Automated discovery of process models from event logs: Review and benchmark

A Augusto, R Conforti, M Dumas… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Process mining allows analysts to exploit logs of historical executions of business processes
to extract insights regarding the actual performance of these processes. One of the most …

Conformance checking: a state-of-the-art literature review

S Dunzer, M Stierle, M Matzner, S Baier - Proceedings of the 11th …, 2019 - dl.acm.org
Conformance checking is a set of process mining functions that compare process instances
with a given process model. It identifies deviations between the process instances' actual …

Conformance checking

J Carmona, B van Dongen, A Solti… - … : Springer.[Google Scholar], 2018 - Springer
A model is an artefact to represent a specific concept. It maps properties of the concept into
some abstract representation, driven by the purpose of the model. As such, models …

Discovering block-structured process models from event logs containing infrequent behaviour

SJJ Leemans, D Fahland… - … Workshops: BPM 2013 …, 2014 - Springer
Given an event log describing observed behaviour, process discovery aims to find a process
model that 'best'describes this behaviour. A large variety of process discovery algorithms …

Filtering out infrequent behavior from business process event logs

R Conforti, M La Rosa… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In the era of “big data”, one of the key challenges is to analyze large amounts of data
collected in meaningful and scalable ways. The field of process mining is concerned with the …

Decomposing Petri nets for process mining: A generic approach

WMP Van der Aalst - Distributed and Parallel Databases, 2013 - Springer
The practical relevance of process mining is increasing as more and more event data
become available. Process mining techniques aim to discover, monitor and improve real …

Scalable process discovery and conformance checking

SJJ Leemans, D Fahland… - Software & Systems …, 2018 - Springer
Considerable amounts of data, including process events, are collected and stored by
organisations nowadays. Discovering a process model from such event data and verification …

[HTML][HTML] Reducing false positives in fraud detection: Combining the red flag approach with process mining

G Baader, H Krcmar - International Journal of Accounting Information …, 2018 - Elsevier
Fraud detection often includes analyzing large datasets of enterprise resource planning
systems to locate irregularities. Analysis of the datasets often results in a large number of …

Measuring precision of modeled behavior

A Adriansyah, J Munoz-Gama, J Carmona… - Information systems and …, 2015 - Springer
Conformance checking techniques compare observed behavior (ie, event logs) with
modeled behavior for a variety of reasons. For example, discrepancies between a normative …

Model repair—aligning process models to reality

D Fahland, WMP Van Der Aalst - Information Systems, 2015 - Elsevier
Process mining techniques relate observed behavior (ie, event logs) to modeled behavior
(eg, a BPMN model or a Petri net). Process models can be discovered from event logs and …