ Stochastic Conformance Checking
Earth Movers’ Stochastic Conformance CheckingWil van der Aalst
 
Using Process Mining to Remove Operational Friction in Shared Services
Using Process Mining to Remove Operational Friction in Shared ServicesUsing Process Mining to Remove Operational Friction in Shared Services
Using Process Mining to Remove Operational Friction in Shared ServicesWil van der Aalst
 
Object-Centric Process Mining: Dealing With Divergence and Convergence in Eve...
Object-Centric Process Mining: Dealing With Divergence and Convergence in Eve...Object-Centric Process Mining: Dealing With Divergence and Convergence in Eve...
Object-Centric Process Mining: Dealing With Divergence and Convergence in Eve...Wil van der Aalst
 
Process Mining In Today’s Platforms Economy: Opportunities and Challenges (WI...
Process Mining In Today’s Platforms Economy: Opportunities and Challenges (WI...Process Mining In Today’s Platforms Economy: Opportunities and Challenges (WI...
Process Mining In Today’s Platforms Economy: Opportunities and Challenges (WI...Wil van der Aalst
 
Event Logs: What kind of data does process mining require?
Event Logs: What kind of data does process mining require?Event Logs: What kind of data does process mining require?
Event Logs: What kind of data does process mining require?Wil van der Aalst
 
Configurable Declare: Designing Customizable Flexible Models
Configurable Declare: Designing Customizable Flexible ModelsConfigurable Declare: Designing Customizable Flexible Models
Configurable Declare: Designing Customizable Flexible ModelsWil van der Aalst
 
On the Role of Fitness, Precision, Generalization and Simplicity in Process D...
On the Role of Fitness, Precision, Generalization and Simplicity in Process D...On the Role of Fitness, Precision, Generalization and Simplicity in Process D...
On the Role of Fitness, Precision, Generalization and Simplicity in Process D...Wil van der Aalst
 
Process Mining: Understanding and Improving Desire Lines in Big Data
Process Mining: Understanding and Improving Desire Lines in Big DataProcess Mining: Understanding and Improving Desire Lines in Big Data
Process Mining: Understanding and Improving Desire Lines in Big DataWil van der Aalst
 
Distributed Process Discovery and Conformance Checking
Distributed Process Discovery and Conformance CheckingDistributed Process Discovery and Conformance Checking
Distributed Process Discovery and Conformance CheckingWil van der Aalst
 
Service Interaction: Patterns, Formalization, and Analysis
Service Interaction: Patterns, Formalization, and AnalysisService Interaction: Patterns, Formalization, and Analysis
Service Interaction: Patterns, Formalization, and AnalysisWil van der Aalst
 
Keynote on Process Mining at SSCI 2010 / CIDM 2011
Keynote on Process Mining at SSCI 2010 / CIDM 2011Keynote on Process Mining at SSCI 2010 / CIDM 2011
Keynote on Process Mining at SSCI 2010 / CIDM 2011Wil van der Aalst
 
Keynote at 18th International Conference on Cooperative Information Systems (...
Keynote at 18th International Conference on Cooperative Information Systems (...Keynote at 18th International Conference on Cooperative Information Systems (...
Keynote at 18th International Conference on Cooperative Information Systems (...Wil van der Aalst
 
Process Mining - Chapter 10 - Tool Support
Process Mining - Chapter 10 - Tool SupportProcess Mining - Chapter 10 - Tool Support
Process Mining - Chapter 10 - Tool SupportWil van der Aalst
 

Plus de Wil van der Aalst (16)

Process Mining: BPM on Steroids (CPOs@BPM&O 2019 Keynote)
Process Mining: BPM on Steroids (CPOs@BPM&O 2019 Keynote)Process Mining: BPM on Steroids (CPOs@BPM&O 2019 Keynote)
Process Mining: BPM on Steroids (CPOs@BPM&O 2019 Keynote)
 
Everything You Always Wanted To Know About Petri Nets, But Were Afraid To Ask
Everything You Always Wanted To Know About Petri Nets, But Were Afraid To AskEverything You Always Wanted To Know About Petri Nets, But Were Afraid To Ask
Everything You Always Wanted To Know About Petri Nets, But Were Afraid To Ask
 
20 years of Process Mining Research (ICPM 2019 keynote)
20 years of Process Mining Research (ICPM 2019 keynote)20 years of Process Mining Research (ICPM 2019 keynote)
20 years of Process Mining Research (ICPM 2019 keynote)
 
