Logo PTI
Polish Information Processing Society
Logo FedCSIS

Annals of Computer Science and Information Systems, Volume 11

Proceedings of the 2017 Federated Conference on Computer Science and Information Systems

Process Mining Methods for Post-Delivery Validation

,

DOI: http://dx.doi.org/10.15439/2017F372

Citation: Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, M. Ganzha, L. Maciaszek, M. Paprzycki (eds). ACSIS, Vol. 11, pages 11991202 ()

Full text

Abstract. The aim of this paper is to show the strengths and the weakness of process mining tools in post-delivery validation. This is illustrated on two use-cases from a real-world system. We also indicate what type of research has to be done to make process mining tools more usable for validation purposes.

References

  1. P. Rodriguez, J. Markkula, M. Oivo, K. Turula, Survey on agile and lean usage in finish software industry, ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, Lund, Sweden, 2012, http://dx.doi.org/10.1145/2372251.2372275
  2. M. Poppendieck, T. Poppendieck, Leading Lean Software Development: Results Are not the Point, Addison-Wesley Signature Series, 2009, isbn: 9780321699657
  3. M. Poppendieck, T. Poppendieck, Lean Software Development: An Agile Toolkit, Addison-Wesley, 2013, isbn: 0321150783.
  4. W.M.P. van der Aalst, Process Mining: Discovery, Conformance and Enhancement of Business Processes, Springer Verlag, 2011.
  5. E.M. Gold, Language identification in the limit, Information and Control, Volume 10, 1967.
  6. D. Angluin, Inductive Inference of Formal Languages from Positive Data, Information and Control, Volume 42, 1980.
  7. L.G Valiant, A theory of the learnable, Communications of The ACM, volume 27, 1984.
  8. W.M.P. van der Aalst, B. van Dongen, Discovering Workflow Performance Models from Timed Logs, Engineering and Deployment of Cooperative Information Systems, pp. 107-110, 2002.
  9. L. Wen, J. Wang, J. Sun, Detecting Implicit Dependencies Between Tasks from Event Logs, Lecture Notes in Computer Science, Volume 3841, 591-603, 2006.
  10. C. Ren, L. Wen, J. Dong, H. Ding, W. Wang, M. Qiu, A Novel Approach for Process Mining Based on Event Types, IEEE SCC 2007, 721-722, 2007.
  11. A.K. Medeiros, A.J. Weijters, W.M.P. van der Aalst, Genetic process mining: an experimental evaluation, Data Mining and Knowledge Discovery, Volume 14 Issue 2, 2007.
  12. J.E. Cook, A.L. Woolf, Discovering models of software processes from event-based data, ACM Transactions on Software Engineering and Methodology, Volume 7 Issue 3, 1998.
  13. A. Brazma, Efficient algorithm for learning simple regular expressions from noisy examples, Workshop on Algorithmic Learning Theory ALT’94, Lecture Notes in AI, Volume 872, Springer, 1994.
  14. J. Herbst A Machine Learning Approach to Workflow Management, 11th European Conference on Machine Learning, Lecture Notes in Computer Science, Volume 1810, 2000.
  15. M. R. Przybyłek Skeletal algorithms, International Conference on Evolutionary Computation Theory and Applications 2011, pages 80-89
  16. ProM — an extensible framework that supports a wide variety of process mining techniques, http://www.promtools.org
  17. R. Mans, W.M.P. van der Aalst, R. Vanwersch Process Mining in Healthcare, Springer Briefs in Business Process Management; Springer International Publishing: Cham, Germany, 2015
  18. C. Fernandez-Llatas, A. Lizondo1, E. Monton, J-M Benedi, V. Traver Process Mining Methodology for Health Process Tracking Using Real-Time Indoor Location Systems Sensors, 11/2015; 15(12):29821-29840. http://dx.doi.org/10.3390/s151229769
  19. P. Markowski, M.R. Przybyłek Process Mining Methodology in Industrial Environment: Document Flow Analysis Proceedings of the Federated Conference on Computer Science and Information Systems 2016, ACSIS, Vol. 8. ISSN 2300-5963, pp. 1175–1178, http://dx.doi.org/10.15439/2016F456