Business Process Instances Discovery from Email Logs

被引:8
|
作者
Jlailaty, Diana [1 ]
Grigori, Daniela [1 ]
Belhajjame, Khalid [1 ]
机构
[1] Paris Dauphine Univ, Paris, France
关键词
Email analysis; Word2vec; process instance discovery; process mining; process analysis;
D O I
10.1109/SCC.2017.12
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Email is a reliable, confidential, fast, free and easily accessible form of communication. Due to its wide use in personal, but most importantly, professional contexts, email represents a valuable source of information that can be harvested for understanding, reengineering and repurposing undocumented business processes of companies and institutions. Few researchers have investigated the problem of extracting and analyzing the process-oriented information contained in emails. In this paper, we go forward in this direction by proposing a new method to discover business process instances from email logs that uses unsupervised classification techniques. The approach is composed of two clustering steps. The first one uses a powerful semantic similarity measurement method, Word2vec, while the second one uses a similarity measure combing several email attributes. Experimental results are detailed to illustrate and prove our approach contributions.
引用
收藏
页码:19 / 26
页数:8
相关论文
共 50 条
  • [31] ANOMALY DETECTION ALGORITHMS IN BUSINESS PROCESS LOGS
    Bezerra, Fabio
    Wainer, Jacques
    ICEIS 2008: PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL AIDSS: ARTIFICIAL INTELLIGENCE AND DECISION SUPPORT SYSTEMS, 2008, : 11 - 18
  • [32] Sampling business process event logs with guarantees
    Su, Xuan
    Liu, Cong
    Zhang, Shuaipeng
    Zeng, Qingtian
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (13):
  • [33] Detecting Anomalies in Hybrid Business Process Logs
    Pauwels, Stephen
    Calders, Toon
    APPLIED COMPUTING REVIEW, 2019, 19 (02): : 18 - 30
  • [34] Research on Automatic Remodeling of Business Process Based on Process Logs
    Li, Yan
    Deng, Shao-Ling
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12731 - 12735
  • [35] Time and activity sequence prediction of business process instances
    Polato, Mirko
    Sperduti, Alessandro
    Burattin, Andrea
    de Leoni, Massimiliano
    COMPUTING, 2018, 100 (09) : 1005 - 1031
  • [36] Time and activity sequence prediction of business process instances
    Mirko Polato
    Alessandro Sperduti
    Andrea Burattin
    Massimiliano de Leoni
    Computing, 2018, 100 : 1005 - 1031
  • [37] Message correlation and Business Protocol discovery in service interaction logs
    Serrour, Belkacem
    Gasparotto, Daniel P.
    Kheddouci, Harnamache
    Benatallah, Boualem
    ADVANCED INFORMATION SYSTEMS ENGINEERING, PROCEEDINGS, 2008, 5074 : 405 - +
  • [38] Towards Flexibility in Business Processes by Mining Process Patterns and Process Instances
    Boegl, Andreas
    Natschlaeger, Christine
    Geist, Verena
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MODEL-DRIVEN ENGINEERING AND SOFTWARE DEVELOPMENT (MODELSWARD 2016), 2016, : 469 - 476
  • [39] Process scenario discovery from event logs based on activity and timing information
    Zhang, Zhenyu
    Johnson, Caleb
    Venkatasubramanian, Nalini
    Ren, Shangping
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 125
  • [40] Process discovery from event data: Relating models and logs through abstractions
    van der Aalst, Wil M. P.
    WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2018, 8 (03)