A Region-Based Algorithm for Discovering Petri Nets from Event Logs
read more
Citations
Process Discovery using Integer Linear Programming
Decomposing Petri nets for process mining: A generic approach
A fresh look at precision in process conformance
Extracting Event Data from Databases to Unleash Process Mining
Process cubes : slicing, dicing, rolling up and drilling down event data for process mining
References
Kommunikation mit Automaten
Workflow mining: discovering process models from event logs
Workflow mining: a survey of issues and approaches
Process mining : a two-step approach to balance between underfitting and overfitting
Related Papers (5)
Frequently Asked Questions (10)
Q2. What is the basic idea of the bounded case?
In the bounded case, the basic idea is that regions are represented by multisets (i.e., a state might have multiplicity greater than one).
Q3. What are the main characteristics of the Petri net?
Bisimilarity or language equivalence are very restricting equivalence relations, not very useful for the area of Petri net mining where over-approximations of the initial event log are more valuable [4,19].
Q4. What is the flow relation of a Petri net?
A Petri net (PN) is a tuple (P, T, F, M0) where P and T represent finite sets of places and transitions, respectively, and F ⊆ (P × T ) ∪ (T × P ) is the flow relation.
Q5. What is the main focus of the research in process mining?
Since the nineties, the area of process mining has been focused in providing formal support to business information systems [16].
Q6. What is the synthesis of a safe PN?
The synthesis of a safe PN from the transition system applies many label splittings in order to enforce the excitation closure, deriving in a PN with 15 places, 34 transitions and 128 arcs.
Q7. What is the main contribution to the analysis of the process mining?
The main contribution is to allow the generation of overapproximations of the event log by means of a bounded Petri net, not necessarily safe.
Q8. What is the first item of Definition 2?
The relation π ⊆ (S1 × S2) defined as follows:s1πs2 ⇔ ∃ σ : sin1 σ→ s1 ∧ sin2 σ→ s2represents a simulation of TS1 by TS2: the first item of Definition 2 holds since L(TS1) ⊆ L(TS2).
Q9. What is the minimumity property of the log?
the techniques presented in this paper, as it happens also with traditional min-ing approaches like the α-algorithm [16], are less sensitive to variations in event logs, and will derive the same PN over the modified log.
Q10. What is the purpose of the paper?
The work presented in this paper aims at constructing (mining) a Petri net that covers the behavior observed in the event log, i.e. traces in the event logCarmona, J.; Cortadella, J.; Kishinevsky, M. A region-based algorithm for discovering Petri nets from event logs.