• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Lu, Du Yuyue, Qi Hongda. Process Model Repair Based on Firing Sequences[J]. Journal of Computer Research and Development, 2018, 55(3): 585-601. DOI: 10.7544/issn1000-1239.2018.20160838
Citation: Wang Lu, Du Yuyue, Qi Hongda. Process Model Repair Based on Firing Sequences[J]. Journal of Computer Research and Development, 2018, 55(3): 585-601. DOI: 10.7544/issn1000-1239.2018.20160838

Process Model Repair Based on Firing Sequences

More Information
  • Published Date: February 28, 2018
  • When business processes are mostly supported by information systems, the availability of event logs generated from these systems and the requirements of appropriate process models are increasing. However, some events cannot be correctly identified because of the explosion of the amount of event logs. Conformance checking techniques can be used to detect and diagnose the differences between observed and modeled behavior, but they cannot repair the actual model. The information from conformance checking can be used for model repair. By means of the firing sequences of event logs, process models can be repaired from three aspects: removing behavior, adding behavior and changing behavior. The structure with deleted activity in process model, the relationship between additional activities and adjoin activities, and the nonconformance sub-process in process model should be identified when the process model need repairing. It is obtained that the repaired model can replay (most of) event logs based on the proposed techniques, and it is as similar to the original model as possible. The methods in this paper are simulated manually. A real-world process model of hospitalization in a hospital and the corresponding event logs are employed to evaluate the proposed approaches. The correctness and effectiveness of the proposed methods are illustrated through experiments.
  • Related Articles

    [1]Pei Zhongyi, Liu Lin, Wang Chen, Wang Jianmin. An Explainability-Centric Requirements Analysis Framework for Machine Learning Applications[J]. Journal of Computer Research and Development, 2024, 61(4): 983-1002. DOI: 10.7544/issn1000-1239.202220794
    [2]Yin Xiaokang, Lu Bin, Cai Ruijie, Zhu Xiaoya, Yang Qichao, Liu Shengli. Memory Copy Function Identification Technique with Control Flow and Data Flow Analysis[J]. Journal of Computer Research and Development, 2023, 60(2): 326-340. DOI: 10.7544/issn1000-1239.202110990
    [3]Tan Tian, Ma Xiaoxing, Xu Chang, Ma Chunyan, Li Yue. Survey on Java Pointer Analysis[J]. Journal of Computer Research and Development, 2023, 60(2): 274-293. DOI: 10.7544/issn1000-1239.202220901
    [4]Zhu Yi’an, Shi Xianchen, Yao Ye, Li Lian, Ren Pengyuan, Dong Weizhen, Li Jiayu. A WCET Analysis Method for Multi-Core Processors with Multi-Tier Coherence Protocol[J]. Journal of Computer Research and Development, 2023, 60(1): 30-42. DOI: 10.7544/issn1000-1239.202111244
    [5]Zhou Hongbo, Jin Dahai, and Gong Yunzhan. Application of Interval Arithmetic in Software Testing Based on Field-Sensitive Point-to Analysis[J]. Journal of Computer Research and Development, 2012, 49(9): 1852-1862.
    [6]Wang Yawen, Yao Xinhong, Gong Yunzhan, Yang Zhaohong. A Method of Buffer Overflow Detection Based on Static Code Analysis[J]. Journal of Computer Research and Development, 2012, 49(4): 839-845.
    [7]Wang Lei, Chen Gui, and Jin Maozhong. Detection of Code Vulnerabilities via Constraint-Based Analysis and Model Checking[J]. Journal of Computer Research and Development, 2011, 48(9): 1659-1666.
    [8]Han Wei, He Yeping. Static Analysis of TOCTTOU Vulnerabilities in Unix-Style File System[J]. Journal of Computer Research and Development, 2011, 48(8): 1430-1437.
    [9]Ye Pengfei, Peng Xin, and Zhao Wenyun. Recovering the Use Case from Object-Oriented Programs by Static Analysis[J]. Journal of Computer Research and Development, 2010, 47(12).
    [10]Bian Xiaofeng, Zhou Xuehai. Study on Modeling MIPS Processors for Static WCET Analysis[J]. Journal of Computer Research and Development, 2006, 43(10): 1828-1834.
  • Cited by

    Periodical cited type(3)

    1. 黄阳,周旭,杨志邦,余婷,张吉,曾源远,李肯立. 基于缓存的时变道路网最短路径查询算法. 计算机研究与发展. 2022(02): 376-389 . 本站查看
    2. 李永刚. 基于云计算的数据信息加密安全存储仿真研究. 电子设计工程. 2021(11): 132-135 .
    3. 刘铎,杨涓,谭玉娟. 边缘存储的发展现状与挑战. 中兴通讯技术. 2019(03): 15-22 .

    Other cited types(7)

Catalog

    Article views (1140) PDF downloads (752) Cited by(10)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return