Skip to main content

Showing 1–50 of 67 results for author: Dumas, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.08332  [pdf, other

    math.CO cs.DM cs.DS

    Detecting $K_{2,3}$ as an induced minor

    Authors: Clément Dallard, Maël Dumas, Claire Hilaire, Martin Milanič, Anthony Perez, Nicolas Trotignon

    Abstract: We consider a natural generalization of chordal graphs, in which every minimal separator induces a subgraph with independence number at most $2$. Such graphs can be equivalently defined as graphs that do not contain the complete bipartite graph $K_{2,3}$ as an induced minor, that is, graphs from which $K_{2,3}$ cannot be obtained by a sequence of edge contractions and vertex deletions. We develo… ▽ More

    Submitted 13 February, 2024; originally announced February 2024.

    Comments: 18 pages

    MSC Class: 05C75 (Primary); 05C85; 05C83; 05C40; 05C69 (Secondary)

  2. arXiv:2312.05560  [pdf, other

    cs.LG

    Enhancing the Accuracy of Predictors of Activity Sequences of Business Processes

    Authors: Muhammad Awais Ali, Marlon Dumas, Fredrik Milani

    Abstract: Predictive process monitoring is an evolving research field that studies how to train and use predictive models for operational decision-making. One of the problems studied in this field is that of predicting the sequence of upcoming activities in a case up to its completion, a.k.a. the case suffix. The prediction of case suffixes provides input to estimate short-term workloads and execution times… ▽ More

    Submitted 9 December, 2023; originally announced December 2023.

    ACM Class: I.2.6; H.4.1

  3. arXiv:2307.06564  [pdf, other

    cs.AI cs.LG

    Prescriptive Process Monitoring Under Resource Constraints: A Reinforcement Learning Approach

    Authors: Mahmoud Shoush, Marlon Dumas

    Abstract: Prescriptive process monitoring methods seek to optimize the performance of business processes by triggering interventions at runtime, thereby increasing the probability of positive case outcomes. These interventions are triggered according to an intervention policy. Reinforcement learning has been put forward as an approach to learning intervention policies through trial and error. Existing appro… ▽ More

    Submitted 20 January, 2024; v1 submitted 13 July, 2023; originally announced July 2023.

  4. arXiv:2306.16899  [pdf, other

    cs.DS cs.CC

    An improved kernelization algorithm for Trivially Perfect Editing

    Authors: Maël Dumas, Anthony Perez

    Abstract: In the Trivially Perfect Editing problem one is given an undirected graph $G = (V,E)$ and an integer $k$ and seeks to add or delete at most $k$ edges in $G$ to obtain a trivially perfect graph. In a recent work, Dumas, Perez and Todinca [Algorithmica 2023] proved that this problem admits a kernel with $O(k^3)$ vertices. This result heavily relies on the fact that the size of trivially perfect modu… ▽ More

    Submitted 26 October, 2023; v1 submitted 29 June, 2023; originally announced June 2023.

  5. arXiv:2303.17463  [pdf, other

    cs.SE cs.LG

    Can I Trust My Simulation Model? Measuring the Quality of Business Process Simulation Models

    Authors: David Chapela-Campa, Ismail Benchekroun, Opher Baron, Marlon Dumas, Dmitry Krass, Arik Senderovich

    Abstract: Business Process Simulation (BPS) is an approach to analyze the performance of business processes under different scenarios. For example, BPS allows us to estimate what would be the cycle time of a process if one or more resources became unavailable. The starting point of BPS is a process model annotated with simulation parameters (a BPS model). BPS models may be manually designed, based on inform… ▽ More

    Submitted 30 March, 2023; originally announced March 2023.

    Comments: Preprint submitted to the 21st International Conference on Business Process Management (BPM 2023)

  6. arXiv:2303.03572  [pdf, other

    cs.LG cs.AI stat.ME

    Learning When to Treat Business Processes: Prescriptive Process Monitoring with Causal Inference and Reinforcement Learning

    Authors: Zahra Dasht Bozorgi, Marlon Dumas, Marcello La Rosa, Artem Polyvyanyy, Mahmoud Shoush, Irene Teinemaa

    Abstract: Increasing the success rate of a process, i.e. the percentage of cases that end in a positive outcome, is a recurrent process improvement goal. At runtime, there are often certain actions (a.k.a. treatments) that workers may execute to lift the probability that a case ends in a positive outcome. For example, in a loan origination process, a possible treatment is to issue multiple loan offers to in… ▽ More

    Submitted 6 March, 2023; originally announced March 2023.

