Creating Translucent Event Logs to Improve Process Discovery

نویسندگان

چکیده

Abstract Event logs capture information about executed activities. However, they do not activities that could have been performed, i.e., were enabled during a process. containing on are called translucent event logs. Although it is possible to extract from running system, such rarely stored. To increase the availability of logs, we propose two techniques. The first technique records system’s states as snapshots. These snapshots stored and linked events. A user labels patterns describe parts state. By matching with snapshots, can add We apply our in small setting demonstrate its applicability. second uses process model concerning an existing traditional log. Data valuable for discovery. Using activities, discover more correct models.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intention-Oriented Process Model Discovery from Incident Management Event Logs

Intention-oriented process mining is based on the belief that the fundamental nature of processes is mostly intentional (unlike activity-oriented process) and aims at discovering strategy and intentional process models from event-logs recorded during the process enactment. In this paper, we present an application of intention-oriented process mining for the domain of incident management of an I...

متن کامل

Efficient Discovery of Understandable Declarative Process Models from Event Logs

Process mining techniques often reveal that real-life processes are more variable than anticipated. Although declarative process models are more suitable for less structured processes, most discovery techniques generate conventional procedural models. In this paper, we focus on discovering Declare models based on event logs. A Declare model is composed of temporal constraints. Despite the suita...

متن کامل

SecSy: Synthesizing Process Event Logs

One difficulty at developing mechanisms for business process security monitoring and auditing is the lack of representative, controllably generated test runs to serve as an evaluation basis. This paper presents an approach and the corresponding tool support for event log synthesis. The novelty is that it considers the activity of an “attacker” able to purposefully infringe security and complian...

متن کامل

Discovery of Functional Architectures From Event Logs

The functional architecture focuses on decomposing functionality into modules that offer certain features. These features require interactions in order to complete their functionality. However, functional architectures typically only focus on the static aspects of the system design. Additional modeling techniques, such as message sequence charts are often used in the early phases of software de...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture notes in business information processing

سال: 2023

ISSN: ['1865-1348', '1865-1356']

DOI: https://doi.org/10.1007/978-3-031-27815-0_32