Skip to main content

Getting the Data

  • Chapter
Process Mining

Abstract

Process mining is impossible without proper event logs. This chapter describes the information that should be present in such event logs. Depending on the process mining technique used, these requirements may vary. The challenge is to extract such data from a variety of data sources, e.g., databases, flat files, message logs, transaction logs, ERP systems, and document management systems. When merging and extracting data, both syntax and semantics play an important role. Moreover, depending on the questions one seeks to answer, different views on the available data are needed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In the remainder, we assume # trace (c)≠〈 〉, i.e., traces in a log contain at least one event.

  2. 2.

    Note that we still assume that each trace contains at least one element, i.e., σ∈L implies σ≠〈 〉.

References

  1. ACSI. Artifact-Centric Service Interoperation (ACSI) Project Home Page. www.acsi-project.eu.

  2. R.P.J.C. Bose and W.M.P. van der Aalst. Abstractions in Process Mining: A Taxonomy of Patterns. In U. Dayal, J. Eder, J. Koehler, and H. Reijers, editors, Business Process Management (BPM 2009), volume 5701 of Lecture Notes in Computer Science, pages 159–175. Springer, Berlin, 2009.

    Chapter  Google Scholar 

  3. S. Davidson, S. Cohen-Boulakia, A. Eyal, B. Ludaescher, T. McPhillips, S. Bowers, M. Anand, and J. Freire. Provenance in Scientific Workflow Systems. Data Engineering Bulletin, 30(4):44–50, 2007.

    Google Scholar 

  4. P.C. Diniz and D.R. Ferreira. Automatic Extraction of Process Control Flow from I/O Operations. In M. Dumas, M. Reichert, and M.C. Shan, editors, Business Process Management (BPM 2008), volume 5240 of Lecture Notes in Computer Science, pages 342–357. Springer, Berlin, 2008.

    Chapter  Google Scholar 

  5. D.R. Ferreira and D. Gillblad. Discovering Process Models from Unlabelled Event Logs. In U. Dayal, J. Eder, J. Koehler, and H. Reijers, editors, Business Process Management (BPM 2009), volume 5701 of Lecture Notes in Computer Science, pages 143–158. Springer, Berlin, 2009.

    Chapter  Google Scholar 

  6. C.W. Günther. XES Standard Definition. www.xes-standard.org, 2009.

  7. W.M.P. van der Aalst, P. Barthelmess, C.A. Ellis, and J. Wainer. Proclets: A Framework for Lightweight Interacting Workflow Processes. International Journal of Cooperative Information Systems, 10(4):443–482, 2001.

    Article  Google Scholar 

  8. W.M.P. van der Aalst, M. Dumas, C. Ouyang, A. Rozinat, and H.M.W. Verbeek. Conformance Checking of Service Behavior. ACM Transactions on Internet Technology, 8(3):29–59, 2008.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wil M. P. van der Aalst .

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

van der Aalst, W.M.P. (2011). Getting the Data. In: Process Mining. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19345-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19345-3_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19344-6

  • Online ISBN: 978-3-642-19345-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics