Automated discovery of process models from event logs: Review and benchmark

A Augusto, R Conforti, M Dumas… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Process mining allows analysts to exploit logs of historical executions of business processes
to extract insights regarding the actual performance of these processes. One of the most …

A review of business process mining: state‐of‐the‐art and future trends

A Tiwari, CJ Turner, B Majeed - Business Process Management …, 2008 - emerald.com
Purpose–This paper seeks to examine the area of business process mining, providing an
overview of state‐of‐the‐art techniques. An outline of the main problems experienced in the …

Genetic process mining: an experimental evaluation

AKA de Medeiros, AJMM Weijters… - Data mining and …, 2007 - Springer
One of the aims of process mining is to retrieve a process model from an event log. The
discovered models can be used as objective starting points during the deployment of …

A multi-dimensional quality assessment of state-of-the-art process discovery algorithms using real-life event logs

J De Weerdt, M De Backer, J Vanthienen, B Baesens - Information systems, 2012 - Elsevier
Process mining is the research domain that is dedicated to the a posteriori analysis of
business process executions. The techniques developed within this research area are …

Explainable concept drift in process mining

JN Adams, SJ van Zelst, T Rose, WMP van der Aalst - Information Systems, 2023 - Elsevier
The execution of processes leaves trails of event data in information systems. These event
data are analyzed to generate insights and improvements for the underlying process …

Discovering expressive process models by clustering log traces

G Greco, A Guzzo, L Pontieri… - IEEE Transactions on …, 2006 - ieeexplore.ieee.org
Process mining techniques have recently received notable attention in the literature; for their
ability to assist in the (re) design of complex processes by automatically discovering models …

Process mining and security: Detecting anomalous process executions and checking process conformance

WMP Van der Aalst, AKA de Medeiros - Electronic Notes in Theoretical …, 2005 - Elsevier
One approach to secure systems is through the analysis of audit trails. An audit trail is a
record of all events that take place in a system and across a network, ie, it provides a trace of …

[PDF][PDF] Robust process discovery with artificial negative events

S Goedertier, D Martens, J Vanthienen… - Journal of Machine …, 2009 - jmlr.org
Process discovery is the automated construction of structured process models from
information system event logs. Such event logs often contain positive examples only …

[PDF][PDF] Genetic process mining

AKA De Medeiros - 2006 - research.tue.nl
Nowadays, most organizations use information systems to support the execution of their
business processes [37]. Examples of information systems supporting operational processes …

Process mining in flexible environments

CW Günther - 2009 - research.tue.nl
Processes are an integral part of nearly all organizations, driving their daily operations and
support activities. Increasingly, these business processes are supported by some …