A general divide and conquer approach for process mining

W.M.P. Aalst, van der

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

41 Citations (Scopus)
1 Downloads (Pure)

Abstract

Operational processes leave trails in the information systems supporting them. Such event data are the starting point for process mining - an emerging scientific discipline relating modeled and observed behavior. The relevance of process mining is increasing as more and more event data become available. The increasing volume of such data ("Big Data") provides both opportunities and challenges for process mining. In this paper we focus on two particular types of process mining: process discovery (learning a process model from example behavior recorded in an event log) and conformance checking (diagnosing and quantifying discrepancies between observed behavior and modeled behavior). These tasks become challenging when there are hundreds or even thousands of different activities and millions of cases. Typically, process mining algorithms are linear in the number of cases and exponential in the number of different activities. This paper proposes a very general divide-and-conquer approach that decomposes the event log based on a partitioning of activities. Unlike existing approaches, this paper does not assume a particular process representation (e.g., Petri nets or BPMN) and allows for various decomposition strategies (e.g., SESE- or passage-based decomposition). Moreover, the generic divide-and-conquer approach reveals the core requirements for decomposing process discovery and conformance checking problems.
Original languageEnglish
Title of host publication2013 Federated Conference on Computer Science and Information Systems (FedCSIS, September 8-11, 2013, Kraków, Poland)
EditorsM. Ganzha, L. Maciaszek, M. Paprzycki
PublisherIEEE Computer Society
Pages1-10
ISBN (Print)978-1-4673-4471-5
Publication statusPublished - 2013

Fingerprint

Dive into the research topics of 'A general divide and conquer approach for process mining'. Together they form a unique fingerprint.

Cite this