149 research outputs found

    Data from configuration management tools as sources for software process mining

    Get PDF
    Process mining has proven to be a valuable approach that provides new and objective insights into processes within organizations. Based on sets of well-structured data, the underlying ‘actual’ processes can be extracted and process models can be constructed automatically, i.e., the process model can be ‘mined’. Successful process mining depends on the availability of well-structured and suitable data. This paper investigates the potential of software configuration management (SCM) and SCM- tools for software process mining. In a validation section, data collected by a SCM tool in practice are used to apply process-mining techniques on a particular software process, i.e., a Change Control Board (CCB) process in a large industrial company. Application of process mining techniques revealed that although people tend to believe that formally specified and well-documented processes are followed, the ‘actual’ process in practice is different. Control-flow discovery revealed that in the CCB process in most of the cases, i.e., 70%, an important CCB task ‘Analysis’ was skipped

    Process equivalence in the context of genetic mining

    Get PDF
    In various application domains there is a desire to compare process models, e.g., to relate an organization-specific process model to a reference model, to find a web service matching some desired service description, or to compare some normative process model with a process model discovered using process mining techniques. Although many researchers have worked on different notions of equivalence (e.g., trace equivalence, bisimulation, branching bisimulation, etc.), most of the existing notions are not very useful in this context. First of all, most equivalence notions result in a binary answer (i.e., two processes are equivalent or not). This is not very helpful, because, in real-life applications, one needs to differentiate between slightly different models and completely different models. Second, not all parts of a process model are equally important. There may be parts of the process model that are rarely activated (i.e., "process veins") while other parts are executed for most process instances (i.e., the "process arteries"). Clearly, differences in some veins of a process are less important than differences in the main artery of a process. To address the problem, this paper proposes a completely new way of comparing process models. Rather than directly comparing two models, the process models are compared with respect to some typical behavior. This way, we are able to avoid the two problems just mentioned. The approach has been implemented and has been used in the context of genetic process mining. Although the results are presented in the context of Petri nets, the approach can be applied to any process modeling language with executable semantics

    Towards an evaluation framework for process mining algorithms

    Get PDF
    Although there has been a lot of progress in developing process mining algorithms in recent years, no effort has been put in developing a common means of assessing the quality of the models discovered by these algorithms. In this paper, we outline elements of an evaluation framework that is intended to enable (a) process mining researchers to compare the performance of their algorithms, and (b) end users to evaluate the validity of their process mining results. Furthermore, we describe two possible approaches to evaluate a discovered model (i) using existing comparison metrics that have been developed by the process mining research community, and (ii) based on the so-called k-fold-cross validation known from the machine learning community. To illustrate the application of these two approaches, we compared a set of models discovered by different algorithms based on a simple example log

    The need for a process mining evaluation framework in research and practice

    Get PDF
    Although there has been much progress in developing process mining algorithms in recent years, no effort has been put in developing a common means of assessing the quality of the models discovered by these algorithms. In this paper, we motivate the need for such an evaluation mechanism, and outline elements of an evaluation framework that is intended to enable (a) process mining researchers to compare the performance of their algorithms, and (b) end users to evaluate the validity of their process mining results

    ProM : the process mining toolkit

    Get PDF
    Nowadays, all kinds of information systems store detailed information in logs. Process mining has emerged as a way to analyze these systems based on these detailed logs. Unlike classical data mining, the focus of process mining is on processes. First, process mining allows us to extract a process model from an event log. Second, it allows us to detect discrepancies between a modeled process (as it was envisioned to be) and an event log (as it actually is). Third, it can enrich an existing model with knowledge derived from an event log. This paper presents our tool ProM, which is the world-leading tool in the area of process mining

    Integrating computer log files for process mining: a genetic algorithm inspired technique

    Get PDF
    Process mining techniques are applied to single computer log files. But many processes are supported by different software tools and are by consequence recorded into multiple log files. Therefore it would be interesting to find a way to automatically combine such a set of log files for one process. In this paper we describe a technique for merging log files based on a genetic algorithm. We show with a generated test case that this technique works and we give an extended overview of which research is needed to optimise and validate this technique
    • …
    corecore