Earth Movers’ Stochastic Conformance Checking
Earth Movers’ Stochastic Conformance CheckingEarth Movers’ Stochastic Conformance Checking
Earth Movers’ Stochastic Conformance Checking
 
Using Process Mining to Remove Operational Friction in Shared Services
Using Process Mining to Remove Operational Friction in Shared ServicesUsing Process Mining to Remove Operational Friction in Shared Services
Using Process Mining to Remove Operational Friction in Shared Services
 
Object-Centric Process Mining: Dealing With Divergence and Convergence in Eve...
Object-Centric Process Mining: Dealing With Divergence and Convergence in Eve...Object-Centric Process Mining: Dealing With Divergence and Convergence in Eve...
Object-Centric Process Mining: Dealing With Divergence and Convergence in Eve...
 
Process Mining In Today’s Platforms Economy: Opportunities and Challenges (WI...
Process Mining In Today’s Platforms Economy: Opportunities and Challenges (WI...Process Mining In Today’s Platforms Economy: Opportunities and Challenges (WI...
Process Mining In Today’s Platforms Economy: Opportunities and Challenges (WI...
 
Event Logs: What kind of data does process mining require?
Event Logs: What kind of data does process mining require?Event Logs: What kind of data does process mining require?
Event Logs: What kind of data does process mining require?
 
Configurable Declare: Designing Customizable Flexible Models
Configurable Declare: Designing Customizable Flexible ModelsConfigurable Declare: Designing Customizable Flexible Models
Configurable Declare: Designing Customizable Flexible Models
 
On the Role of Fitness, Precision, Generalization and Simplicity in Process D...
On the Role of Fitness, Precision, Generalization and Simplicity in Process D...On the Role of Fitness, Precision, Generalization and Simplicity in Process D...
On the Role of Fitness, Precision, Generalization and Simplicity in Process D...
 
Process Mining: Understanding and Improving Desire Lines in Big Data
Process Mining: Understanding and Improving Desire Lines in Big DataProcess Mining: Understanding and Improving Desire Lines in Big Data
Process Mining: Understanding and Improving Desire Lines in Big Data
 
Distributed Process Discovery and Conformance Checking
Distributed Process Discovery and Conformance CheckingDistributed Process Discovery and Conformance Checking
Distributed Process Discovery and Conformance Checking
 
Service Interaction: Patterns, Formalization, and Analysis
Service Interaction: Patterns, Formalization, and AnalysisService Interaction: Patterns, Formalization, and Analysis
Service Interaction: Patterns, Formalization, and Analysis
 
Keynote on Process Mining at SSCI 2010 / CIDM 2011
Keynote on Process Mining at SSCI 2010 / CIDM 2011Keynote on Process Mining at SSCI 2010 / CIDM 2011
Keynote on Process Mining at SSCI 2010 / CIDM 2011
 
Keynote at 18th International Conference on Cooperative Information Systems (...
Keynote at 18th International Conference on Cooperative Information Systems (...Keynote at 18th International Conference on Cooperative Information Systems (...
Keynote at 18th International Conference on Cooperative Information Systems (...
 
Process Mining - Chapter 10 - Tool Support
Process Mining - Chapter 10 - Tool SupportProcess Mining - Chapter 10 - Tool Support
Process Mining - Chapter 10 - Tool Support
 

Dernier

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Dernier (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Discovering Concurrency: Learning (Business) Process Models from Examples

