Skip to main content
Log in

A novel approach for process mining based on event types

  • Published:
Journal of Intelligent Information Systems Aims and scope Submit manuscript

Abstract

Despite the omnipresence of event logs in transactional information systems (cf. WFM, ERP, CRM, SCM, and B2B systems), historic information is rarely used to analyze the underlying processes. Process mining aims at improving this by providing techniques and tools for discovering process, control, data, organizational, and social structures from event logs, i.e., the basic idea of process mining is to diagnose business processes by mining event logs for knowledge. Given its potential and challenges it is no surprise that recently process mining has become a vivid research area. In this paper, a novel approach for process mining based on two event types, i.e., START and COMPLETE, is proposed. Information about the start and completion of tasks can be used to explicitly detect parallelism. The algorithm presented in this paper overcomes some of the limitations of existing algorithms such as the α-algorithm (e.g., short-loops) and therefore enhances the applicability of process mining.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Notes

  1. Note that we use the words workflow and process interchangeably.

  2. (N,[i]) is the marked net with initial marking [i], i.e., the marking with just one token in the source place i. Similarly, [o] is used to denote the marking with just one token in the sink place o.

  3. \(\left[ {N,\left. M \right\rangle } \right.\) is the set of reachable markings of net N when starting in marking M.

  4. p ∙ is the set of output transitions of p, ∙ t is the set of input places of t, and ≥ is the standard ordering relation on multisets.

  5. Note that EMiT allows for even more event types, e.g., there are also event types like SCHEDULE, ASSIGN, WITHDRAW, etc.

  6. E * is the set of all sequences that are composed of zero of more events from E.

  7. Readers who are interested in the process log examples can download them from http://is.tm.tue.nl/research/processmining/tools/ProM/Process Logexamples.zip.

References

  • Agrawal, R., Gunopulos, D., & Leymann, F. (1998). Mining process models from workflow logs. In Sixth International Conference on Extending Database Technology (pp. 469–483).

  • Angluin, D., & Smith, C. H. (1983). Inductive inference: Theory and methods. Computing Surveys, 15(3), 37–269.

    Article  MathSciNet  Google Scholar 

  • Cook, J. E., & Wolf, A. L. (1998a). Discovering models of software processes from event-based data. ACM Transactions on Software Engineering and Methodology, 7(3), 215–249.

    Article  Google Scholar 

  • Cook, J. E., & Wolf, A. L. (1998b). Event-based detection of concurrency. In Proceedings of the Sixth International Symposium on the Foundations of Software Engineering (FSE-6) (pp. 35–45).

  • Cook, J. E., & Wolf, A. L. (1999). Software process validation: Quantitatively measuring the correspondence of a process to a model. ACM Transactions on Software Engineering and Methodology, 8(2), 147–176.

    Article  Google Scholar 

  • Desel, J., & Esparza, J. (1995). Free choice petri nets, volume 40 of cambridge tracts in theoretical computer science. Cambridge, UK: Cambridge University Press.

    Google Scholar 

  • Eder, J., Olivotto, G. E., & Gruber, W. (2002). A data warehouse for workflow logs. In Y. Han, S. Tai, & D. Wikarski (Eds.), International Conference on Engineering and Deployment of Cooperative Information Systems (EDCIS 2002), Volume 2480 of Lecture Notes in Computer Science (pp. 1–15). Berlin: Springer.

    Google Scholar 

  • Ehrenfeucht, A., & Rozenberg, G. (1989). Partial (set) 2-structures—Part 1 and part 2. Acta Informatica, 27(4), 315–368.

    Article  MathSciNet  Google Scholar 

  • Gold, E. M. (1967). Language identfication in the limit. Information and Control, 10(5), 447–474.

    Article  MATH  Google Scholar 

  • Gold, E. M. (1978). Complexity of automaton identification from given data. Information and Control, 37(3), 302–320.

    Article  MATH  MathSciNet  Google Scholar 

  • Grigori, D., Casati, F., Dayal, U., & Shan, M. C. (2001). Improving business process quality through exception understanding, prediction, and prevention. In P. Apers, P. Atzeni, S. Ceri, S. Paraboschi, K. Ramamohanarao, & R. Snodgrass (Eds.), Proceedings of 27th International Conference on Very Large Data Bases (VLDB’01) (pp. 159–168). Morgan Kaufmann.

