2016
DOI: 10.1007/978-3-319-49130-1_16
|View full text |Cite
|
Sign up to set email alerts
|

Abducing Compliance of Incomplete Event Logs

Abstract: The capability to store data about business processes execution in so-called Event Logs has brought to the diffusion of tools for the analysis of process executions and for the assessment of the goodness of a process model. Nonetheless, these tools are often very rigid in dealing with with Event Logs that include incomplete information about the process execution. Thus, while the ability of handling incomplete event data is one of the challenges mentioned in the process mining manifesto, the evaluation of comp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2

Relationship

3
3

Authors

Journals

citations
Cited by 8 publications
(12 citation statements)
references
References 27 publications
0
12
0
Order By: Relevance
“…The reader might wonder the impact of the syntactic conditions to be met to ensure unchained specifications. In previous works we discussed how different process modelling languages can be expressed formally in SCIFF: for example, DecSerFlow was addressed in [67]; in [66] a further declarative language for business process, CLIMB, was introduced; in [61,14] we focused on procedural languages for workflows. These languages have been all equipped with SCIFF unchained specifications, thus ensuring the compositionality.…”
Section: Partitioning Methodologymentioning
confidence: 99%
See 3 more Smart Citations
“…The reader might wonder the impact of the syntactic conditions to be met to ensure unchained specifications. In previous works we discussed how different process modelling languages can be expressed formally in SCIFF: for example, DecSerFlow was addressed in [67]; in [66] a further declarative language for business process, CLIMB, was introduced; in [61,14] we focused on procedural languages for workflows. These languages have been all equipped with SCIFF unchained specifications, thus ensuring the compositionality.…”
Section: Partitioning Methodologymentioning
confidence: 99%
“…In Section 1, we introduced the expressiveness of the modelling language and scalability of the overall architecture as two important requirements for any BPM monitoring architecture. In this work, we adopt the SCIFF framework for covering the former requirement: in previous articles we showed that SCIFF is expressive enough to represent well-known formalisms, declarative [7, 13] as well as procedural [61,14] ones. The latter requirement is covered through the adoption of a distributed platform for big data analytics and the application of a parallelisation method.…”
Section: Overview Of the System Architecture And Backgroundmentioning
confidence: 99%
See 2 more Smart Citations
“…In previous works [22,24], we adopted an Artificial Intelligence technique, namely abduction, to complete partial logs, and introduced a (novel) notion of weak compliance of incomplete process instances w.r.t. a procedural model.…”
Section: Introductionmentioning
confidence: 99%