Presentations 2012

Process Mining Making Sense of Processes Hidden in Big Event Data

Wil van der Aalst

EIS Colloquium, TU/e, Eindhoven, The Netherlands, December 2012

Abstract

The two most prominent process mining tasks are process discovery (i.e., learning a process model from an event log) and conformance checking (i.e., diagnosing and quantifying differences between observed and modeled behavior). The increasing availability of event data makes these tasks highly relevant for process analysis and improvement. Therefore, process mining is considered to be one of the key technologies for Business Process Management (BPM). In recent years, we have applied process mining in over 100 organizations. However, as event logs and process models grow, process mining becomes more challenging. Therefore, we propose a fully generic approach to decompose process mining problems into smaller problems that can be analyzed more efficiently. As shown, process discovery and conformance checking can be done per process fragment and the results can be aggregated. This has advantages in terms of efficiency and diagnostics.

Links
Passages in Big Data: Partitioning Event Logs and Process Models to Speed Up Process Mining Algorithms

Wil van der Aalst

Petri Nets 2012, Hamburg, Germany, June 2012.

Abstract

Process discovery (discovering a process model from example behavior recorded in an event log) is one of the most challenging tasks in process mining. Discovery approaches need to deal with competing quality criteria such as fitness, simplicity, precision, and generalization. Moreover, event logs may contain low frequent behavior and tend to be far from complete (i.e., typically only a fraction of the possible behavior is recorded). At the same time, models need to have formal semantics in order to reason about their quality. These complications explain why dozens of process discovery approaches have been proposed in recent years. Most of these approaches are time-consuming and/or produce poor quality models. In fact, simply checking the quality of a model is already computationally challenging.

This talk shows that process mining problems can be decomposed into a set of smaller problems after determining the so-called causal structure. Given a causal structure, we partition the activities over a collection of passages. Conformance checking and discovery can be done per passage. The decomposition of the process mining problems has two advantages. First of all, the problem can be distributed over a network of computers. Second, due to the exponential nature of most process mining algorithms, decomposition can significantly reduce computation time (even on a single computer). As a result, conformance checking and process discovery can be done much more efficiently.

Links
Process Mining: How are my systems used and when do they fail?

Wil van der Aalst

Bits&Chips 2012 Embedded Systems, 's-Hertogenbosch, The Netherlands, November 2012

Abstract

The amounts of data that (embedded) systems are recording are rapidly increasing. The explosion of data happens in a pace that is unprecedented and in our networked world of today the trend is even accelerating. Companies have transactional data with trillions of bytes of event data generated by systems in the field, production systems, customers and suppliers. Sensors in smart devices generate unparalleled amounts of sensor data. Social media sites and mobile phones have allowed billions of individuals globally to create their own enormous trails of data. Process mining is a relative young research discipline that sits between machine learning and data mining on the one hand and process modeling and analysis on the other. The challenge in process mining is to discover, monitor and improve real processes (i.e. not assumed processes) by extracting knowledge from event logs readily available in today’s systems. Event logs can be used to conduct three types of process mining. The first and most prominent is discovery. A discovery technique takes an event log and produces a model without using a priori information. The second type is conformance where an existing process model is compared with an event log of the same process. Conformance checking can be used to check if reality, as recorded in the log, conforms to the model and vice versa. The third type is enhancement, where the idea is to extend or improve an existing process model using information about the actual process recorded in an event log. These techniques can be used to discover how systems are being used in the field. Analysis can be explorative (finding out what really happens without analysing a particular problem) or targeted at understanding and solving a particular problem (e.g. system failures). Process mining has been used to diagnose problems in a broad range of organisations.

Links
Process Mining: Olifantenpaden in Assurance

Wil van der Aalst

Keynote Next Generation Assurance, NBA/NOREA Congress, Ermelo, The Netherlands, November 2012.

Decomposed Process Mining: The ILP Case

H.M.W. Verbeek, W.M.P. van der Aalst, Decomposed Process Mining: The ILP Case. In Business Process Intelligence 2014, Haifa, Israel, Eindhoven, the Netherlands.

Overview BPM/Process Mining Related AIS Research 2012

Wil van der Aalst

Tsinghua University, August 2012 (Slides provide pointers to recent AIS work.)

On the Role of Fitness, Precision, Generalization and Simplicity in Process Discovery

Wil van der Aalst

20th International Conference on Cooperative Information Systems (CoopIS 2012), Rome, Italy, September 2012.

ProM Workshop Hasselt, September 28, 2012

B.F. van Dongen, A. Adriansyah, H.M.W. Verbeek

Distributed Process Discovery and Conformance Checking

Wil van der Aalst

Invited Lecture European Joint Conferences on Theory and Practice of Software (ETAPS), Fundamental Approaches to Software Engineering (FASE 2012), Tallinn, Estonia, March 2012.

Process Mining Auditing Based on Facts Rather than Fiction

Wil van der Aalst

SIKS Masterclass on Smart Auditing, Vught, The Netherlands, March 2012.