  • Herbst, J. (2000a). A machine learning approach to workflow management. In Proceedings 11th European Conference on Machine Learning, Volume 1810 of Lecture Notes in Computer Science (pp. 183–194). Berlin: Springer-Verlag.

    Google Scholar 

  • Herbst, J. (2000b). Dealing with concurrency in workflow induction. In U. Baake, R. Zobel, & M. Al-Akaidi (Eds.), European Concurrent Engineering Conference. SCS Europe.

  • Herbst, J. (2001). Ein induktiver Ansatz zur Akquisition und Adaption von Workflow-Modellen. Ph.D. Thesis, Universität Ulm, November.

  • Herbst, J., & Karagiannis, D. (1998). Integrating machine learning and workflow management to support acquisition and adaptation of workflow models. In Proceedings of the Ninth International Workshop on Database and Expert Systems Applications (pp. 745–752). IEEE.

  • Herbst, J., & Karagiannis, D. (1999). An inductive approach to the acquisition and adaptation of workflow models. In M. Ibrahim, & B. Drabble (Eds.), Proceedings of the IJCAI’99 Workshop on Intelligent Workflow and Process Management: The New Frontier for AI in Business (pp. 52–57). Stockholm, Sweden, August.

  • Herbst, J., & Karagiannis, D. (2000). Integrating machine learning and workflow management to support acquisition and adaptation of workflow models. International Journal of Intelligent Systems in Accounting, Finance and Management, 9, 67–92.

    Article  Google Scholar 

  • IDS Scheer (2002). ARIS Process Performance Manager (ARIS PPM). http://www.ids-scheer.com.

  • Kiepuszewski, B. (2003). Expressiveness and suitability of languages for control flow modelling in workflows. PhD Thesis, Queensland University of Technology, Brisbane, Australia. Available via http://www.workflowpatterns.com.

  • Mannila, H., & Rusakov, D. (2001). Decomposing event sequences into independent components. In V. Kumar, & R. Grossman (Eds.), Proceedings of the First SIAM Conference on Data Mining (pp. 1–17). SIAM.

  • Mannila, H., Toivonen, H., & Verkamo, A. I. (1997). Discovery of frequent episodes in event sequences. Data Mining and Knowledge Discovery, 1(3), 259–289.

    Article  Google Scholar 

  • Maruster, L., van der Aalst, W. M. P., Weijters, A. J. M. M., van den Bosch, A., & Daelemans, W. (2001). Automated discovery of workflow models from hospital data. In B. Kröse, M. de Rijke, G. Schreiber, & M. van Someren (Eds.), Proceedings of the 13th Belgium-Netherlands Conference on Artificial Intelligence (BNAIC 2001) (pp. 183–190).

  • Maruster, L., Weijters, A. J. M. M., van der Aalst, W. M. P., & van den Bosch, A. (2002). Process mining: Discovering direct successors in process logs. In Proceedings of the 5th International Conference on Discovery Science (Discovery Science 2002), Volume 2534 of Lecture Notes in Artificial Intelligence (pp. 364–373). Berlin: Springer.

    Google Scholar 

  • Maxeiner, M. K., Küspert, K., & Leymann, F. (2001). Data Mining von Workflow-Protokollen zur teilautomatisierten Konstruktion von ProzeSSmodellen. In Proceedings of Datenbanksysteme in Büro, Technik und Wissenschaft (pp. 75–84). Berlin, Germany: Informatik Aktuell Springer.

    Google Scholar 

  • Moreno, J. L. (1934). Who shall survive? Washington, DC: Nervous and Mental Disease Publishing Company.

    Google Scholar 

  • Parekh, R., Honavar, V. (2000). Automata induction, grammar inference, and language acquisition. In Dale, Moisl, & Somers (Eds.), Handbook of Natural Language Processing. New York: Marcel Dekker.

    Google Scholar 

  • Pitt, L. (1889). Inductive inference, DFAs, and computational complexity. In K. P. Jantke (Ed.), Proceedings of International Workshop on Analogical and Inductive Inference (AII), Volume 397 of Lecture Notes in Computer Science (pp. 18–44). Berlin: Springer.

    Google Scholar 

  • Reisig, W., & Rozenberg, G. (Eds) (1998). Lectures on petri nets I: Basic models, Volume 1491 of Lecture Notes in Computer Science. Berlin: Springer.

    Google Scholar 

  • Rozinat, A., & van der Aalst, W. M. P. (2006). Conformance testing: Measuring the fit and appropriateness of event logs and process models. In C. Bussler et al. (Eds.), BPM 2005 Workshop on Business Process Intelligence, Volume 3812 of Lecture Notes in Computer Science (pp. 163–176). Berlin: Springer.

    Google Scholar 

  • Sayal, M., Casati, F., Shan, M. C., & Dayal, U. (2002). Business process cockpit. In Proceedings of 28th International Conference on Very Large Data Bases (VLDB’02) (pp. 880–883). Morgan Kaufmann.

  • Schimm, G. (2001). Process mining. http://www.processmining.de/.

  • Schimm, G. (2000). Generic linear business process modeling. In S. W. Liddle, H. C. Mayr, & Thalheim, B. (Eds.), Proceedings of the ER 2000 Workshop on Conceptual Approaches for E-Business and The World Wide Web and Conceptual Modeling, Volume 1921 of Lecture Notes in Computer Science (pp. 31–39). Berlin: Springer.

    Google Scholar 

  • Schimm, G. (2002). Process miner—A tool for mining process schemes from event-based data. In S. Flesca, & G. Ianni (Eds.), Proceedings of the 8th European Conference on Artificial Intelligence (JELIA), Volume 2424 of Lecture Notes in Computer Science (pp. 525–528). Berlin: Springer.

    Google Scholar 

  • Scott, J. (1992). Social network analysis. Sage, Newbury Park CA.

    Google Scholar 

  • Staffware (2002). Staffware Process Monitor (SPM). http://www.staffware.com.

  • van der Aalst, W. M. P. (1998). The application of Petri nets to workflow management. The Journal of Circuits, Systems and Computers, 8(1), 21–66.

    Article  Google Scholar 

  • van der Aalst, W. M. P., & Song, M. (2004). Mining social networks: Uncovering interaction patterns in business processes. In M. Weske, B. Pernici, & J. Desel (Eds.), International Conference on Business Process Management (BPM 2004), Lecture Notes in Computer Science. Berlin: Springer.

    Google Scholar 

  • van der Aalst, W. M. P., & van Dongen, B. F. (2002). Discovering workflow performance models from timed logs. In Y. Han, S. Tai, & D. Wikarski (Eds.), International Conference on Engineering and Deployment of Cooperative Information Systems (EDCIS 2002), Volume 2480 of Lecture Notes in Computer Science (pp. 45–63). Berlin: Springer.

    Google Scholar 

  • van der Aalst, W. M. P., van Dongen, B. F., Herbst, J., Maruster, L., Schimm, G., & Weijters, A. J. M. M. (2003). Workflow mining: A survey of issues and approaches. Data and Knowledge Engineering, 47(2), 237–267.

    Article  Google Scholar 

  • van der Aalst, W. M. P., & van Hee, K. M. (2002). Workflow management: Models, methods, and systems. Cambridge, MA: MIT Press.

    Google Scholar 

  • van der Aalst, W. M. P., Weijters, A. J. M. M. (Eds.), Process mining, special issue of computers in industry, Vol. 53, No. 3. Amsterdam: Elsevier (2004).

    Google Scholar 

  • van der Aalst, W. M. P., Weijters, A. J. M. M., & Maruster, L. (2004). Workflow mining: Discovering process models from event logs. IEEE Transactions on Knowledge and Data Engineering, 16(9), 1128–1142.

    Article  Google Scholar 

  • van Dongen, B. F., Alves de Medeiros, A. K., Verbeek, H. M. W., Weijters, A. J. M. M., & van der Aalst, W. M. P. (2005). The prom framework: A new era in process mining tool support. In G. Ciardo, & P. Darondeau (Eds.), Application and Theory of Petri Nets 2005, Volume 3536 of Lecture Notes in Computer Science (pp. 444–454). Berlin: Springer.

    Google Scholar 

  • Weijters, A. J. M. M., & van der Aalst, W. M. P. (2001a). Process mining: Discovering workflow models from event-based data. In B. Kröse, M. de Rijke, G. Schreiber, & M. van Someren (Eds.), Proceedings of the 13th Belgium-Netherlands Conference on Artificial Intelligence (BNAIC 2001) (pp. 283–290).

  • Weijters, A. J. M. M., & van der Aalst, W. M. P. (2001b). Rediscovering workflow models from event-based data. In V. Hoste, & G. de Pauw (Eds.), Proceedings of the 11th Dutch–Belgian Conference on Machine Learning (Benelearn 2001) (pp. 93–100).

  • Weijters, A. J. M. M., & van der Aalst, W. M. P. (2002). Workflow mining: Discovering workflow models from event-based data. In C. Dousson, F. Höppner, & R. Quiniou (Eds.), Proceedings of the ECAI Workshop on Knowledge Discovery and Spatial Data (pp. 78–84).

  • Weijters, A. J. M. M., & van der Aalst, W. M. P. (2003). Rediscovering workflow models from event-based data using little thumb. Integrated Computer-Aided Engineering, 10(2), 151–162.

    Google Scholar 

  • Wen, L. J., van der Aalst, W. M. P., Wang, J. M., & Sun, J. G. (2007). Mining process models with non-free-choice constructs. Data Mining and Knowledge Discovery, 15(2), 145–180.

    Article  MathSciNet  Google Scholar 

  • zur Mühlen, M. (2001a). Process-driven management information systems combining data warehouses and workflow technology. In B. Gavish (Ed.), Proceedings of the International Conference on Electronic Commerce Research (ICECR-4) (pp. 550–566). Los Alamitos, California: IEEE Computer Society Press.

    Google Scholar 

  • zur Mühlen, M. (2001b). Workflow-based process controlling—Or: What you can measure you can control. In L. Fischer (Ed.), Workflow Handbook 2001, Workflow Management Coalition (pp. 61–77). Florida: Lighthouse Point, Future Strategies.

    Google Scholar 

  • zur Mühlen, M., & Rosemann, M. (2000). Workflow-based process monitoring and controlling—technical and organizational issues. In R. Sprague (Ed.), Proceedings of the 33rd Hawaii International Conference on System Science (HICSS-33) (pp. 1–10). Los Alamitos, California: IEEE Computer Society Press.

    Google Scholar 

Download references

Acknowledgements

The work is supported by the National 973 Planning Project (No. 2002CB 312006), the National Basic Research Program of China (No. 2007CB310802), the National Natural Science Foundation of China (No. 60473077) and the Program for New Century Excellent Talents in University.

The authors would like to thank Ton Weijters, Ana Karla Alves de Medeiros, Boudewijn van Dongen, Minseok Song, Laura Maruster, Eric Verbeek, Monique Jansen-Vullers, Hajo Reijers, Michael Rosemann, and Peter van den Brand for their on-going work on process mining techniques and tools at Eindhoven University of Technology.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lijie Wen.

Appendix

Appendix

Theorem 1

Let N = (P,T,F) be a sound WF-net and let W be a complete event log of N . For any a,b ∈ T: a W b implies a ∙ ∩ ∙ b ≠ ∅.

Proof

Assume a W b and a ∙ ∩ ∙ b = ∅. We will show that this assumption leads to a contradiction and thus prove the theorem. From Definition 13, we know that a W b implies a >  W b and \(\neg(a\times_W b)\). Since a >  W b there exists at least one trace σ = e 1 e 2 e 3 ⋯ e n  ∈ W such that \(\exists_{i,j} 2\leq i\leq n-2\wedge i<\!j\!<\!n\) such that e i .type=COMPLETE, e i .task=a, e j .type=START, e j .task=b and there is not any task occurrence between e i and e j . For ∀  k i < k < j and e k .type=COMPLETE, we know that e k can occur before e i in some traces. Similarly, for ∀  m i < m < j and e m .type=START, we know that e m can wait until e j occurs. Thus we can get a marking M of N, under which a can complete and after a completes, b can start immediately. Because a ∙ ∩ ∙ b = ∅, a does not produce tokens for any input place of b. So under the marking M, b can start before a completes. Therefore, we can find a× W b from the log and a ∥  W b holds. This result contradicts a W b and we conclude that a W b implies a ∙ ∩ ∙ b ≠ ∅. □

Theorem 2

Let N = (P,T,F) be a sound DWF-net and let W be a complete event log of N . For any a,b ∈ T: a ∙ ∩ ∙ b ≠ ∅ implies a W b.