  7. arXiv:2212.03710  [pdf, other

    cs.LG cs.AI

    Intervening With Confidence: Conformal Prescriptive Monitoring of Business Processes

    Authors: Mahmoud Shoush, Marlon Dumas

    Abstract: Prescriptive process monitoring methods seek to improve the performance of a process by selectively triggering interventions at runtime (e.g., offering a discount to a customer) to increase the probability of a desired case outcome (e.g., a customer making a purchase). The backbone of a prescriptive process monitoring method is an intervention policy, which determines for which cases and when an i… ▽ More

    Submitted 7 December, 2022; originally announced December 2022.

  8. arXiv:2212.01392  [pdf, other

    cs.DB

    Why am I Waiting? Data-Driven Analysis of Waiting Times in Business Processes

    Authors: Katsiaryna Lashkevich, Fredrik Milani, David Chapela-Campa, Ihar Suvorau, Marlon Dumas

    Abstract: Waiting times in a business process often arise when a case transitions from one activity to another. Accordingly, analyzing the causes of waiting times of activity transitions can help analysts to identify opportunities for reducing the cycle time of a process. This paper proposes a process mining approach to decompose the waiting time observed in each activity transition in a process into multip… ▽ More

    Submitted 2 December, 2022; originally announced December 2022.

    ACM Class: H.4.1

  9. arXiv:2211.07588  [pdf, other

    cs.LG cs.DB

    Row Conditional-TGAN for generating synthetic relational databases

    Authors: Mohamed Gueye, Yazid Attabi, Maxime Dumas

    Abstract: Besides reproducing tabular data properties of standalone tables, synthetic relational databases also require modeling the relationships between related tables. In this paper, we propose the Row Conditional-Tabular Generative Adversarial Network (RC-TGAN), a novel generative adversarial network (GAN) model that extends the tabular GAN to support modeling and synthesizing relational databases. The… ▽ More

    Submitted 14 November, 2022; originally announced November 2022.

  10. arXiv:2208.12224  [pdf, other

    cs.OH

    Repairing Activity Start Times to Improve Business Process Simulation

    Authors: David Chapela-Campa, Marlon Dumas

    Abstract: Business Process Simulation (BPS) is a common technique to estimate the impact of business process changes, e.g. what would be the cycle time of a process if the number of traces increases? The starting point of BPS is a business process model annotated with simulation parameters (a BPS model). Several studies have proposed methods to automatically discover BPS models from event logs -- extracted… ▽ More

    Submitted 24 August, 2022; originally announced August 2022.

    Comments: arXiv admin note: text overlap with arXiv:2206.14051

  11. arXiv:2208.07928  [pdf, ps, other

    cs.OH

    Business Process Simulation with Differentiated Resources: Does it Make a Difference?

    Authors: Orlenys Lopez-Pintado, Marlon Dumas

    Abstract: Business process simulation is a versatile technique to predict the impact of one or more changes on the performance of a process. Mainstream approaches in this space suffer from various limitations, some stemming from the fact that they treat resources as undifferentiated entities grouped into resource pools. These approaches assume that all resources in a pool have the same performance and share… ▽ More

    Submitted 16 August, 2022; originally announced August 2022.

    Comments: Published in the Proceedings of the International Conference on Business Process Management (BPM'2022)

  12. arXiv:2206.15088  [pdf, other

    cs.DM cs.CC cs.DS math.CO

    On graphs coverable by k shortest paths

    Authors: Maël Dumas, Florent Foucaud, Anthony Perez, Ioan Todinca

    Abstract: We show that if the edges or vertices of an undirected graph $G$ can be covered by $k$ shortest paths, then the pathwidth of $G$ is upper-bounded by a single-exponential function of $k$. As a corollary, we prove that the problem Isometric Path Cover with Terminals (which, given a graph $G$ and a set of $k$ pairs of vertices called terminals, asks whether $G$ can be covered by $k$ shortest paths, e… ▽ More

    Submitted 14 April, 2023; v1 submitted 30 June, 2022; originally announced June 2022.

  13. Enhancing Business Process Simulation Models with Extraneous Activity Delays

    Authors: David Chapela-Campa, Marlon Dumas

    Abstract: Business Process Simulation (BPS) is a common approach to estimate the impact of changes to a business process on its performance measures. For example, it allows us to estimate what would be the cycle time of a process if we automated one of its activities, or if some resources become unavailable. The starting point of BPS is a business process model annotated with simulation parameters (a BPS mo… ▽ More

    Submitted 2 February, 2024; v1 submitted 28 June, 2022; originally announced June 2022.

