Abducing Compliance of Incomplete Event Logs
@inproceedings{Chesani2016AbducingCO, title={Abducing Compliance of Incomplete Event Logs}, author={F. Chesani and Riccardo De Masellis and Chiara Di Francescomarino and Chiara Ghidini and P. Mello and M. Montali and Sergio Tessaris}, booktitle={AI*IA}, year={2016} }
The capability to store data about business processes execution in so-called Event Logs has brought to the diffusion of tools for the analysis of process executions and for the assessment of the goodness of a process model. [...] Key Method Moreover it proposes a refinement of the classical notion of compliance into strong and conditional compliance to take into account incomplete logs. Finally, performances evaluation in an experimental setting shows the feasibility of the presented approach.Expand Abstract
Figures, Tables, and Topics from this paper
7 Citations
Distributed Compliance Monitoring of Business Processes over MapReduce Architectures
- Computer Science
- ICPE Companion
- 2017
- 9
- PDF
Generating synthetic positive and negative business process traces through abduction
- Computer Science
- Knowledge and Information Systems
- 2019
- 1
Abductive Reasoning on Compliance Monitoring - Balancing Flexibility and Regulation
- Computer Science
- ISMIS
- 2017
- PDF
References
SHOWING 1-10 OF 33 REFERENCES
Reasoning-Based Techniques for Dealing with Incomplete Business Process Execution Traces
- Computer Science
- AI*IA
- 2013
- 17
- PDF
Monitoring data-aware business constraints with finite state automata
- Computer Science
- ICSSP 2014
- 2014
- 28
- PDF
Aligning Event Logs and Declarative Process Models for Conformance Checking
- Computer Science
- BPM
- 2012
- 68
- PDF
Conformance Checking Using Cost-Based Fitness Analysis
- Chemistry, Computer Science
- 2011 IEEE 15th International Enterprise Distributed Object Computing Conference
- 2011
- 310
- PDF
Verification of relational data-centric dynamic systems with external services
- Computer Science
- PODS '13
- 2013
- 158
- PDF
Workflow mining: discovering process models from event logs
- Computer Science
- IEEE Transactions on Knowledge and Data Engineering
- 2004
- 2,004
- PDF