2018
DOI: 10.1016/j.is.2018.01.011
|View full text |Cite
|
Sign up to set email alerts
|

On the relevance of a business constraint to an event log

Abstract: Declarative process modeling languages such as declare describe the behavior of processes by means of constraints. Such constraints exert rules on the execution of tasks upon the execution of other tasks called activations. The constraint is thus fulfilled both if it is activated and the consequent rule is respected, or if it is not activated at all. The latter case, named vacuous satisfaction, is clearly less interesting than the former. Such a distinction becomes of utmost importance in the context of declar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5

Relationship

4
1

Authors

Journals

citations
Cited by 20 publications
(17 citation statements)
references
References 68 publications
0
17
0
Order By: Relevance
“…(3) Candidate constraints are filtered, retaining only those whose support exceeds a given threshold. (4) Further filters (e.g., considering the "relevance" of a constraint [6]) are applied. (5) The overall model is checked for satisfiability, operating with different strategies if it is not; this is necessary since constraints with high support, but less than 1, may actually conflict with each other [4,5].…”
Section: Discovering Probdeclare Models From Event Logsmentioning
confidence: 99%
See 1 more Smart Citation
“…(3) Candidate constraints are filtered, retaining only those whose support exceeds a given threshold. (4) Further filters (e.g., considering the "relevance" of a constraint [6]) are applied. (5) The overall model is checked for satisfiability, operating with different strategies if it is not; this is necessary since constraints with high support, but less than 1, may actually conflict with each other [4,5].…”
Section: Discovering Probdeclare Models From Event Logsmentioning
confidence: 99%
“…This probabilistic monitoring technique has been fully implemented. 6 For solving systems of inequalities, we use the LP solver 7 . The implementation comes with various optimizations.…”
Section: Full Monitoringmentioning
confidence: 99%
“…Candidate constraints are filtered by retaining only those whose support exceeds a given threshold. (4) Further filters (e.g., considering the "relevance" of a constraint [4]) are applied. (5) The overall model is checked for consistency, operating with different strategies if it is not.…”
Section: Discovering Probdeclare Models From Event Logsmentioning
confidence: 99%
“…To tackle these issues, the probabilistic temporal logic over finite traces PLTL f , and its fragment PLTL 0 f , have been recently proposed in [12]. 4 PLTL 0 f is of particular interest here, since the way probabilities are used can be interpreted by naturally matching the notion of conformance: a constraint ϕ has probability p, if, by imagining all the traces contained in a log, the fraction p of such traces satisfies ϕ.…”
Section: Introductionmentioning
confidence: 99%
“…In this first step, we generate SHACL compliance constraints for a target process. As input, we take a set of DECLARE constraints, which can be automatically discovered with tools such as MINERful [12]. Table 2 shows an excerpt of the declarative constraints retrieved by MINERful from the real-life Sepsis event log [35].…”
Section: Declare To Shaclmentioning
confidence: 99%