Abducing Compliance of Incomplete Event Logs

  title={Abducing Compliance of Incomplete Event Logs},
  author={F. Chesani and Riccardo De Masellis and Chiara Di Francescomarino and Chiara Ghidini and P. Mello and M. Montali and Sergio Tessaris},
  • F. Chesani, Riccardo De Masellis, +4 authors Sergio Tessaris
  • Published in AI*IA 2016
  • Computer Science
  • The capability to store data about business processes execution in so-called Event Logs has brought to the diffusion of tools for the analysis of process executions and for the assessment of the goodness of a process model. [...] Key Method Moreover it proposes a refinement of the classical notion of compliance into strong and conditional compliance to take into account incomplete logs. Finally, performances evaluation in an experimental setting shows the feasibility of the presented approach.Expand Abstract
    7 Citations
    Generating synthetic positive and negative business process traces through abduction
    • 1
    Abduction for Generating Synthetic Traces
    • 4
    Abductive Reasoning on Compliance Monitoring - Balancing Flexibility and Regulation
    • PDF
    Temporal Conformance Analysis and Explanation on Comorbid Patients
    • 3
    • PDF
    Foundations of Intelligent Systems


    Monitoring data-aware business constraints with finite state automata
    • 28
    • PDF
    Completing Workflow Traces Using Action Languages
    • 22
    Aligning Event Logs and Declarative Process Models for Conformance Checking
    • 68
    • PDF
    Managing Controlled Violation of Temporal Process Constraints
    • 24
    • PDF
    Conformance Checking Using Cost-Based Fitness Analysis
    • 310
    • PDF
    Process Mining Manifesto
    • 838
    • PDF
    Auditing with incomplete logs
    • 3
    • PDF
    Workflow mining: discovering process models from event logs
    • 2,004
    • PDF