    Comments: Extended version of the ICPM 2022 publication (see v1)

    Journal ref: Information Systems (2024), 102346

  14. arXiv:2206.13050  [pdf, other

    cs.CR

    Libra: High-Utility Anonymization of Event Logs for Process Mining via Subsampling

    Authors: Gamal Elkoumy, Marlon Dumas

    Abstract: Process mining techniques enable analysts to identify and assess process improvement opportunities based on event logs. A common roadblock to process mining is that event logs may contain private information that cannot be used for analysis without consent. An approach to overcome this roadblock is to anonymize the event log so that no individual represented in the original log can be singled out… ▽ More

    Submitted 27 June, 2022; originally announced June 2022.

  15. arXiv:2206.07745  [pdf, other

    cs.AI cs.LG

    When to intervene? Prescriptive Process Monitoring Under Uncertainty and Resource Constraints

    Authors: Mahmoud Shoush, Marlon Dumas

    Abstract: Prescriptive process monitoring approaches leverage historical data to prescribe runtime interventions that will likely prevent negative case outcomes or improve a process's performance. A centerpiece of a prescriptive process monitoring method is its intervention policy: a decision function determining if and when to trigger an intervention on an ongoing case. Previous proposals in this field rel… ▽ More

    Submitted 15 June, 2022; originally announced June 2022.

    Comments: BPM 2022 (20th International Conference on Business Process Management)

  16. arXiv:2201.13140  [pdf, other

    cs.DS cs.CC

    Polynomial kernels for edge modification problems towards block and strictly chordal graphs

    Authors: Maël Dumas, Anthony Perez, Mathis Rocton, Ioan Todinca

    Abstract: We consider edge modification problems towards block and strictly chordal graphs, where one is given an undirected graph $G = (V,E)$ and an integer $k \in \mathbb{N}$ and seeks to edit (add or delete) at most $k$ edges from $G$ to obtain a block graph or a strictly chordal graph. The completion and deletion variants of these problems are defined similarly by only allowing edge additions for the fo… ▽ More

    Submitted 1 February, 2024; v1 submitted 31 January, 2022; originally announced January 2022.

  17. arXiv:2201.12855  [pdf, ps, other

    cs.AI cs.SE

    AI-Augmented Business Process Management Systems: A Research Manifesto

    Authors: Marlon Dumas, Fabiana Fournier, Lior Limonad, Andrea Marrella, Marco Montali, Jana-Rebecca Rehse, Rafael Accorsi, Diego Calvanese, Giuseppe De Giacomo, Dirk Fahland, Avigdor Gal, Marcello La Rosa, Hagen Völzer, Ingo Weber

    Abstract: AI-Augmented Business Process Management Systems (ABPMSs) are an emerging class of process-aware information systems, empowered by trustworthy AI technology. An ABPMS enhances the execution of business processes with the aim of making these processes more adaptable, proactive, explainable, and context-sensitive. This manifesto presents a vision for ABPMSs and discusses research challenges that nee… ▽ More

    Submitted 4 November, 2022; v1 submitted 30 January, 2022; originally announced January 2022.

    Comments: 19 pages, 1 figure

    Journal ref: ACM Transactions on Management Information Systems, 31 January 2023 Volume 14, Issue 1, Article No.: 11, pp 1-19

  18. arXiv:2201.03010  [pdf, other

    cs.CR cs.SE

    Differentially Private Release of Event Logs for Process Mining

    Authors: Gamal Elkoumy, Alisa Pankova, Marlon Dumas

    Abstract: The applicability of process mining techniques hinges on the availability of event logs capturing the execution of a business process. In some use cases, particularly those involving customer-facing processes, these event logs may contain private information. Data protection regulations restrict the use of such event logs for analysis purposes. One way of circumventing these restrictions is to ano… ▽ More

    Submitted 15 December, 2022; v1 submitted 9 January, 2022; originally announced January 2022.

