Abducing Compliance of Incomplete Event Logs

06/17/2016
by   Federico Chesani, et al.
0

The capability to store data about business processes execution in so-called Event Logs has brought to the diffusion of tools for the analysis of process executions and for the assessment of the goodness of a process model. Nonetheless, these tools are often very rigid in dealing with with Event Logs that include incomplete information about the process execution. Thus, while the ability of handling incomplete event data is one of the challenges mentioned in the process mining manifesto, the evaluation of compliance of an execution trace still requires an end-to-end complete trace to be performed. This paper exploits the power of abduction to provide a flexible, yet computationally effective, framework to deal with different forms of incompleteness in an Event Log. Moreover it proposes a refinement of the classical notion of compliance into strong and conditional compliance to take into account incomplete logs. Finally, performances evaluation in an experimental setting shows the feasibility of the presented approach.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/08/2021

Efficient Checking of Temporal Compliance Rules Over Business Process Event Logs

Verifying temporal compliance rules, such as a rule stating that an inqu...
research
06/19/2022

Efficient Checking of Timed Order Compliance Rules over Graph-encoded Event Logs

Validation of compliance rules against process data is a fundamental fun...
research
03/24/2020

Quantifying the Re-identification Risk of Event Logs for Process Mining

Event logs recorded during the execution of business processes constitut...
research
11/24/2021

Exploring Business Process Deviance with Sequential and Declarative Patterns

Business process deviance refers to the phenomenon whereby a subset of t...
research
09/01/2021

Selecting Optimal Trace Clustering Pipelines with AutoML

Trace clustering has been extensively used to preprocess event logs. By ...
research
10/01/2021

Continuous Compliance using Calculated Event Log Layers

Compliance has traditionally been a reactive activity, where directives ...
research
02/25/2021

Case Level Counterfactual Reasoning in Process Mining

Process mining is widely used to diagnose processes and uncover performa...

Please sign up or login with your details

Forgot password? Click here to reset