Proof

Because a ∙ ∩ ∙ b ≠ ∅, we assume a place p ∈ a ∙ ∩ ∙ b. According to the definition of DWF-net, b can start after a completes and a >  W b holds in the log. Remains to prove \(\neg(a\times_W b)\). Assume b can start before a completes and a× W b holds. In this case, there should be one token in p for some marking M, under which a is fired and b is enabled. If a completes under M, a will produce one token for p and there would be two tokens in p. We get a contradiction, thus \(\neg(a\times_W b)\) holds. Since a >  W b and \(\neg(a\times_W b)\), we conclude a W b. □

Theorem 3

Let N = (P,T,F) be a sound WF-net and let W be a complete event log of N . For any a,b ∈ T:

  1. 1.

    If a ∙ ∩ b ∙ ≠ ∅, then \(a\nparallel_W\!b\).

  2. 2.

    If ∙ a ∩ ∙ b ≠ ∅, then \(a\nparallel_W\!b\).

Proof

Assume a ∥  W b in both situations, we will show that this can lead to a contradiction respectively for the following two parts.

  1. 1.

    Assume a place p ∈ a ∙ ∩ b ∙. For a ∥  W b, there should at least be one “overlapping sequence” in the log, i.e., a× W b. Since the COMPLETE event of a task may occur at any time after the corresponding START event, there may be a snippet (a,1) (b,1) or (b,1) (a,1) in some trace. In this case, there will be a marking M that does not cover p, under which both a and b have started and can complete immediately. Thus p will contain at least two tokens after a and b complete and the net is not 1-safe. So we get a contradiction and \(a\nparallel_W b\) holds.

  2. 2.

    Assume a place p ∈ ∙ a ∩ ∙ b. For a ∥  W b, there should be at least a sequence a× W b in the log. There will be a marking M of the net under which p is covered and a or b can start. But after a or b starts, the only token in p is consumed and the other transition can not start. The other one will wait until there is a token in p again. So a snippet of (a,0) (c,1) (b,0) or (b,0) (c,1) (a,0) will appear in some trace in the log. However, the COMPLETE event of c may start before the START event of a or b. Under the marking M, (c,1) may occur just before (a,0) or (b,0) and thus there will be two tokens in the place p, i.e., the net is not 1-safe. So we get a contradiction and \(a\nparallel_W b\) holds. □

Theorem 4

Let N = (P,T,F) be a sound DWF-net and let W be a complete event log of N . For any a,b,c ∈ T:

  1. 1.

    If a W c, b W c and \(a\nparallel_W\!b\) , then a ∙ ∩ b ∙ ∩ ∙ c ≠ ∅.

  2. 2.

    If c W a, c W b and \(a\nparallel_W\!b\) , then c ∙ ∩ ∙ a ∩ ∙ b ≠ ∅.

Proof

Now we should prove the above two sub theorems respectively.

  1. 1.

    From Theorem 1 and a W c, we deduce a ∙ ∩ ∙ c ≠ ∅. Similarly, \(b\bullet\cap\bullet c\ne\emptyset\). Because \(a\nparallel_W b\), there will be no chance that a and b occur concurrently. In other words, there will be no marking M of N, under which a has started and b is enabled. According to the requirement two of a DWF-net, a conclusion is drawn that \(a\bullet\cap b\bullet\cap\bullet c\ne\emptyset\).

  2. 2.

    From Theorem 1 and c W a, we deduce c ∙ ∩ ∙ a ≠ ∅. Similarly, \(c\bullet\cap\bullet b\ne\emptyset\). Because \(a\nparallel_W b\), there will be no chance that a and b occur concurrently. In other words, there will be no marking M of N, under which a has started and b is enabled. According to the requirement two of a DWF-net, a conclusion is drawn that \(c\bullet\cap\bullet a\cap\bullet b\ne\emptyset\). □

Theorem 5

Let N = (P,T,F) be a sound DWF-net and let W be a complete event log of N . For any two task sets PS and SS , such that \(PS\subseteq T\) , \(SS\subseteq T\) : ∀  a ∈ PS,b ∈ SS a W b, \(\forall_{a1,a2\in PS}a1\nparallel_W a2\) and \(\forall_{b1,b2\in SS}b1\nparallel_W b2\) if and only if \(\exists_{p\in P} \forall_{a\in PS,b\in SS}p\in a\bullet\cap\bullet b\).

Proof

We should prove the theorem in both directions.

  1. 1.

    Assume \(\exists_{p\in P} \forall_{a\in PS,b\in SS}p\in a\bullet\cap\bullet b\). Using Theorem 2, it is easy to see that ∀  a ∈ PS,b ∈ SS a W b. Using Theorem 3 it is also shown that the elements of PS and the elements in SS cannot be in parallel (i.e., ∀  a1,a2 ∈ PS p ∈ a1 ∙ ∩ a2 ∙ and ∀  b1,b2 ∈ SS p ∈ ∙ b1 ∩ ∙ b2). Thus the necessity of the theorem holds.