    Comments: arXiv admin note: text overlap with arXiv:2103.11739

  19. arXiv:2112.04623  [pdf, other

    cs.DS cs.SE

    Efficient Checking of Temporal Compliance Rules Over Business Process Event Logs

    Authors: Adriano Augusto, Ahmed Awad, Marlon Dumas

    Abstract: Verifying temporal compliance rules, such as a rule stating that an inquiry must be answered within a time limit, is a recurrent operation in the realm of business process compliance. In this setting, a typical use case is one where a manager seeks to retrieve all cases where a temporal rule is violated, given an event log recording the execution of a process over a time period. Existing approache… ▽ More

    Submitted 9 December, 2021; v1 submitted 8 December, 2021; originally announced December 2021.

  20. arXiv:2112.01769  [pdf, other

    cs.AI cs.LG

    Prescriptive Process Monitoring: Quo Vadis?

    Authors: Kateryna Kubrak, Fredrik Milani, Alexander Nolte, Marlon Dumas

    Abstract: Prescriptive process monitoring methods seek to optimize a business process by recommending interventions at runtime to prevent negative outcomes or poorly performing cases. In recent years, various prescriptive process monitoring methods have been proposed. This paper studies existing methods in this field via a Systematic Literature Review (SLR). In order to structure the field, the paper propos… ▽ More

    Submitted 3 December, 2021; originally announced December 2021.

  21. arXiv:2109.02894  [pdf, other

    cs.LG cs.AI

    Prescriptive Process Monitoring Under Resource Constraints: A Causal Inference Approach

    Authors: Mahmoud Shoush, Marlon Dumas

    Abstract: Prescriptive process monitoring is a family of techniques to optimize the performance of a business process by triggering interventions at runtime. Existing prescriptive process monitoring techniques assume that the number of interventions that may be triggered is unbounded. In practice, though, specific interventions consume resources with finite capacity. For example, in a loan origination proce… ▽ More

    Submitted 11 October, 2021; v1 submitted 7 September, 2021; originally announced September 2021.

  22. arXiv:2106.13446  [pdf, other

    cs.SE

    Discovering executable routine specifications from user interaction logs

    Authors: Volodymyr Leno, Adriano Augusto, Marlon Dumas, Marcello La Rosa, Fabrizio Maria Maggi, Artem Polyvyanyy

    Abstract: Robotic Process Automation (RPA) is a technology to automate routine work such as copying data across applications or filling in document templates using data from multiple applications. RPA tools allow organizations to automate a wide range of routines. However, identifying and sco** routines that can be automated using RPA tools is time consuming. Manual identification of candidate routines vi… ▽ More

    Submitted 25 June, 2021; originally announced June 2021.

    Comments: 41 pages, 6 figures, 10 tables. arXiv admin note: text overlap with arXiv:2008.05782

  23. arXiv:2105.08549  [pdf, other

    cs.DS cs.CC

    A cubic vertex-kernel for Trivially Perfect Editing

    Authors: Maël Dumas, Anthony Perez, Ioan Todinca

    Abstract: We consider the Trivially Perfect Editing problem, where one is given an undirected graph $G = (V,E)$ and a parameter $k \in \mathbb{N}$ and seeks to edit (add or delete) at most $k$ edges from $G$ to obtain a trivially perfect graph. The related Trivially Perfect Completion and Trivially Perfect Deletion problems are obtained by only allowing edge additions or edge deletions, respectively. Trivia… ▽ More

    Submitted 18 May, 2021; originally announced May 2021.

  24. arXiv:2105.07111  [pdf, other

    cs.LG cs.AI

    Prescriptive Process Monitoring for Cost-Aware Cycle Time Reduction

    Authors: Zahra Dasht Bozorgi, Irene Teinemaa, Marlon Dumas, Marcello La Rosa, Artem Polyvyanyy

    Abstract: Reducing cycle time is a recurrent concern in the field of business process management. Depending on the process, various interventions may be triggered to reduce the cycle time of a case, for example, using a faster ship** service in an order-to-delivery process or giving a phone call to a customer to obtain missing information rather than waiting passively. Each of these interventions comes wi… ▽ More

    Submitted 14 September, 2021; v1 submitted 14 May, 2021; originally announced May 2021.

  25. arXiv:2105.06016  [pdf, other

    cs.SE

    Automated Discovery of Process Models with True Concurrency and Inclusive Choices

    Authors: Adriano Augusto, Marlon Dumas, Marcello La Rosa

    Abstract: Enterprise information systems allow companies to maintain detailed records of their business process executions. These records can be extracted in the form of event logs, which capture the execution of activities across multiple instances of a business process. Event logs may be used to analyze business processes at a fine level of detail using process mining techniques. Among other things, proce… ▽ More

    Submitted 12 May, 2021; originally announced May 2021.

  26. Learning Accurate Business Process Simulation Models from Event Logs via Automated Process Discovery and Deep Learning

    Authors: Manuel Camargo, Marlon Dumas, Oscar González-Rojas

    Abstract: Business process simulation is a well-known approach to estimate the impact of changes to a process with respect to time and cost measures -- a practice known as what-if process analysis. The usefulness of such estimations hinges on the accuracy of the underlying simulation model. Data-Driven Simulation (DDS) methods leverage process mining techniques to learn process simulation models from event… ▽ More

    Submitted 19 March, 2022; v1 submitted 22 March, 2021; originally announced March 2021.

    Comments: 16 pages, 4 figures

  27. arXiv:2103.11739  [pdf, other

    cs.CR cs.SE

    Mine Me but Don't Single Me Out: Differentially Private Event Logs for Process Mining

    Authors: Gamal Elkoumy, Alisa Pankova, Marlon Dumas

    Abstract: The applicability of process mining techniques hinges on the availability of event logs capturing the execution of a business process. In some use cases, particularly those involving customer-facing processes, these event logs may contain private information. Data protection regulations restrict the use of such event logs for analysis purposes. One way of circumventing these restrictions is to ano… ▽ More

    Submitted 30 August, 2021; v1 submitted 22 March, 2021; originally announced March 2021.

  28. arXiv:2012.01119  [pdf, other

    cs.CR cs.SE

    Privacy-Preserving Directly-Follows Graphs: Balancing Risk and Utility in Process Mining

    Authors: Gamal Elkoumy, Alisa Pankova, Marlon Dumas

    Abstract: Process mining techniques enable organizations to analyze business process execution traces in order to identify opportunities for improving their operational performance. Oftentimes, such execution traces contain private information. For example, the execution traces of a healthcare process are likely to be privacy-sensitive. In such cases, organizations need to deploy Privacy-Enhancing Technolog… ▽ More

    Submitted 3 December, 2020; v1 submitted 2 December, 2020; originally announced December 2020.

  29. arXiv:2009.03567  [pdf, other

    cs.AI cs.LG cs.SE

    Discovering Generative Models from Event Logs: Data-driven Simulation vs Deep Learning

    Authors: Manuel Camargo, Marlon Dumas, Oscar Gonzalez-Rojas

    Abstract: A generative model is a statistical model that is able to generate new data instances from previously observed ones. In the context of business processes, a generative model creates new execution traces from a set of historical traces, also known as an event log. Two families of generative process simulation models have been developed in previous work: data-driven simulation models and deep learni… ▽ More

    Submitted 8 September, 2020; originally announced September 2020.

    Comments: 12 pages, 4 figures

  30. arXiv:2009.01561  [pdf, other

    cs.LG stat.ML

    Process Mining Meets Causal Machine Learning: Discovering Causal Rules from Event Logs

    Authors: Zahra Dasht Bozorgi, Irene Teinemaa, Marlon Dumas, Marcello La Rosa, Artem Polyvyanyy

    Abstract: This paper proposes an approach to analyze an event log of a business process in order to generate case-level recommendations of treatments that maximize the probability of a given outcome. Users classify the attributes in the event log into controllable and non-controllable, where the former correspond to attributes that can be altered during an execution of the process (the possible treatments).… ▽ More

    Submitted 3 September, 2020; originally announced September 2020.

    Comments: 8 pages, 4 figures, conference

  31. arXiv:2008.05782  [pdf, other

    cs.SE

    Identifying candidate routines for Robotic Process Automation from unsegmented UI logs

    Authors: V. Leno, A. Augusto, M. Dumas, M. La Rosa, F. Maggi, A. Polyvyanyy

    Abstract: Robotic Process Automation (RPA) is a technology to develop software bots that automate repetitive sequences of interactions between users and software applications (a.k.a. routines). To take full advantage of this technology, organizations need to identify and to scope their routines. This is a challenging endeavor in large organizations, as routines are usually not concentrated in a handful of p… ▽ More

    Submitted 26 August, 2020; v1 submitted 13 August, 2020; originally announced August 2020.

    Comments: International Conference on Process Mining 2020

  32. Detecting sudden and gradual drifts in business processes from execution traces

    Authors: Abderrahmane Maaradji, Marlon Dumas, Marcello La Rosa, Alireza Ostovar

    Abstract: Business processes are prone to unexpected changes, as process workers may suddenly or gradually start executing a process differently in order to adjust to changes in workload, season, or other external factors. Early detection of business process changes enables managers to identify and act upon changes that may otherwise affect process performance. Business process drift detection refers to a f… ▽ More

    Submitted 7 May, 2020; originally announced May 2020.

