Skip to main content

Mining Workflow Recovery from Event Based Logs

  • Conference paper
Business Process Management (BPM 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3649))

Included in the following conference series:

Abstract

Handling workflow transactional behavior remains a main problem to ensure a correct and reliable execution. It is obvious that the discovery, and the explanation of this behavior, would enable to better understand and control workflow recovery. Unfortunately, previous workflow mining works have concentrated their efforts on control flow aspects. Although powerful, these proposals are found lacking in functionalities and performance when used to discover workflow transactional behavior.

In this paper, we describe mining techniques, which are able to discover a workflow model, and to improve its transactional behavior from event based logs. First, we propose an algorithm to discover workflow patterns. Then, we propose techniques to discover activities transactional dependencies that allow us to mine workflow recovery techniques. Finally, based on this mining step, we use a set of rules to improve workflow design.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Georgakopoulos, D., Hornick, M., Sheth, A.: An overview of workflow management: from process modeling to workflow automation infrastructure. Distrib. Parallel Databases 3(2), 119–153 (1995)

    Article  Google Scholar 

  2. ter Hofstede, A.H.M., Orlowska, M.E., Rajapakse, J.: Verification problems in conceptual workflow specifications. Data Knowl. Eng. 24(3), 239–256 (1998)

    Article  MATH  Google Scholar 

  3. van der Aalst, W.M.P.: The Application of Petri Nets to Workflow Management. The Journal of Circuits, Systems and Computers 8(1), 21–66 (1998)

    Article  Google Scholar 

  4. Adam, N.R., Atluri, V., Huang, W.-K.: Modeling and analysis of workflows using petri nets. J. Intell. Inf. Syst. 10(2), 131–158 (1998)

    Article  Google Scholar 

  5. Eder, J., Liebhart, W.: Workflow recovery. In: Conference on Cooperative Information Systems, pp. 124–134 (1996)

    Google Scholar 

  6. van der Aalst, W.M.P., van Dongen, B.F.: Workflow mining: A survey of issues and approaches. Data and Knowledge Engineering (2003)

    Google Scholar 

  7. Van Der Aalst, W.M.P., Ter Hofstede, A.H.M., Kiepuszewski, B., Barros, A.P.: Workflow patterns. Distrib. Parallel Databases 14(1), 5–51 (2003)

    Article  Google Scholar 

  8. van der Aalst, W.M.P., Maruster, L.: Workflow mining: Discovering process models from event logs. In: QUT Technical report, FIT-TR-2003-03, Queensland University of Technology, Brisbane (2003)

    Google Scholar 

  9. Elmagarmid, A.K.: Database transaction models for advanced applications. Morgan Kaufmann Publishers Inc., San Francisco (1992)

    Google Scholar 

  10. Sheth, A., Rusinkiewicz, M.: On transactional workflows. In: Special Issue on Workflow and Extended Transaction Systems. IEEE Computer Society, Washington (1993)

    Google Scholar 

  11. Agrawal, D., El. Abbadi, A.: Transaction Management in Database Systems. In: Elmagarmid, A.K. (ed.) Database transaction models for advanced applications. Morgan Kaufmann, San Francisco (1990)

    Google Scholar 

  12. Moss, J.: Nested transactions and reliable distributed computing. In: Proceedings Of The 2nd Symposium on Reliability in Distributed Software and database Systems. IEEE CS Press, Los Alamitos (1982)

    Google Scholar 

  13. Wachter, H., Reuter, A.: The contract model, pp. 219–263 (1992)

    Google Scholar 

  14. Elmagarmid, A., Leu, Y., Litwin, W.: Marek Rusinkiewicz. A multidatabase transaction model for interbase. In: Proceedings of the sixteenth international conference on Very large databases, pp. 507–518. Morgan Kaufmann Publishers Inc., San Francisco (1990)

    Google Scholar 

  15. Du, W., Davis, J., Shan, M.-C.: Flexible specification of workflow compensation scopes. In: Proceedings of the international ACM SIGGROUP conference on Supporting group work: the integration challenge, pp. 309–316. ACM Press, New York (1997)

    Chapter  Google Scholar 

  16. Kiepuszewski, B., Muhlberger, R., Orlowska, M.E.: Flowback: providing backward recovery for workflow management systems. In: Proceedings of the 1998 ACM SIGMOD international conference on Management of data, pp. 555–557. ACM Press, New York (1998)

    Chapter  Google Scholar 

  17. Agrawal, R., Gunopulos, D., Leymann, F.: Mining process models from workflow logs. In: Schek, H.-J., Saltor, F., Ramos, I., Alonso, G. (eds.) EDBT 1998. LNCS, vol. 1377, pp. 469–498. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  18. Cook, J.E., Wolf, A.L.: Discovering models of software processes from event-based data. ACM Transactions on Software Engineering and Methodology (TOSEM) 7(3), 215–249 (1998)

    Article  Google Scholar 

  19. Herbst, J.: A machine learning approach to workflow management. In: Lopez de Mantaras, R., Plaza, E. (eds.) ECML 2000. LNCS (LNAI), vol. 1810, pp. 183–194. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  20. Schimm, G.: Mining exact models of concurrent workflows. Comput. Ind. 53(3), 265–281 (2004)

    Article  Google Scholar 

  21. Gaaloul, W., Bhiri, S., Godart, C.: Discovering workflow transactional behaviour event-based log. In: 12th International Conference on Cooperative Information Systems (CoopIS 2004), Larnaca, Cyprus, October 25-29. LNCS. Springer, Heidelberg (2004)

    Google Scholar 

  22. Jin, W.W., Rusinkiewicz, M., Ness, L., Sheth, A.: Concurrency control and recovery of multidatabase work flows in telecommunication applications. In: Proceedings of the 1993 ACM SIGMOD international conference on Management of data, pp. 456–459. ACM Press, New York (1993)

    Chapter  Google Scholar 

  23. Leymann, F.: Supporting business transactions via partial backward recovery in workflow management systems. In: Proceedings of BTW 1995, pp. 51–70. Springer, Heidelberg (1995)

    Google Scholar 

  24. Alonso, G., Kamath, M., Agrawal, D., Abbadi, A.E., Gunthor, R., Mohan, C.: Failure handling in large scale workflow management systems. Technical report, IBM Almaden Research Center (1995)

    Google Scholar 

  25. Chen, Q., Dayal, U.: Failure handling for transaction hierarchies. In: ICDE 1997: Proceedings of the Thirteenth International Conference on Data Engineering, pp. 245–254. IEEE Computer Society Press, Los Alamitos (1997)

    Chapter  Google Scholar 

  26. Tang, J., Hwang, S.-Y.: A scheme to specify and implement ad-hoc recovery in workflow systems. In: Schek, H.-J., Saltor, F., Ramos, I., Alonso, G. (eds.) EDBT 1998. LNCS, vol. 1377, pp. 484–498. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gaaloul, W., Godart, C. (2005). Mining Workflow Recovery from Event Based Logs. In: van der Aalst, W.M.P., Benatallah, B., Casati, F., Curbera, F. (eds) Business Process Management. BPM 2005. Lecture Notes in Computer Science, vol 3649. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11538394_12

Download citation

  • DOI: https://doi.org/10.1007/11538394_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28238-9

  • Online ISBN: 978-3-540-31929-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics