Privacy-preserving process mining: Differential privacy for event logs

F Mannhardt, A Koschmider, N Baracaldo… - Business & Information …, 2019 - Springer
Privacy regulations for data can be regarded as a major driver for data sovereignty
measures. A specific example for this is the case of event data that is recorded by …

[HTML][HTML] PM4Py: A process mining library for Python

A Berti, S van Zelst, D Schuster - Software Impacts, 2023 - Elsevier
PM4Py is a Python library providing a comprehensive array of tools for process mining. This
paper presents an in-depth overview of the PM4Py library, including its integration with other …

[PDF][PDF] Multi-perspective process mining

F Mannhardt - 2018 - research.tue.nl
This thesis is about process mining: the analysis an organization's processes by using
process execution data. During the handling of a case or process instance data about the …

[HTML][HTML] Discovering more precise process models from event logs by filtering out chaotic activities

N Tax, N Sidorova, WMP van der Aalst - Journal of Intelligent Information …, 2019 - Springer
Process Discovery is concerned with the automatic generation of a process model that
describes a business process from execution data of that business process. Real life event …

[HTML][HTML] Data-aware conformance checking with SMT

P Felli, A Gianola, M Montali, A Rivkin, S Winkler - Information Systems, 2023 - Elsevier
Conformance checking is a key process mining task to confront the normative behavior
imposed by a process model with the actual behavior recorded in a log. While this problem …

Aligning real process executions and prescriptive process models through automated planning

M de Leoni, A Marrella - Expert Systems with Applications, 2017 - Elsevier
Modern organizations execute processes to deliver product and services, whose enactment
needs to adhere to laws, regulations and standards. Conformance checking is the problem …

Complete and interpretable conformance checking of business processes

L García-Bañuelos, NRTP Van Beest… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
This article presents a method for checking the conformance between an event log capturing
the actual execution of a business process, and a model capturing its expected or normative …

Decision mining revisited-discovering overlapping rules

F Mannhardt, M De Leoni, HA Reijers… - … conference on advanced …, 2016 - Springer
Decision mining enriches process models with rules underlying decisions in processes
using historical process execution data. Choices between multiple activities are specified …

PRETSA: event log sanitization for privacy-aware process discovery

SA Fahrenkrog-Petersen, H Van der Aa… - … on process mining …, 2019 - ieeexplore.ieee.org
Event logs that originate from information systems enable comprehensive analysis of
business processes, eg, by process model discovery. However, logs potentially contain …

Conformance checking approximation using subset selection and edit distance

M Fani Sani, SJ van Zelst… - … Systems Engineering: 32nd …, 2020 - Springer
Conformance checking techniques let us find out to what degree a process model and real
execution data correspond to each other. In recent years, alignments have proven extremely …