    Journal ref: IEEE Transactions on Knowledge and Data Engineering 29, no. 10 (2017)

  33. arXiv:2004.09138  [pdf, other

    cs.SE

    Discovering Business Process Simulation Models in the Presence of Multitasking

    Authors: Bedilia Estrada-Torres, Manuel Camargo, Marlon Dumas, Maksym Yerokhin

    Abstract: Business process simulation is a versatile technique for analyzing business processes from a quantitative perspective. A well-known limitation of process simulation is that the accuracy of the simulation results is limited by the faithfulness of the process model and simulation parameters given as input to the simulator. To tackle this limitation, several authors have proposed to discover simulati… ▽ More

    Submitted 20 April, 2020; originally announced April 2020.

    Comments: Accepted at The 14th International Conference on Research Challenges in Information Science (RCIS 2020). 17 pages, 4 figures

  34. arXiv:2001.01007  [pdf, other

    cs.AI

    Automated Discovery of Data Transformations for Robotic Process Automation

    Authors: Volodymyr Leno, Marlon Dumas, Marcello La Rosa, Fabrizio Maria Maggi, Artem Polyvyanyy

    Abstract: Robotic Process Automation (RPA) is a technology for automating repetitive routines consisting of sequences of user interactions with one or more applications. In order to fully exploit the opportunities opened by RPA, companies need to discover which specific routines may be automated, and how. In this setting, this paper addresses the problem of analyzing User Interaction (UI) logs in order to d… ▽ More

    Submitted 3 January, 2020; originally announced January 2020.

    Comments: 8 pages, 5 figures. To be published in proceedings of AAAI-20 workshop on Intelligent Process Automation

  35. arXiv:1912.01855  [pdf, other

    cs.CR

    Secure Multi-Party Computation for Inter-Organizational Process Mining

    Authors: Gamal Elkoumy, Stephan A. Fahrenkrog-Petersen, Marlon Dumas, Peeter Laud, Alisa Pankova, Matthias Weildich

    Abstract: Process mining is a family of techniques for analysing business processes based on event logs extracted from information systems. Mainstream process mining tools are designed for intra-organizational settings, insofar as they assume that an event log is available for processing as a whole. The use of such tools for inter-organizational process analysis is hampered by the fact that such processes i… ▽ More

    Submitted 13 April, 2020; v1 submitted 4 December, 2019; originally announced December 2019.

    Comments: 15 pages ,5 figures

  36. arXiv:1911.07582  [pdf, other

    cs.OH

    Business Process Variant Analysis: Survey and Classification

    Authors: Farbod Taymouri, Marcello La Rosa, Marlon Dumas, Fabrizio Maria Maggi

    Abstract: Process variant analysis aims at identifying and addressing the differences existing in a set of process executions enacted by the same process model. A process model can be executed differently in different situations for various reasons, e.g., the process could run in different locations or seasons, which gives rise to different behaviors. Having intuitions about the discrepancies in process beh… ▽ More

    Submitted 22 December, 2019; v1 submitted 18 November, 2019; originally announced November 2019.

  37. arXiv:1910.09767  [pdf, other

    cs.SE

    Scalable Alignment of Process Models and Event Logs: An Approach Based on Automata and S-Components

    Authors: Daniel Reißner, Abel Armas-Cervantes, Raffaele Conforti, Marlon Dumas, Dirk Fahland, Marcello La Rosa

    Abstract: Given a model of the expected behavior of a business process and an event log recording its observed behavior, the problem of business process conformance checking is that of identifying and describing the differences between the model and the log. A desirable feature of a conformance checking technique is to identify a minimal yet complete set of differences. Existing conformance checking techniq… ▽ More

    Submitted 4 March, 2020; v1 submitted 22 October, 2019; originally announced October 2019.

  38. arXiv:1910.05470  [pdf, other

    cs.CY physics.ed-ph physics.soc-ph

    The Scalability, Efficiency and Complexity of Universities and Colleges: A New Lens for Assessing the Higher Educational System

    Authors: Ryan C. Taylor, Xiaofan Liang, Manfred D. Laubichler, Geoffrey B. West, Christopher P. Kempes, Marion Dumas

    Abstract: The growing need for affordable and accessible higher education is a major global challenge for the 21st century. Consequently, there is a need to develop a deeper understanding of the functionality and taxonomy of universities and colleges and, in particular, how their various characteristics change with size. Scaling has been a powerful tool for revealing systematic regularities in systems acros… ▽ More

    Submitted 11 October, 2019; originally announced October 2019.

