Method for Conformance Checking Based on Token Log
Author:
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [24]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    Logs used in conformance checking with process models are often the event logs. Conformity between the model and the log is often measured by counting the traces which could be reconstructed and the tasks which would be evoked but were not in the running trace through rerunning the model according to the task traces in the log. However the method is not sufficiently comprehensive. While checking the model consisting of many selections with its Event Log, the conformity will be very low due to the large number of evoked tasks that are not in the running task trace. Moreover, while checking the model mainly composed by parallel branches with the log only containing sequential task traces and sharing the same task set with the model, the conformity will be very high due to the fact that only a few tasks can't be executed normally while monitoring the real behavior. To overcome the weakness of the original method, a bidirectional checking method made up of checking the accuracy of the model and checking the completeness of the log, and a new kind of log named Token Log which can describe the property of its corresponding model, are proposed in this paper. With the Token Log, the new method for conformance checking is clearer, more concise and more accurate.

    Reference
    [1] Rozinat A, van der Aalst WMP. Conformance checking of process based on monitoring real behavior. Information Systems, 2008, 33(1):64-95. [doi: 10.1016/j.is.2007.07.001]
    [2] Van der Aalst WMP, Adriansyah A, van Dongen B. Replaying history on process models for conformance checking and performance analysis. WIREs Data Mining and Knowledge Discovery, 2012,2(2):182-192. [doi: 10.1002/WIDM.1045]
    [3] Van der Aalst WMP, Weijters AJMM. Process mining: A research agenda. Computers in Industry, 2004,53(3):231-244. [doi: 10.1016/j.compind.2003.10.001]
    [4] Van der Aalst WMP. Process discovery: Capturing the invisible. Computational Intelligence Magazine, 2010,5(1):28-41. [doi: 10.1109/MCI.2009.935307]
    [5] La Rosa M, Reijers HA, van der Aalst WMP, Dijkman RM, Mendling J, Dumas M, Garcia-Banuelos L. APROMORE: An advanced process model repository. Expert Systems with Applications, 2011,38(6):7029-7040. [doi: 10.1016/j.eswa.2010.12.012]
    [6] Yan Z, Dijkman R, Grefen P. Fast business process similarity search with feature-based similarity estimation. In: Robert M, Tharam D, Pilar H, eds. Proc. of the Move to Meaningful Internet Systems: OTM 2010. Berlin, Heidelberg: Springer-Verlag, 2010. 60-77. [doi: 10.1007/978-3-642-16934-2_8]
    [7] Murata T. Petri nets: Properties, analysis and applications. Proc. of the IEEE, 1989,77(4):541-580. [doi: 10.1109/5.24143]
    [8] Van der Aalst WMP, Weijters AJMM, Maruster L. Workflow mining: Discovering process models from Event Logs. IEEE Trans. on Knowledge and Data Engineering, 2004,16(9):1128-1142. [doi: 10.1109/TKDE.2004.47]
    [9] Van der Aalst WMP, Dumas M, Ouyang C, Rozinat A, Verbeek E. Conformance checking of service behavior. ACM Trans. on Internet Technology, 2008,8(3). [doi: 10.1145/1361186.1361189]
    [10] Van der Aalst WMP, Rubin V, Verbeek HMW, van Dongen BF, Kindler E, Günther CW. Process mining: A two-step approach to balance between underfitting and overfitting. Software & Systems Modeling, 2010,9(1):87-111. [doi: 10.1007/s10270-008-0106-z]
    [11] Wang JM, Wen LJ. Discovering process knowledge from Event Logs. Communications of the CCF, 2012,8(6):63-68 (in Chinese with English abstract).
    [12] Li J, Wen LJ, Wang JM. Process model storage mechanism based on Petri net edit distance. Computer Integrated Manufacturing Systems, 2013,19(8):1832-1841 (in Chinese with English abstract).
    [13] Wang SH, Wen LJ, Wei DS, Wang JM, Yan ZQ. SSDT matrix-based behavioral similarity algorithm for process models. Computer Integrated Manufacturing Systems, 2013,19(8):1822-1831 (in Chinese with English abstract).
    [14] Fan GS, Yu HQ, Chen LQ, Liu DM. Fault diagnosis and handling for service composition based on Petri nets. Ruan Jian Xue Bao/ Journal of Software, 2010,21(2):231-247 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3790.htm [doi:10. 3724/SP.J.1001.2010.03790]
    [15] Song M, Wei ZX, Yin GS. Evolution analysis of data flow oriented internet ware service. Ruan Jian Xue Bao/Journal of Software, 2013,24(12):2797-2813 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/4396.htm [doi:10.3724/SP.J.1001. 2013.04396]
    [16] Wu D, Feng DG, Lian YF, Chen K. Efficiency evaluation model of system security measures in the given vulnerabilities set. Ruan Jian Xue Bao/Journal of Software, 2012,23(7):1880-1898 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/ 4112.htm [doi:10.3724/SP.J.1001.2012.04112]
    [17] Yuan CY. Principals and Application of Petri Net. Beijing: Publishing House of Electronics Industry, 2004 (in Chinese).
    [18] Van der Aalst WMP, Weijters T, Maruster L. The application of Petri nets to workflow management. Journal of Circuits, Systems and Computers, 1998,8:21-66. [doi: 10.1142/S0218126698000043]
    [19] Hull R. Artifact-Centric business process models: Brief survey of research results and challenges. In: Meersman R, Tari Z, eds. Proc. of the Move to Meaningful Internet Systems: OTM 2008. LNCS, Berlin, Heidelberg: Springer-Verlag, 2008. 1152-1163. [doi: 10.1007/978-3-540-88873-4_17]
    [20] Xu W, Su JW, Yan ZM, Yang J, Zhang L. An artifact-centric approach to dynamic modification of workflow execution. In: Herrero P, Kumar A, Reichert M, Qing L, Ooi BC, Damiani E, Schmidt DC, White J, Hauswirth M, Hitzler P, Mohania M, eds. Proc. of the Move to Meaningful Internet Systems: OTM 2011. LNCS, Berlin, Heidelberg: Springer-Verlag, 2011. 256-273. [doi: 10.1007/978-3-642-25109-2_17]
    [21] Van der Aalst WMP, ter Hofstede AHM. YAWL: Yet another workflow language. Information System, 2005,30(4):245-275. [doi: 10.1016/j.is.2004.02.002]
    [22] YAWL foundation. YAWL-Technical Manual (version 2.1). 2010.
    [23] Ge JD, Hu H, Lu J. A transformation approach from workflow net to PERT diagram based on invariants. Acta Electronica Sinica, 2008,36(5):893-898 (in Chinese with English abstract).
    [24] Ge JD, Hu HY, Zhou Y, Hu H, Wang DY, Guo XB. A decomposition approach with invariant analysis for workflow coordination. Chinese Journal of Computers, 2012,35(10):2169-2181 (in Chinese with English abstract).
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

李传艺,葛季栋,胡海洋,胡昊,骆斌.一种基于Token Log的符合性检查方法.软件学报,2015,26(3):509-532

Copy
Share
Article Metrics
  • Abstract:5487
  • PDF: 8116
  • HTML: 2684
  • Cited by: 0
History
  • Received:July 01,2014
  • Revised:November 21,2014
  • Online: March 03,2015
You are the first2038044Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063