Differences

This shows you the differences between two versions of the page.

Link to this comparison view

blogs:pub2008:monitoring_deployed_application_usage_with_process_mining [2009/05/25 13:44] (current)
Line 1: Line 1:
 +====== Monitoring Deployed Application Usage with Process Mining ======
  
 +C.W. Günther, A. Rozinat, ​ W.M.P. van der Aalst and K. van Uden.\\  ​
 +//BPM Center Report BPM-08-11, BPMcenter.org,​ 2008//
 +
 +===== Abstract =====
 +
 +Increasingly,​ devices are connected to the Internet and are recording events. Computers, X-ray machines, high-end copiers, interactive kiosks, RFID scanners, etc. are examples of such devices. Typically, there are many devices running
 +the same application (e.g., a computer running SAP R/3 or an X-ray machine running diagnosis software) and their event logs reflect the actual use of the application in
 +the field. This way it is possible to systematically monitor real-life processes. Process mining aims at the analysis of such event logs, and we argue that proper log analysis can be used to increase reliability,​ usability, and serviceability of deployed applications. In this paper, we present a case study conducted within Philips Healthcare and based on the process mining tool ProM. Moreover, we address technical challenges of dealing with large, real-life data sets, and discuss generic methods of dealing with problems of diversity and complexity in unstructured environments.
 +
 +===== Links =====
 +
 +{{publications:​BPM-08-11.pdf|Download PDF}} (384 KB)