  2. 2.

    Assume ∀  a ∈ PS,b ∈ SS a W b, \(\forall_{a1,a2\in PS}a1\nparallel_W a2\) and \(\forall_{b1,b2\in SS}b1\nparallel_W b2\). According to the requirement two of a DWF-net, there exists a place p ∈ P such that \(PS\subseteq\bullet p\) and \(SS\subseteq p\bullet\). Therefore a conclusion can be drawn that \(\exists_{p\in P}\forall_{a\in PS,b\in SS}p\in a\bullet\cap\bullet b\). Thus the sufficiency of the theorem holds. □

Theorem 6

Let N be a sound DWF-net and let W be a complete event log of N. β(W) = N modulo renaming of places, i.e., the discovered model matches the original model after renaming places.

Proof

Let N = (P,T,F) and β(W) = N W  = (P W ,T W ,F W ). Based on the completeness of W and mining step 1 of the β algorithm, we get T W  = T. For the source and sink places (i.e., i and o) of N, there are the source and sink places i W and o W of N W such that i W  ∙ = i ∙ ∧ ∙ o W  = ∙ o and vice versa. Remains to prove that the “internal places” of the two Petri nets N and N W match.

  1. 1.

    First we prove that \(\forall_{p\in\!P\backslash\{i,o\}} \exists_{p_W\!\in\!P_W\backslash\{i_W,o_W\}}\bullet p_W=\bullet p\wedge p_W\bullet=p\bullet\). According to the β-algorithm and Theorem 5, we know that < ∙ p,p ∙ > ∈ X W and \(\exists_{p_W\in P_W}\bullet p\subseteq\bullet p_W\wedge p\bullet\subseteq p_W\bullet\), i.e., < ∙ p W ,p W  ∙ > ∈ Y W . Assume that \(\exists_{t'\in T} t'\in\bullet p_W\wedge t'\notin\bullet p\). Using Theorem 2 and Theorem 3, we can show that \(\forall_{t\in\bullet p}t'\nparallel_W t\) and ∀  t ∈ p ∙  t′→ W t. According to the second requirement, there exists a place p′ such that ∙ p ⊂ ∙ p′ and \(p\bullet\subseteq p'\bullet\). This violates the third requirement of a DWF-net and we get a contradiction. If we assume that \(\exists_{t'\in T} \ t'\!\in\! p_W\bullet\wedge t'\!\notin\! p\bullet\), we can still get a similar contradiction. Therefore we prove the result in one direction.

  2. 2.

    Finally, we prove \(\forall_{p_W\!\in\! P_W\backslash\{i_W,o_W\}} \exists_{p\in\! P\backslash\{i,o\}}\ \bullet p=\bullet p_W \wedge p\bullet=p_W\bullet\). According to the β-algorithm and p W  ∈ P W , we know that < ∙ p W ,p W  ∙ > ∈ Y W . Theorem 5 can be used to show that \(\exists_{p\in P}\forall_{a\in\bullet p_W,b\in p_W\bullet}a\bullet\cap\bullet b\!\!=\!\{p\}\). Therefore we deduce \(\bullet p_W\!\subseteq\!\bullet p\wedge p_W\bullet\subseteq p\bullet\). Assume that \(\exists_{t'\in T}t'\in\bullet p\wedge t'\!\notin\!\bullet p_W\). Using Theorem 2 and Theorem 3 we can show that \(\forall_{t\in\bullet p_W} \ t'\!\nparallel_W\!t\) and \(\forall_{t\!\in\! p_W\bullet} \ t'\!\rightarrow_W\!t\). Therefore we can prove that < ∙ p W  ∪ {t′},p W  ∙ > ∈ Y W and thus obtain a contradiction. If we assume that \(\exists_{t'\in T}t'\!\in\!p\bullet\wedge t'\!\notin\!p_W\bullet\), we can also get a contradiction, thus complete the proof. □

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wen, L., Wang, J., van der Aalst, W.M.P. et al. A novel approach for process mining based on event types. J Intell Inf Syst 32, 163–190 (2009). https://doi.org/10.1007/s10844-007-0052-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10844-007-0052-1

Keywords

Navigation