skip to main content
10.1145/3019612.3019660acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

A descriptive clustering approach to the analysis of quantitative business-process deviances

Published:03 April 2017Publication History

ABSTRACT

Increasing attention has been paid to the problem of explaining and analyzing "deviant cases" generated by a business process, i.e. instances of the process that diverged from prescribed/expected behavior (e.g. frauds, faults, SLA violations). In many real settings, such cases are labelled with a numerical deviance measure, and the analyst wants to obtain a fine grain unsupervised classification of them, which will help her recognize and explain different deviance scenarios. Unfortunately, current approaches rely on preliminary labelling all the cases, stored in some an execution log, as either deviant or non-deviant, and then inducing a rule-based classifier for discriminating among the two classes. By contrast, we here propose a method that discovers accurate and readable deviance-aware clusters (of cases) defined in terms of descriptive rules over both properties and behavioral aspects of the cases. Each cluster is also equipped with summary information that allows to derive effective distribution charts and a high-level process map, both emphasizing the distinctive features of the cluster. Tests on a real-life log confirmed the ability of the approach to find easily-interpretable clustering models capturing relevant deviance scenarios.

References

  1. M. Atzmueller. Subgroup discovery - advanced review. Wiley Int. Rev. Data Min. and Knowl. Disc., 5(1):35--49, Jan. 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. H. Blockeel, L. D. Raedt, and J. Ramon. Top-down induction of clustering trees. In Proc. of the 15th Int. Conf. on Machine Learning (ICML'98), pp. 55--63, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. P. J. C. Bose and W. M. P. van der Aalst. Discovering signature patterns from event logs. In IEEE Symp. on Comp. Intellig. and Data Mining (CIDM'13), pp. 111--118, 2013. Google ScholarGoogle ScholarCross RefCross Ref
  4. L. Breiman, J. H. Friedman, R. A. Olshen, and C. J. Stone. Classification and Regression Trees. Wadsworth, 1984.Google ScholarGoogle Scholar
  5. W. W. Cohen. Fast effective rule induction. In Proc. of 12th Int. Conf. on Machine Learn. (ICML'95), pp. 115--123, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. F. Folino, M. Guarascio, and L. Pontieri. Mining multi-variant process models from low-level logs. In Proc. of 18th Int. Conf. on Business Inf. Syst. (BIS'15), pp. 165--177, 2015. Google ScholarGoogle ScholarCross RefCross Ref
  7. A. A. Freitas. Comprehensible classification models: A position paper. SIGKDD Explor. Newsl., 15(1):1--10, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. G. Holmes, M. Hall, and E. Frank. Generating rule sets from model trees. In Proc. of 12th Australian Joint Conf. on Artificial Intelligence (AI'99), pp. 1--12, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Leeuwen and A. Knobbe. Diverse subgroup set discovery. Data Min. Knowl. Discov., 25(2):208--242, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Leontjeva, R. Conforti, C. D. Francescomarino, M. Dumas, and F. M. Maggi. Complex symbolic sequence encodings for predictive monitoring of business processes. In Proc of 13th Int. Conf. on Business Process Management (BPM'15), pp. 297--313, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. H. Nguyen, M. Dumas, M. L. Rosa, F. M. Maggi, and S. Suriadi. Mining business process deviance: A quest for accuracy. In In Proc. of OTM 2014, pp. 436--445, 2014. Google ScholarGoogle ScholarCross RefCross Ref
  12. W. Steeman. BPI challenge 2013, closed problems. 2013.Google ScholarGoogle Scholar
  13. H. M. W. Verbeek, J. C. A. M. Buijs, B. F. van Dongen, and W. M. P. van der Aalst. Xes, Xesame, and ProM 6. In Inf. Systems Evolution - CAiSE Forum 2010, pages 60--75, 2010.Google ScholarGoogle Scholar

Index Terms

  1. A descriptive clustering approach to the analysis of quantitative business-process deviances

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SAC '17: Proceedings of the Symposium on Applied Computing
        April 2017
        2004 pages
        ISBN:9781450344869
        DOI:10.1145/3019612

        Copyright © 2017 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 3 April 2017

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate1,650of6,669submissions,25%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader