Massimiliano de Leoni

Learn More
Process mining techniques are able to extract knowledge from event logs commonly available in today’s information systems. These techniques provide new means to discover, monitor, and improve processes in a variety of application domains. There are two main drivers for the growing interest in process mining. On the one hand, more and more events are being(More)
Process discovery, i.e., learning process models from event logs, has attracted the attention of researchers and practitioners. Today, there exists a wide variety of <i>process mining</i> techniques that are able to discover the control-flow of a process based on event data. These techniques are able to identify <i>decision points</i>, but do not analyze(More)
Process mining can be seen as the “missing link” between data mining and business process management. Although nowadays, in the context of process mining, process discovery attracts the lion’s share of attention, conformance checking is at least as important. Conformance checking techniques verify whether the observed behavior recorded in an event log(More)
In complex emergency scenarios, teams from various emergency-response organizations must collaborate. These teams include both first responders, such as police and fire departments, and those operators who coordinate the effort from operational centers. The Workpad architecture consists of a front- and a back-end layer. The front-end layer is composed of(More)
Modern organizations have invested in collections of descriptive and/or normative process models, but these rarely describe the actual processes adequately. Therefore, a variety of techniques for conformance checking have been proposed to pinpoint discrepancies between modeled and observed behavior. However, these techniques typically focus on the(More)
The use of process models in business information systems for analysis, execution, and improvement of processes assumes that the models describe reality. Conformance checking is a technique to validate how good a given process model describes recorded executions of the actual process. Recently, artifacts have been proposed as a paradigm to capture dynamic,(More)
Nowadays, process management systems can be used not only in classical business scenarios, but also in highly mobile and dynamic situations, e.g., in supporting operators during emergency management in order to coordinate their activities. In such challenging situations, processes should be adapted, in order to cope with anomalous situations, including(More)
• A submitted manuscript is the author's version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the(More)
This paper proposes a technique that supports process participants in making risk-informed decisions, with the aim to reduce the process risks. Risk reduction involves decreasing the likelihood and severity of a process fault from occurring. Given a process exposed to risks, e.g. a financial process exposed to a risk of reputation loss, we enact this(More)
Process mining can be seen as the “missing link” between data mining and business process management. The lion0s share of process mining research has been devoted to the discovery of procedural process models from event logs. However, often there are predefined constraints that (partially) describe the normative or expected process, e.g., “activity A should(More)