  • 1. Discovering Concurrency Learning (Business) Process Models from Examples Invited Talk CONCUR 2011, 8-9-2011, Aachen. prof.dr.ir. Wil van der Aalst www.processmining.org
  • 4. Types of Process Models Used in BPM Emphasis on graphical models supporting a substantial part of the so-called workflow patterns (incl. concurrency) PAGE 3
  • 5. Classical Challenges in BPM • Verification (cf. soundness problem in WF-nets) • Performance analysis (e.g., simulation) • Converting models into running systems • Providing flexibility without loosing control • … Many problems have been “solved”: the real problem is adoption in practice! PAGE 4
  • 6. A more interesting challenge: Dealing with variability • Variants of the same process exist in various domains, e.g., Dutch Municipalities, Hertz, Suncorp, Salesforce, Easychair, etc. • Configurable process models to generate concrete processes, cf. C-YAWL. • Merging process models is a challenging problem. • Model similarity (rather than equivalence). PAGE 5
  • 7. So we are interested in processes … … but most of us do not study them! PAGE 6
  • 8. Desire lines in process models PAGE 7
  • 9. Data explosion PAGE 8
  • 10. Process Mining = Event Data + Processes Data Mining + Process Analysis Machine Learning + Formal Methods PAGE 9
  • 11. Process Mining • Process discovery: "What is really happening?" • Conformance checking: "Do we do what was agreed upon?" • Performance analysis: "Where are the bottlenecks?" • Process prediction: "Will this case be late?" • Process improvement: "How to redesign this process?" • Etc. PAGE 10
  • 13. Starting point: event log XES, MXML, SA-MXML, CSV, etc. PAGE 12
  • 14. Simplified event log a = register request, b = examine thoroughly, c = examine casually, d = check ticket, e = decide, f = reinitiate request, g = pay compensation, and h = reject request PAGE 13
  • 15. Process discovery PAGE 14
  • 16. Conformance checking case 7: e is executed without case 8: g or being h is missing enabled case 10: e is missing in second round PAGE 15
  • 17. Extension: Adding perspectives to model based on event log PAGE 16
  • 18. We applied ProM in >100 organizations • Municipalities (e.g., Alkmaar, Heusden, Harderwijk, etc.) • Government agencies (e.g., Rijkswaterstaat, Centraal Justitieel Incasso Bureau, Justice department) • Insurance related agencies (e.g., UWV) • Banks (e.g., ING Bank) • Hospitals (e.g., AMC hospital, Catharina hospital) • Multinationals (e.g., DSM, Deloitte) • High-tech system manufacturers and their customers (e.g., Philips Healthcare, ASML, Ricoh, Thales) • Media companies (e.g. Winkwaves) • ... PAGE 17
  • 19. All supported by … • Open-source (L-GPL), cf. www.processmining.org • Plug-in architecture • Plug-ins cover the whole process mining spectrum and also support classical forms of process analysis PAGE 18
  • 20. Process discovery supports/ controls business processes people machines components organizations records events, e.g., messages, specifies transactions, models configures etc. analyzes implements analyzes conformance enhancement PAGE 19
  • 21. Process Discovery Techniques (small selection) distributed genetic mining automata-based learning language-based regions heuristic mining state-based regions partial-order based mining genetic mining LTL mining pattern-based mining neural networks stochastic task graphs fuzzy mining mining block structures hidden Markov models α algorithm multi-phase mining conformal process graph α# algorithm ILP mining α++ algorithm PAGE 20
  • 22. Why is process discovery such a difficult problem? • There are no negative examples (i.e., a log shows what has happened but does not show what could not happen). • Due to concurrency, loops, and choices the search space has a complex structure and the log typically contains only a fraction of all possible behaviors. • There is no clear relation between the size of a model and its behavior (i.e., a smaller model may generate more or less behavior although classical analysis and evaluation methods typically assume some monotonicity property). PAGE 21
  • 23. Challenge: four competing quality criteria “able to replay event log” “Occam’s razor” “not overfitting the log” “not underfitting the log” PAGE 22
