2010
DOI: 10.1016/j.datak.2010.06.001
|View full text |Cite
|
Sign up to set email alerts
|

Mining process models with prime invisible tasks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
80
0
5

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 112 publications
(85 citation statements)
references
References 74 publications
0
80
0
5
Order By: Relevance
“…It examines causal relationships between tasks: for example, one specific task might always precede another specific task in every execution trace. An extension of the mining capacity of the α-algorithm to the detection of "prime invisible tasks" from an event log has been proposed with the α # algorithm [58], which tries to identify dependencies between tasks reflecting those used for routing purposes that exist only in a process model but are not recorded in its event log.…”
Section: Related Workmentioning
confidence: 99%
“…It examines causal relationships between tasks: for example, one specific task might always precede another specific task in every execution trace. An extension of the mining capacity of the α-algorithm to the detection of "prime invisible tasks" from an event log has been proposed with the α # algorithm [58], which tries to identify dependencies between tasks reflecting those used for routing purposes that exist only in a process model but are not recorded in its event log.…”
Section: Related Workmentioning
confidence: 99%
“…From [52] onwards, many techniques have been proposed. The α-algorithm [54] and its extensions α ++ [55], α # [56], and α $ [57] are algorithmic solutions that exploit behavioural relations between pairs of activities to discover a procedural process model from an event log. Differently from the declarative constraints of Declare, such relations are mutually exclusive: Since they do not overlap, they are by construction nonredundant.…”
Section: Related Workmentioning
confidence: 99%
“…A lot of research has been done on mining of process models from event log data [1,5,8,36,47,48]. An early work that relied on the activity logs for producing formal process models corresponding to actual process execution is given in [5].…”
Section: Related Workmentioning
confidence: 99%
“…Results show its usefulness in activities such as process model discovery, re-engineering, software process improvement, etc. In [48], the focus is on detection of invisible tasks from event logs. Their definition of invisible tasks is tasks that exist in a process model, but not in its event log (such as initialize, skip, switch, redo, etc.).…”
Section: Related Workmentioning
confidence: 99%