Exploiting Inductive Logic Programming Techniques for Declarative Process Mining
read more
Citations
Declarative specification and verification of service choreographiess
User-guided discovery of declarative process models
On the Discovery of Declarative Control Flows for Artful Processes
Discovering data-aware declarative process models from event logs
Online Discovery of Declarative Process Models from Event Streams
References
A Machine-Oriented Logic Based on the Resolution Principle
Negation as failure
Workflow mining: discovering process models from event logs
Inductive Logic Programming : Theory and Methods
Constraint logic programming : A survey
Related Papers (5)
Frequently Asked Questions (18)
Q2. What future works have the authors mentioned in the paper "Exploiting inductive logic programming techniques for declarative process mining" ?
In the future, the authors plan to apply DecMiner to university students ’ careers, where positive traces are careers of students that graduated on time, and negative ones are careers of students who did not finish their studies in the prescribed time. Moreover, the authors plan to investigate the development of a mining-checking cycle, in which learning is interleaved with classification of traces into positive or negative either manually by the user or automatically using the SCIFF Checker plug-in with a user specified model.
Q3. What is the generality order used for a clause?
The generality order that is used is θ-subsumption [19], a relationships between two clauses that can be checked syntactically and is stronger than implications.
Q4. What is the function that performs the covering loop?
In it, a function named Inductive-Constraint-Logic performs a covering loop in which negative interpretations are progressively ruled out and removed from the set N .
Q5. What are the main constraints in the SCIFF?
They are mainly organized into three basic groups: (i) existence constraints, unary relationships constraining the cardinality of activity executions; (ii) relation constraints, positive relationships between two activities used to specify what should be executed when a given situation holds; (iii) negation constraints, the negated version of relation ones, imposed to forbid the execution of a certain activity when a given situation holds.
Q6. What is the advantage of mining ConDec constraints through SCIFF?
An advantage of mining ConDec constraints through SCIFF is that the approach can be extended to induce constraints involving more than two activities, for example constraints having a conjunction of preconditions or a disjunction of postconditions, and constraints with conditions over data.
Q7. What are the activities that are represented by the billings for each service?
Activities room service, laundry service, and massage service log which services have been accessed to by the client, while billings for each service are represented by corresponding activities.
Q8. What is the approach for learning process models of [9]?
The approach for learning process models of [9] involves iterating planning and operator refinement: given the current definition of the pre-conditions and post-conditions of the activities, a plan for achieving the business goal is generated and presented to the user which has to specify whether each activity of the plan can be executed.
Q9. What is the effect of the learning of ConDec models?
They influence the accuracy of the learned model because an activity relation discriminating between compliant and non-compliant execution traces cannot be learned if the appropriate template and/or activities were not chosen.
Q10. What is the importance of a declarative style of modeling?
The importance of adopting a declarative style of modeling has been recently pointed out by van der Aalst and Pesic [18]: the authors agree with their claim that declarative languages fit better complex, unpredictable processes, where a good balance between support and flexibility is of key importance.
Q11. What are the constraints that the authors learn from them?
From them the authors learn a set of declarative constraints expressed as SCIFF rules able to accurately classify a new trace, and corresponding to a ConDec model.
Q12. What is the purpose of the proposed approach?
In order to avoid asking the user to classify activities, [10] proposed an approach for automatically generating negative events, i.e., events that are used as negative examples.
Q13. What is the main purpose of DecMiner?
DecMiner implements all the data preparation and learning phases of the mining process described above and guides the user by means of its graphical user interface.
Q14. What is the first phase of the learning approach?
In the third phase, named “Templates”, the user uses the graphical interface shown in Figure 4 to choose the set of existence, relation and negation ConDec templates to be used in the mining phase.
Q15. How can the authors apply an algorithm similar to ICL for learning ICs?
If the authors define a generality order and a generalization operator for ICs, the authors can apply an algorithm similar to ICL for learning ICs.
Q16. Why do the authors differ from these works?
The authors differ from these works because the authors use a representation that is declarative rather than procedural, without sacrificing expressiveness.
Q17. What is the relation between BPM and the field of planning in artificial intelligence?
[9] related BPM to the field of planning in artificial intelligence: activities in business process are seen as planning operators with pre-conditions and postconditions.
Q18. How did the authors study the robustness of DecMiner to noise?
The authors also investigated the robustness of DecMiner to noise in the classification of traces: the authors repeated the experiments by considering training sets with an increasing portion of misclassified examples.