  • 24. Example: one log four models b examine thoroughly g pay c compensation a examine e start register casually decide end # trace request h 455 acdeh d reject check ticket request 191 abdeg f reinitiate request 177 adceh N1 : fitness = +, precision = +, generalization = +, simplicity = + 144 abdeh 111 acdeg a c d e h 82 adceg start register examine check decide reject end request casually ticket request 56 adbeh N2 : fitness = -, precision = +, generalization = -, simplicity = + 47 acdefdbeh “able to replay event log” “Occam’s razor” 38 adbeg examine check thoroughly b d ticket g 33 acdefbdeh fitness simplicity pay compensation a 14 acdefbdeg start register examine c end 11 acdefdbeg request casually e f reinitiate h process decide request reject request 9 adcefcdeh discovery N3 : fitness = +, precision = -, generalization = +, simplicity = + 8 adcefdbeh 5 adcefbdeg a d c e g 3 acdefbdefdbeg generalization precision register request check ticket examine casually decide pay compensation 2 adcefdbeg a c d e g 2 adcefbdefbdeg “not overfitting the log” “not underfitting the log” register examine check decide pay request casually ticket compensation 1 adcefdbefbdeh a d c e h 1 adbefbdefdbeg register check examine decide reject request ticket casually request 1 adcefdbefcdefdbeg a c d e h 1391 start end register examine check decide reject request casually ticket request (all 21 variants seen in the log) a b d e g register examine check decide pay request thoroughly ticket compensation a d b e h register check examine decide reject request ticket thoroughly request a b d e h register examine check decide reject request thoroughly ticket request PAGE 23 N4 : fitness = +, precision = +, generalization = -, simplicity = -
  • 25. # trace 455 acdeh Model N1 191 abdeg 177 adceh 144 abdeh 111 acdeg 82 adceg 56 adbeh 47 acdefdbeh 38 adbeg 33 acdefbdeh 14 acdefbdeg 11 acdefdbeg 9 adcefcdeh 8 adcefdbeh 5 adcefbdeg 3 acdefbdefdbeg 2 adcefdbeg 2 adcefbdefbdeg 1 adcefdbefbdeh 1 adbefbdefdbeg 1 adcefdbefcdefdbeg PAGE 24 1391
  • 26. # trace 455 acdeh Model N2 191 abdeg 177 adceh 144 abdeh 111 acdeg 82 adceg 56 adbeh 47 acdefdbeh 38 adbeg 33 acdefbdeh 14 acdefbdeg 11 acdefdbeg 9 adcefcdeh 8 adcefdbeh 5 adcefbdeg 3 acdefbdefdbeg 2 adcefdbeg 2 adcefbdefbdeg 1 adcefdbefbdeh 1 adbefbdefdbeg 1 adcefdbefcdefdbeg PAGE 25 1391
  • 27. # trace 455 acdeh Model N3 191 abdeg 177 adceh 144 abdeh 111 acdeg 82 adceg 56 adbeh 47 acdefdbeh 38 adbeg 33 acdefbdeh 14 acdefbdeg 11 acdefdbeg 9 adcefcdeh 8 adcefdbeh 5 adcefbdeg 3 acdefbdefdbeg 2 adcefdbeg 2 adcefbdefbdeg 1 adcefdbefbdeh 1 adbefbdefdbeg 1 adcefdbefcdefdbeg PAGE 26 1391
  • 28. # trace 455 acdeh Model N4 191 abdeg 177 adceh 144 abdeh a d c e g 111 acdeg register check examine decide pay request ticket casually compensation 82 adceg a c d e g 56 adbeh register examine check decide pay request casually ticket compensation 47 acdefdbeh a d c e h 38 adbeg register check examine decide reject request ticket casually request 33 acdefbdeh a c d e h 14 acdefbdeg start end register examine check decide reject request casually ticket request 11 acdefdbeg 9 adcefcdeh (all 21 variants seen in the log) 8 adcefdbeh 5 adcefbdeg a b d e g register examine check decide pay 3 acdefbdefdbeg request thoroughly ticket compensation 2 adcefdbeg a d b e h register check examine decide reject 2 adcefbdefbdeg request ticket thoroughly request 1 adcefdbefbdeh a b d e h register examine check decide reject 1 adbefbdefdbeg request thoroughly ticket request 1 adcefdbefcdefdbeg N4 : fitness = +, precision = +, generalization = -, simplicity = - PAGE 27 1391
  • 29. Example of a process discovery technique: Genetic Mining • Characteristics • requires a lot of computing power, but can be distributed easily, • can deal with noise, infrequent behavior, duplicate tasks, invisible tasks, • allows for incremental improvement and combinations with other approaches (heuristics post-optimization, etc.). PAGE 28
  • 30. Genetic process mining: Overview PAGE 29
  • 32. Example: mutation remove place b b examine examine thoroughly thoroughly g g pay pay c c compensation compensation a e a e examine examine start register casually decide end start register casually decide end request request h h d d reject reject check ticket request check ticket request f f reinitiate reinitiate request added arc request PAGE 31
  • 33. Example of a process discovery technique: Theory of Regions • Two types of regions theory: − State-based regions − Language-based regions All about discovering places! PAGE 32
  • 34. State-based regions: Two step approach d e [a,e] [a,d,e] [ a,b] a b [] [a] c c b d [a,c] [a,b,c] [a,b,c,d] b a p1 e p3 d start end p2 c p4 PAGE 33
