Skip to main content

Conformance Checking Based on Uncertain Event-Activity Mappings

  • Chapter
  • First Online:
Book cover Comparing and Aligning Process Representations

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 323))

  • 315 Accesses

Abstract

Conformance-checking techniques enable organizations to automatically determine whether business processes are executed according to their specifications. Particularly, they check if observed behavior, as recorded in an IT system and represented in the form of event logs, conforms to the allowed process behavior, typically captured in a process model [20]. The importance of conformance checking has been recognized in various contexts, such as legal compliance [229] and auditing [17]. Due to this importance, numerous conformance-checking techniques have been developed (cf. [12, 20, 191]). A crucial requirement for all these techniques is that the events contained in an event log can be related to the activities of a process model [11]. Without knowing the relations between events and model activities, it is not possible to determine if the behavior within a trace conforms to the behavior specified by a process model. Despite this dependence on the existence of a, so-called, event-to-activity mapping, establishing these mappings is a highly complex task. In particular, mapping techniques face considerable challenges caused by, among others, cryptic event names, non-conforming behavior, and noise [33]. As a result, the goal of mapping techniques is to choose the best mapping from a number of potential ones [167]. This introduces the risk that the selected mapping does not correctly capture the relations between traces and a process model. In the context of conformance checking, selecting an incorrect mapping is particularly harmful. If the selected mapping is incorrect, the results obtained through conformance checking can become incorrect as well. To overcome this issue, this chapter presents a conformance-checking technique that can be applied in spite of an uncertain mapping of events onto activities. Our technique assesses the conformance of a trace by considering the entire spectrum of potential mappings, rather than focusing on a single one. As a result, our conformance-checking technique avoids the risks associated with the selection of an incorrect mapping.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Parts of this chapter have appeared in: [5].

  2. 2.

    See www.promtools.org for more information and to download the framework.

  3. 3.

    Provided by the Event2ActivityMatcher package.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Han van der Aa .

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

van der Aa, H. (2018). Conformance Checking Based on Uncertain Event-Activity Mappings. In: Comparing and Aligning Process Representations. Lecture Notes in Business Information Processing, vol 323. Springer, Cham. https://doi.org/10.1007/978-3-319-94634-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-94634-4_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-94633-7

  • Online ISBN: 978-3-319-94634-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics