The algorithm takes a workflow log W ⊆ T ∗ {\displaystyle W\subseteq T^{*}} as input and results in a workflow net being constructed.
It does so by examining causal relationships observed between tasks. For example, one specific task might always precede another specific task in every execution trace, which would be useful information.
Event log is the primary requirement for applying any process discovery algorithm. An event log consists of a unique identifier for a case, activity name describing the action occurring in the process and timestamp. An event log can be represented as a multi-set of activities. For the sake of simplicity the following example would use alphabetic letter to represent an activity. Consider an example event log shown in the following figure:
An event log is a multi set of traces, and a trace is a sequence of activities. Thus, an event log such as above can be represented using the following notation:
L 1 = [ < A , B , C , D > , < A , C , B , D > , < A , E , D > ] {\displaystyle L1=[<A,B,C,D>,<A,C,B,D>,<A,E,D>]}
Every event log can be boiled down into a multi-set of traces, and such traces can be further used to break down relationships between various activities in the process. According to the rules of alpha miner, activities belonging to various cases can have 4 types of relationships between them:3
Sequence Pattern: A → B
XOR-split Pattern: A → B, A → C, and B # C
AND-split Pattern: A → B, A → C, and B || C
The alpha miner starts with converting an event log into directly-follows, sequence, parallel, and choice relations, and using them to create a petri net describing the process model. Initially the algorithm constructs a footprint matrix. Using the footprint matrix and the above shown pattern, one can construct a process model. Based on the four relations described earlier a footprint based matrix is first discovered. Using the footprint based matrix places are discovered. Each place is identified with a pair of sets of tasks, in order to keep the number of places low.
The flow relation F W {\displaystyle F_{W}} is the union of the following:
The result is
For the example given above, the following petri net would be resultant of the application of alpha miner.
It can be shown 4 that in the case of a complete workflow log generated by a sound SWF net, the net generating it can be reconstructed. Complete means that its ≻ W {\displaystyle \succ _{W}} relation is maximal. It is not required that all possible traces be present (which would be countably infinite for a net with a loop).
van der Aalst, W M P and Weijters, A J M M and Maruster, L (2004). "Workflow Mining: Discovering process models from event logs", IEEE Transactions on Knowledge and Data Engineering, vol 16 ↩
van der Aalst, W.; Weijters, T.; Maruster, L. (September 2004). "Workflow mining: discovering process models from event logs". IEEE Transactions on Knowledge and Data Engineering. 16 (9): 1128–1142. doi:10.1109/TKDE.2004.47. ISSN 1558-2191. S2CID 5282914. https://ieeexplore.ieee.org/document/1316839 ↩
van der Aalst et al. 2003 ↩
"Discovering Petri Nets from Event Logs". ResearchGate. Retrieved 2021-08-31. https://www.researchgate.net/publication/265764352 ↩
"Limitations of Alpha miner" (PDF). Archived (PDF) from the original on 2021-08-31. https://courses.edsa-project.eu/pluginfile.php/281/mod_resource/content/0/17%20Alpha%20Algorithm%20-%20Limitations.pdf ↩