Mining process performance from event logs

A. Adriansyah, J.C.A.M. Buijs

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

12 Citations (Scopus)
4 Downloads (Pure)

Abstract

In systems where process executions are not strictly enforced by a predefined process model, obtaining reliable performance information is not trivial. In this paper, we analyzed an event log of a real-life process, taken from a Dutch financial institute, using process mining techniques. In particular, we exploited the alignment technique [2] to gain insights into the control flow and performance of the process execution. We showed that alignments between event logs and discovered process models from process discovery algorithms reveal insights into frequently occurring deviations and how such insights can be exploited to repair the original process models to better reflect reality. Furthermore, we showed that the alignments can be further exploited to obtain performance information. All analysis in this paper is performed using plug-ins within the open-source process mining toolkit ProM.
Original languageEnglish
Title of host publicationBusiness Process Management Workshops : BPM 2012 International Workshops, Tallinn, Estonia, September 3, 2012. Revised Papers
EditorsM. La Rosa, P. Soffer
PublisherSpringer
Pages217-218
ISBN (Print)978-3-642-36284-2
DOIs
Publication statusPublished - 2013
Event8th International Workshop on Business Process Intelligence (BPI 2012) - Tallinn, Estonia
Duration: 3 Sep 20123 Sep 2012
Conference number: 8

Publication series

NameLecture Notes in Business Information Processing
Volume132
ISSN (Print)1865-1348

Workshop

Workshop8th International Workshop on Business Process Intelligence (BPI 2012)
Abbreviated titleBPI 2012
CountryEstonia
CityTallinn
Period3/09/123/09/12
OtherWorkshop held in conjunction with the 10th International Conference on Business Process Management (BPM 2012)

Fingerprint

Dive into the research topics of 'Mining process performance from event logs'. Together they form a unique fingerprint.

Cite this