  39. Automated Discovery of Business Process Simulation Models from Event Logs

    Authors: Manuel Camargo, Marlon Dumas, Oscar González-Rojas

    Abstract: Business process simulation is a versatile technique to estimate the performance of a process under multiple scenarios. This, in turn, allows analysts to compare alternative options to improve a business process. A common roadblock for business process simulation is that constructing accurate simulation models is cumbersome and error-prone. Modern information systems store detailed execution logs… ▽ More

    Submitted 27 February, 2020; v1 submitted 11 October, 2019; originally announced October 2019.

    Comments: 34 pages, 5 figures, Research paper

  40. arXiv:1906.01420  [pdf, other

    cs.SE

    Interpreted Execution of Business Process Models on Blockchain

    Authors: Orlenys López-Pintado, Marlon Dumas, Luciano García-Bañuelos, Ingo Weber

    Abstract: Blockchain technology provides a tamper-proof mechanism to execute inter-organizational business processes involving mutually untrusted parties. Existing approaches to blockchain-based process execution are based on code generation. In these approaches, a process model is compiled into one or more smart contracts, which are then deployed on a blockchain platform. Given the immutability of the depl… ▽ More

    Submitted 4 June, 2019; originally announced June 2019.

    Comments: Preprint for 23rd IEEE International EDOC 2019 Conference (conference proceedings IEEE Computer Society Press)

  41. arXiv:1905.09568  [pdf, other

    cs.LG cs.AI stat.ML

    Fire Now, Fire Later: Alarm-Based Systems for Prescriptive Process Monitoring

    Authors: Stephan A. Fahrenkrog-Petersen, Niek Tax, Irene Teinemaa, Marlon Dumas, Massimiliano de Leoni, Fabrizio Maria Maggi, Matthias Weidlich

    Abstract: Predictive process monitoring is a family of techniques to analyze events produced during the execution of a business process in order to predict the future state or the final outcome of running process instances. Existing techniques in this field are able to predict, at each step of a process instance, the likelihood that it will lead to an undesired outcome.These techniques, however, focus on ge… ▽ More

    Submitted 14 October, 2020; v1 submitted 23 May, 2019; originally announced May 2019.

  42. arXiv:1902.05052  [pdf, other

    cs.CR

    Business Process Privacy Analysis in Pleak

    Authors: Aivo Toots, Reedik Tuuling, Maksym Yerokhin, Marlon Dumas, Luciano García-Bañuelos, Peeter Laud, Raimundas Matulevičius, Alisa Pankova, Martin Pettai, Pille Pullonen, Jake Tom

    Abstract: Pleak is a tool to capture and analyze privacy-enhanced business process models to characterize and quantify to what extent the outputs of a process leak information about its inputs. Pleak incorporates an extensible set of analysis plugins, which enable users to inspect potential leakages at multiple levels of detail.

    Submitted 13 February, 2019; originally announced February 2019.

    Comments: Appears at 22nd International Conference on Fundamental Approaches to Software Engineering (FASE), April 2019

  43. Dynamic Role Binding in Blockchain-Based Collaborative Business Processes

    Authors: Orlenys López-Pintado, Marlon Dumas, Luciano García-Bañuelos, Ingo Weber

    Abstract: Blockchain technology enables the execution of collaborative business processes involving mutually untrusted parties. Existing platforms allow such processes to be modeled using high-level notations and compiled into smart contracts that can be deployed on blockchain platforms. However, these platforms brush aside the question of who is allowed to execute which tasks in the process, either by defe… ▽ More

    Submitted 7 December, 2018; originally announced December 2018.

    Comments: Preprint for CAiSE'19 (conference proceedings in Springer Lecture Notes in Computer Science (LNCS))

  44. arXiv:1808.03517  [pdf, other

    cs.SE

    CATERPILLAR: A Business Process Execution Engine on the Ethereum Blockchain

    Authors: Orlenys López-Pintado, Luciano García-Bañuelos, Marlon Dumas, Ingo Weber, Alex Ponomarev

    Abstract: Blockchain platforms, such as Ethereum, allow a set of actors to maintain a ledger of transactions without relying on a central authority and to deploy scripts, called smart contracts, that are executed whenever certain transactions occur. These features can be used as basic building blocks for executing collaborative business processes between mutually untrusting parties. However, implementing bu… ▽ More

    Submitted 22 April, 2019; v1 submitted 10 July, 2018; originally announced August 2018.

