2016
DOI: 10.1515/jee-2016-0016
|View full text |Cite
|
Sign up to set email alerts
|

Discovering Block–Structured Parallel Process Models from Causally Complete Event Logs

Abstract: α -algorithm is suitable to discover a large class of workflow (WF) nets based on the behaviour recorded in event logs, with the main limiting assumption that the event log is complete. Our research has been aimed at finding ways of discovering business process models based on examples of traces, ie, logs of workflow actions that do not meet the requirement of completeness. In this aim, we have modified the existing and introduced a new relation between activities recorded in the event log, which has led to a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(17 citation statements)
references
References 17 publications
0
17
0
Order By: Relevance
“…Besides defining weakly complete event logs, this paper will present the results of experimental analysis carried out on examples of real business processes with the goal to discover the size of weakly complete event logs for observed processes expressed in the number of traces. The obtained results will be compared to the results of the experimental analysis carried out for the same processes on complete and causally complete event logs, which is presented in detail in [5]. In that way we will be able to show the improvement we made on weakly complete event logs in comparison to causally complete event logs [5] in regard of obtaining the valid model of parallel business processes based on the least possible number of traces from the event logs.…”
Section: Introductionmentioning
confidence: 93%
See 3 more Smart Citations
“…Besides defining weakly complete event logs, this paper will present the results of experimental analysis carried out on examples of real business processes with the goal to discover the size of weakly complete event logs for observed processes expressed in the number of traces. The obtained results will be compared to the results of the experimental analysis carried out for the same processes on complete and causally complete event logs, which is presented in detail in [5]. In that way we will be able to show the improvement we made on weakly complete event logs in comparison to causally complete event logs [5] in regard of obtaining the valid model of parallel business processes based on the least possible number of traces from the event logs.…”
Section: Introductionmentioning
confidence: 93%
“…The obtained results will be compared to the results of the experimental analysis carried out for the same processes on complete and causally complete event logs, which is presented in detail in [5]. In that way we will be able to show the improvement we made on weakly complete event logs in comparison to causally complete event logs [5] in regard of obtaining the valid model of parallel business processes based on the least possible number of traces from the event logs.…”
Section: Introductionmentioning
confidence: 93%
See 2 more Smart Citations
“…This section first reviews the concepts and notions of sequence [21]- [24], multi-set [25], [26], trace [27], [28], event log [29]- [31], Petri net [32]- [43], and indirect dependency [5]. Petri net can be used not only for modeling [41]- [43], but also for cycle-time analysis [32], resource management [33]- [35], detecting errors [36], and service net analysis [39].…”
Section: Preliminariesmentioning
confidence: 99%