Skip to main content

Mining Invisible Tasks from Event Logs

  • Conference paper
Advances in Data and Web Management (APWeb 2007, WAIM 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4505))

Abstract

Most existing process mining algorithms have problems in dealing with invisible tasks. In this paper, a new process mining algorithm named α # is proposed, which extends the mining capacity of the classical α algorithm by supporting the detection of invisible tasks from event logs. Invisible tasks are first divided into four types according to their functional features, i.e., SIDE, SKIP, REDO and SWITCH. After that, the new ordering relation for detecting mendacious dependencies between tasks that reflects invisible tasks is introduced. Then the construction algorithms for invisible tasks of SIDE and SKIP/REDO/ SWITCH types are proposed respectively. Finally, the α # algorithm constructs the mined process models incorporating invisible tasks in WF-net. A lot of experiments are done to evaluate the mining quality of the proposed α # algorithm and the results are promising.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cook, J.E., Du, Z.D., Liu, C.B., Wolf, A.L.: Discovering models of behavior for concurrent workflows. Computers in Industry 53(3), 297–319 (2004)

    Article  Google Scholar 

  2. de Medeiros, A.K.A., van Dongen, B.F., van der Aalst, W.M.P., Weijters, A.J.M.M.: Process Mining for Ubiquitous Mobile Systems: An Overview and a Concrete Algorithm. In: Baresi, L., Dustdar, S., Gall, H.C., Matera, M. (eds.) UMICS 2004. LNCS, vol. 3272, pp. 151–165. Springer, Heidelberg (2004)

    Google Scholar 

  3. Herbst, J., Karagiannis, D.: Workflow Mining with InWoLvE. Computers in Industry 53(3), 245–264 (2004)

    Article  Google Scholar 

  4. Huang, X.Q., Wang, L.F., Zhao, W., Zhang, S.K., Yuan, C.Y.: A workflow process mining algorithm based on synchro-net. Journal of Computer Science and Technology 21(1), 66–71 (2006)

    Article  Google Scholar 

  5. Maruster, L., Weijters, A.J.M.M., van der Aalst, W.M.P., van der Bosch, A.: A Rule-Based Approach for Process Discovery: Dealing with Noise and Imbalance in Process Logs. Data Mining and Knowledge Discovery 13(1), 67–87 (2006)

    Article  MathSciNet  Google Scholar 

  6. Rozinat, A., van der Aalst, W.M.P.: Decision Mining in Business Processes. BETA Working Paper Series, WP 164, Eindhoven University of Technology (2006)

    Google Scholar 

  7. van der Aalst, W.M.P., de Medeiros, A.K.A., Weijters, A.J.M.M.: Genetic Process Mining. In: Ciardo, G., Darondeau, P. (eds.) ICATPN 2005. LNCS, vol. 3536, pp. 48–69. Springer, Heidelberg (2005)

    Google Scholar 

  8. van der Aalst, W.M.P., van Dongen, B.F.: Discovering Workflow Performance Models from Timed Logs. In: Han, Y., Tai, S., Wikarski, D. (eds.) EDCIS 2002. LNCS, vol. 2480, pp. 45–63. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  9. van der Aalst, W.M.P., van Dongen, B.F., Herbst, J., Maruster, L., Schimm, G., Weijters, A.J.M.M.: Workflow Mining: A Survey of Issues and Approaches. Data and Knowledge Engineering 47(2), 237–267 (2003)

    Article  Google Scholar 

  10. van der Aalst, W.M.P., Weijters, A.J.M.M.: Process Mining: A Research Agenda. Computers in Industry 53(3), 231–244 (2004)

    Article  Google Scholar 

  11. van der Aalst, W.M.P., Weijters, A.J.M.M., Maruster, L.: Workflow Mining: Discovering Process Models from Event Logs. IEEE Transactions on Knowledge and Data Engineering 16(9), 1128–1142 (2004)

    Article  Google Scholar 

  12. Wen, L., Wang, J., Sun, J.: Detecting Implicit Dependencies Between Tasks from Event Logs. In: Zhou, X., Li, J., Shen, H.T., Kitsuregawa, M., Zhang, Y., et al. (eds.) APWeb 2006. LNCS, vol. 3841, pp. 591–603. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Guozhu Dong Xuemin Lin Wei Wang Yun Yang Jeffrey Xu Yu

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Wen, L., Wang, J., Sun, J. (2007). Mining Invisible Tasks from Event Logs. In: Dong, G., Lin, X., Wang, W., Yang, Y., Yu, J.X. (eds) Advances in Data and Web Management. APWeb WAIM 2007 2007. Lecture Notes in Computer Science, vol 4505. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72524-4_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72524-4_38

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72483-4

  • Online ISBN: 978-3-540-72524-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics