2019
DOI: 10.1007/978-3-030-33223-5_12
|View full text |Cite
|
Sign up to set email alerts
|

A Probabilistic Approach to Event-Case Correlation for Process Mining

Abstract: Process mining aims to understand the actual behavior and performance of business processes from event logs recorded by IT systems. A key requirement is that every event in the log must be associated with a unique case identifier (e.g., the order ID in an order-to-cash process). In reality, however, this case ID may not always be present, especially when logs are acquired from different systems or when such systems have not been explicitly designed to offer process-tracking capabilities. Existing techniques fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
22
0
1

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 21 publications
(23 citation statements)
references
References 19 publications
0
22
0
1
Order By: Relevance
“…The problem of UI log segmentation is also related to that of correlating uncorrelated events in event logs used for process mining (Bayomie et al 2019(Bayomie et al , 2016Ferreira and Gillblad 2009). However, this problem has been addressed in restrictive settings.…”
Section: Challenges and Guidelinesmentioning
confidence: 99%
See 2 more Smart Citations
“…The problem of UI log segmentation is also related to that of correlating uncorrelated events in event logs used for process mining (Bayomie et al 2019(Bayomie et al , 2016Ferreira and Gillblad 2009). However, this problem has been addressed in restrictive settings.…”
Section: Challenges and Guidelinesmentioning
confidence: 99%
“…However, this problem has been addressed in restrictive settings. In particular, Ferreira and Gillblad (2009) addressed the problem when the process (in our case the routine) does not have cycles/repetitions, whereas (Bayomie et al 2016(Bayomie et al , 2019 assume that a process model is given as input, which means that the the routine specification is known. Also, the approaches in Ferreira and Gillblad (2009) and Bayomie et al (2016) were shown to produce rather inaccurate results, whereas RPM seeks to identify routines with high levels of confidence, given that replicating a routine inaccurately can lead to costly errors, especially in contexts where unattended bots are used.…”
Section: Challenges and Guidelinesmentioning
confidence: 99%
See 1 more Smart Citation
“…Even if more focused on traditional business processes in BPM rather than on RPA routines, Bayomie et al [8] address the problem of correlating uncorrelated event logs in process mining in which they assume the model of the routine is known. Since event logs allow to store traces of one process model only, as a consequence this technique is able to achieve Case 1.1 only.…”
Section: Assessing the Segmentation Approachesmentioning
confidence: 99%
“…In the field of process discovery, Mȃruşter et al [27] propose an empirical method for inducing rule sets from event logs containing execution of one process only. Therefore, as in [8], this method is able to achieve Case 1.1 only, thus making the technique ineffective in presence of interleaved and shared user actions. A more robust approach, developed by Fazzinga et al [12], employs predefined behavioural models to establish which process activities belong to which process model.…”
Section: Assessing the Segmentation Approachesmentioning
confidence: 99%