Abducing Compliance of Incomplete Event Logs

by   Federico Chesani, et al.
University of Bologna
Free University of Bozen-Bolzano
Fondazione Bruno Kessler

The capability to store data about business processes execution in so-called Event Logs has brought to the diffusion of tools for the analysis of process executions and for the assessment of the goodness of a process model. Nonetheless, these tools are often very rigid in dealing with with Event Logs that include incomplete information about the process execution. Thus, while the ability of handling incomplete event data is one of the challenges mentioned in the process mining manifesto, the evaluation of compliance of an execution trace still requires an end-to-end complete trace to be performed. This paper exploits the power of abduction to provide a flexible, yet computationally effective, framework to deal with different forms of incompleteness in an Event Log. Moreover it proposes a refinement of the classical notion of compliance into strong and conditional compliance to take into account incomplete logs. Finally, performances evaluation in an experimental setting shows the feasibility of the presented approach.


page 1

page 2

page 3

page 4


Efficient Checking of Temporal Compliance Rules Over Business Process Event Logs

Verifying temporal compliance rules, such as a rule stating that an inqu...

Efficient Checking of Timed Order Compliance Rules over Graph-encoded Event Logs

Validation of compliance rules against process data is a fundamental fun...

Quantifying the Re-identification Risk of Event Logs for Process Mining

Event logs recorded during the execution of business processes constitut...

Exploring Business Process Deviance with Sequential and Declarative Patterns

Business process deviance refers to the phenomenon whereby a subset of t...

Selecting Optimal Trace Clustering Pipelines with AutoML

Trace clustering has been extensively used to preprocess event logs. By ...

Continuous Compliance using Calculated Event Log Layers

Compliance has traditionally been a reactive activity, where directives ...

Case Level Counterfactual Reasoning in Process Mining

Process mining is widely used to diagnose processes and uncover performa...

Please sign up or login with your details

Forgot password? Click here to reset