Extending process logs with events from supplementary sources

F. Mannhardt, M. Leoni, de, H.A. Reijers

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    8 Citations (Scopus)


    Since organizations typically use more than a single IT system, information about the execution of a process is rarely available in a single event log. More commonly, data is scattered across different locations and unlinked by common case identifiers. We present a method to extend an incomplete main event log with events from supplementary data sources, even though the latter lack references to the cases recorded in the main event log. We establish this correlation by using the control-flow, time, resource, and data perspectives of a process model, as well as alignment diagnostics. We evaluate our approach on a real-life event log and discuss the reliability of the correlation under different circumstances. Our evaluation shows that it is possible to correlate a large portion of the events by using our method.
    Original languageEnglish
    Title of host publicationBusiness Process Management Workshops (BPM 2014 International Workshops, Eindhoven, The Netherlands, September 7-8, 2014, Revised Papers)
    EditorsF. Fournier, J. Mendling
    Place of PublicationBerlin
    ISBN (Print)978-3-319-15894-5
    Publication statusPublished - 2015
    Event12th International Conference on Business Process Management (BPM 2014) - Eindhoven, Netherlands
    Duration: 7 Sep 201411 Sep 2014
    Conference number: 12

    Publication series

    NameLecture notes in business information processing (LNBIP)
    ISSN (Print)1865-1348
    ISSN (Electronic)1865-1356


    Conference12th International Conference on Business Process Management (BPM 2014)
    Abbreviated titleBPM 2014
    OtherConference was originally planned in Haifa, but due to the unstable situation in southern Israel, it was relocated to Eindhoven
    Internet address

    Fingerprint Dive into the research topics of 'Extending process logs with events from supplementary sources'. Together they form a unique fingerprint.

    Cite this