    Comments: Preprint for Software: Practice and Experience

  45. arXiv:1807.11615  [pdf, other

    cs.AI

    Semantic DMN: Formalizing and Reasoning About Decisions in the Presence of Background Knowledge

    Authors: Diego Calvanese, Marlon Dumas, Fabrizio Maria Maggi, Marco Montali

    Abstract: The Decision Model and Notation (DMN) is a recent OMG standard for the elicitation and representation of decision models, and for managing their interconnection with business processes. DMN builds on the notion of decision tables, and their combination into more complex decision requirements graphs (DRGs), which bridge between business process models and decision logic models. DRGs may rely on add… ▽ More

    Submitted 14 September, 2018; v1 submitted 30 July, 2018; originally announced July 2018.

    Comments: Under consideration for publication in Theory and Practice of Logic Programming (TPLP)

  46. arXiv:1805.02896  [pdf, other

    cs.AI cs.LG

    Survey and cross-benchmark comparison of remaining time prediction methods in business process monitoring

    Authors: Ilya Verenich, Marlon Dumas, Marcello La Rosa, Fabrizio Maggi, Irene Teinemaa

    Abstract: Predictive business process monitoring methods exploit historical process execution logs to generate predictions about running instances (called cases) of a business process, such as the prediction of the outcome, next activity or remaining cycle time of a given process case. These insights could be used to support operational managers in taking remedial actions as business processes unfold, e.g.… ▽ More

    Submitted 10 May, 2018; v1 submitted 8 May, 2018; originally announced May 2018.

  47. arXiv:1804.02704  [pdf, other

    cs.LG stat.ML

    Discovering Process Maps from Event Streams

    Authors: Volodymyr Leno, Abel Armas-Cervantes, Marlon Dumas, Marcello La Rosa, Fabrizio M. Maggi

    Abstract: Automated process discovery is a class of process mining methods that allow analysts to extract business process models from event logs. Traditional process discovery methods extract process models from a snapshot of an event log stored in its entirety. In some scenarios, however, events keep coming with a high arrival rate to the extent that it is impractical to store the entire event log and to… ▽ More

    Submitted 8 April, 2018; originally announced April 2018.

  48. arXiv:1803.08706  [pdf, ps, other

    cs.LG cs.AI

    Alarm-Based Prescriptive Process Monitoring

    Authors: Irene Teinemaa, Niek Tax, Massimiliano de Leoni, Marlon Dumas, Fabrizio Maria Maggi

    Abstract: Predictive process monitoring is concerned with the analysis of events produced during the execution of a process in order to predict the future state of ongoing cases thereof. Existing techniques in this field are able to predict, at each step of a case, the likelihood that the case will end up in an undesired outcome. These techniques, however, do not take into account what process workers may d… ▽ More

    Submitted 19 June, 2018; v1 submitted 23 March, 2018; originally announced March 2018.

  49. Temporal Stability in Predictive Process Monitoring

    Authors: Irene Teinemaa, Marlon Dumas, Anna Leontjeva, Fabrizio Maria Maggi

    Abstract: Predictive process monitoring is concerned with the analysis of events produced during the execution of a business process in order to predict as early as possible the final outcome of an ongoing case. Traditionally, predictive process monitoring methods are optimized with respect to accuracy. However, in environments where users make decisions and take actions in response to the predictions they… ▽ More

    Submitted 15 June, 2018; v1 submitted 12 December, 2017; originally announced December 2017.

    Journal ref: Data Min Knowl Disc (2018) 32: 1306

  50. arXiv:1712.04159  [pdf, other

    cs.DS cs.AI cs.DB

    Mining Non-Redundant Local Process Models From Sequence Databases

    Authors: Niek Tax, Marlon Dumas

    Abstract: Sequential pattern mining techniques extract patterns corresponding to frequent subsequences from a sequence database. A practical limitation of these techniques is that they overload the user with too many patterns. Local Process Model (LPM) mining is an alternative approach coming from the field of process mining. While in traditional sequential pattern mining, a pattern describes one subsequenc… ▽ More

    Submitted 21 September, 2018; v1 submitted 12 December, 2017; originally announced December 2017.