A bottom-up workflow mining approach for workflow applications analysis

Walid Gaaloul, Karim Baïna, Claude Godart

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Engineering workflow applications are becoming more and more complex, involving numerous interacting business objects within considerable processes. Analysing the interaction structure of those complex applications will enable them to be well understood, controlled, and redesigned. Our contribution to workflow mining is a statistical technique to discover workflow patterns from event-based log. Our approach is characterised by a "local" workflow patterns discovery that allows to cover partial results through a dynamic programming algorithm. Those local discovered workflow patterns are then composed iterativety until discovering the global workflow model. Our approach has been implemented within our prototype WorkflowMiner.

Original languageEnglish
Title of host publicationData Engineering Issues in E-Commerce and Services - Second International Workshop, DEECS 2006, Proceedings
PublisherSpringer Verlag
Pages182-197
Number of pages16
ISBN (Print)3540354409, 9783540354406
DOIs
Publication statusPublished - 1 Jan 2006
Externally publishedYes
Event2nd International Workshop on Data Engineering Issues in E-Commerce and Services, DEECS 2006 - San Francisco, CA, United States
Duration: 26 Jun 200626 Jun 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4055 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2nd International Workshop on Data Engineering Issues in E-Commerce and Services, DEECS 2006
Country/TerritoryUnited States
CitySan Francisco, CA
Period26/06/0626/06/06

Keywords

  • Business process Analysis
  • Business process intelligence
  • Workflow mining
  • Workflow patterns

Fingerprint

Dive into the research topics of 'A bottom-up workflow mining approach for workflow applications analysis'. Together they form a unique fingerprint.

Cite this