  • 35. Example region a enters, b and e exit, c and d do not cross d e [a,e] [a,d,e] [ a,b] a b [] [a] c c b d [a,c] [a,b,c] [a,b,c,d] b a p1 e p3 d start end p2 c p4 PAGE 34
  • 36. Language-based regions A place is feasible if it can be added without disabling any of the traces in the event log. R PAGE 35
  • 37. Conformance checking supports/ controls business processes people machines components organizations records events, e.g., messages, specifies transactions, models configures etc. analyzes implements analyzes discovery enhancement PAGE 36
  • 38. Four models, one log N1 b examine thoroughly g p1 p3 pay c compensation a examine e start register casually decide p5 end request h p2 d p4 reject check ticket request f reinitiate request PAGE 37
  • 40. Replaying (1/7) σ1 on N1 p’ = p+1 p = produced c = consumed m = missing ≤ c r = remaining ≤ p PAGE 39
  • 41. Replaying (2/7) σ1 on N1 p’ = p+2 c’ = c+1 PAGE 40
  • 42. Replaying (3/7) σ1 on N1 p’ = p+1 c’ = c+1 PAGE 41
  • 43. Replaying (4/7) σ1 on N1 p’ = p+1 c’ = c+1 PAGE 42
  • 44. Replaying (5/7) σ1 on N1 p’ = p+1 c’ = c+2 PAGE 43
  • 45. Replaying (6/7) σ1 on N1 p’ = p+1 c’ = c+1 PAGE 44
  • 46. Replaying (7/7) σ1 on N1 p=7 p=7 c=6 c=7 m=0 m=0 r=0 r=0 p1 p3 start p5 end c’ = c+1 p2 p4 m=0 r=0 no problems encountered PAGE 45
  • 47. Replaying (1/7) σ3 on N2 p’ = p+1 p = produced c = consumed m = missing ≤ c r = remaining ≤ p PAGE 46
  • 48. Replaying (2/7) σ3 on N2 p’ = p+1 c’ = c+1 PAGE 47
  • 49. Replaying (3/7) σ3 on N2 p’ = p+1 c’ = c+1 m’ = m+1 PAGE 48
  • 50. Replaying (4/7) σ3 on N2 p’ = p+1 c’ = c+1 PAGE 49
  • 51. Replaying (5/7) σ3 on N2 p’ = p+1 c’ = c+1 PAGE 50
  • 52. Replaying (6/7) σ3 on N2 p’ = p+1 c’ = c+1 PAGE 51
  • 53. Replaying (7/7) σ3 on N2 r’ = r+1 c’ = c+1 Problems: • m = 1 : d was forced to occur without being enabled • r = 1 : output of c was not used by d PAGE 52
  • 54. Computing fitness at trace level PAGE 53
  • 55. Computing fitness at the log level PAGE 54
  • 56. Example values N1 b examine thoroughly g p1 p3 pay c compensation a examine e start register casually decide p5 end request h p2 d p4 reject check ticket request f reinitiate request PAGE 55
  • 57. Diagnostics problem problem 430 tokens remain in place p1, 566 tokens were missing in because c did not happen while place p3 during replay, the model expected c to happen because e happened while this was not possible according to the model problem 10 tokens were missing in place p1 during replay, because c happened while this was not possible according to the model 971 971 1391 1537 +430 1391 -10 c -566 1537 930 930 p1 examine p3 casually a e +607 h -461 start register decide p5 reject end request request -146 d 1537 p2 check p4 1391 ticket 1537 1537 problem problem 146 tokens were missing in problem 461 of the 1391 place p2 during replay, because 607 tokens remain in place p5, cases did not d happened while this was not because h did not happen while reach place end possible according to the model the model expected h to happen PAGE 56
  • 58. Challenges related to conformance checking • Not as simple as it seems! • In case of duplicate tasks (two transition with the same label) or silent tasks (τ labeled transitions), multiple paths need to be considered (state space analysis, heuristics, or optimization). • More general formulation of the problem with costs associated to skipping/inserting particular tasks, see ProM latest conformance checker (A* algorithm). • Computing the most likely alignment is needed for other types of process mining (time analysis, measuring precision, social network analysis, etc.). PAGE 57
  • 59. How can process mining help? • Detect bottlenecks • Provide mirror • Detect deviations • Highlight important • Performance problems measurement • Avoid ICT failures • Suggest improvements • Avoid management by • Decision support (e.g., PowerPoint recommendation and • From “politics” to prediction) “analytics” PAGE 58
  • 61. Example of a Lasagna process: WMO process of a Dutch municipality Each line corresponds to one of the 528 requests that were handled in the period from 4-1-2009 until 28-2-2010. In total there are 5498 events represented as dots. The mean time needed to handled a case is approximately 25 days. PAGE 60
  • 62. WMO process (Wet Maatschappelijke Ondersteuning) • WMO refers to the social support act that came into force in The Netherlands on January 1st, 2007. • The aim of this act is to assist people with disabilities and impairments. Under the act, local authorities are required to give support to those who need it, e.g., household help, providing wheelchairs and scootmobiles, and adaptations to homes. • There are different processes for the different kinds of help. We focus on the process for handling requests for household help. • In a period of about one year, 528 requests for household WMO support were received. • These 528 requests generated 5498 events. PAGE 61
  • 63. C-net discovered using heuristic miner (1/3) PAGE 62
  • 64. C-net discovered using heuristic miner (2/3) PAGE 63
  • 65. C-net discovered using heuristic miner (3/3) PAGE 64
  • 66. Conformance check WMO process (1/3) PAGE 65
  • 67. Conformance check WMO process (2/3) PAGE 66
  • 68. Conformance check WMO process (3/3) The fitness of the discovered process is 0.99521667. Of the 528 cases, 496 cases fit perfectly whereas for 32 cases there are missing or remaining tokens. PAGE 67
  • 69. Bottleneck analysis WMO process (1/3) PAGE 68
  • 70. Bottleneck analysis WMO process (2/3) PAGE 69
  • 71. Bottleneck analysis WMO process (3/3) flow time of approx. 25 days with a standard deviation of approx. 28 PAGE 70
  • 72. Two additional Lasagna processes RWS (“Rijkswaterstaat”) process WOZ (“Waardering Onroerende Zaken”) process PAGE 71
  • 73. RWS Process • The Dutch national public works department, called “Rijkswaterstaat” (RWS), has twelve provincial offices. We analyzed the handling of invoices in one of these offices. • The office employs about 1,000 civil servants and is primarily responsible for the construction and maintenance of the road and water infrastructure in its province. • To perform its functions, the RWS office subcontracts various parties such as road construction companies, cleaning companies, and environmental bureaus. Also, it purchases services and products to support its construction, maintenance, and administrative activities. PAGE 72
  • 74. C-net discovered using heuristic miner PAGE 73
  • 75. Social network constructed based on handovers of work Each of the 271 nodes corresponds to a civil servant. Two civil servants are connected if one executed an activity causally following an activity executed by the other civil servant PAGE 74
  • 76. Social network consisting of civil servants that executed more than 2000 activities in a 9 month period. The darker arcs indicate the strongest relationships in the social network. Nodes having the same color belong to the same clique. PAGE 75
  • 77. WOZ process • Event log containing information about 745 objections against the so-called WOZ (“Waardering Onroerende Zaken”) valuation. • Dutch municipalities need to estimate the value of houses and apartments. The WOZ value is used as a basis for determining the real-estate property tax. • The higher the WOZ value, the more tax the owner needs to pay. Therefore, there are many objections (i.e., appeals) of citizens that assert that the WOZ value is too high. • “WOZ process” discovered for another municipality (i.e., different from the one for which we analyzed the WMO process). PAGE 76
  • 78. Discovered process model The log contains events related to 745 objections against the so-called WOZ valuation. These 745 objections generated 9583 events. There are 13 activities. For 12 of these activities both start and complete events are recorded. Hence, the WF-net has PAGE 77 25 transitions.
  • 79. Conformance checker: (fitness is 0.98876214) PAGE 78
  • 83. Example of a Spaghetti process Spaghetti process describing the diagnosis and treatment of 2765 patients in a Dutch hospital. The process model was constructed based on an event log containing 114,592 events. There are 619 different activities (taking event types into account) executed by 266 different individuals (doctors, nurses, etc.). PAGE 82
  • 84. Fragment 18 activities of the 619 activities (2.9%) PAGE 83
  • 85. Another example (event log of Dutch housing agency) The event log contains 208 cases that generated 5987 events. There are 74 different activities. PAGE 84
  • 87. Conclusion • Many concurrency-related BPM challenges. • Process leave traces in event logs. So, if you are interested in processes, use them! • Process mining: challenging and highly relevant. • Process discovery challenge − balancing between different objectives − only example behavior • Conformance checking challenge − finding the most likely trace − dealing with silent/duplicate steps • Eldorado for exciting concurrency research! PAGE 86