| Download | - View final version: Abductive workflow mining (PDF, 543 KiB)
|
|---|
| DOI | Resolve DOI: https://doi.org/10.4224/9174610 |
|---|
| Author | Search for: Buffett, Scott1 |
|---|
| Affiliation | - National Research Council Canada. NRC Institute for Information Technology
|
|---|
| Format | Text, Technical Report |
|---|
| Abstract | We define a new approach to discovering important workflows from event logs, referred to as abductive workflow mining, as the process of determining activity that would necessarily imply that certain predetermined critical activity should necessarily take place. Whenever critical activity is observed, one can inspect the abductive workflow to ascertain whether there was sufficient reason for the critical activity to occur. Initial theory surrounding the concept of abductive workflow is defined, and an initial method for discovering abductive workflows is presented. Preliminary experiments show that relatively small and concise abductive workflow models can be constructed, in comparison with constructing a complete model for the entire log. |
|---|
| Publication date | 2008 |
|---|
| Publisher | National Research Council of Canada. Institute for Information Technology |
|---|
| Other format | |
|---|
| Language | English |
|---|
| NRC number | NRCC 50393 |
|---|
| NPARC number | 9174610 |
|---|
| Export citation | Export as RIS |
|---|
| Report a correction | Report a correction (opens in a new tab) |
|---|
| Record identifier | 2fd3cf13-7f40-4b7c-bf43-d07ea1dd0e05 |
|---|
| Record created | 2009-06-30 |
|---|
| Record modified | 2022-09-13 |
|---|