{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T15:08:50Z","timestamp":1759072130635,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319690346"},{"type":"electronic","value":"9783319690353"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2017,10,18]],"date-time":"2017-10-18T00:00:00Z","timestamp":1508284800000},"content-version":"vor","delay-in-days":290,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Proactive process adaptation facilitates preventing or mitigating upcoming problems during process execution, such as process delays. Key for proactive process adaptation is that adaptation decisions are based on accurate predictions of problems. Previous research focused on improving aggregate accuracy, such as precision or recall. However, aggregate accuracy provides little information about the error of an individual prediction. In contrast, so called reliability estimates provide such additional information. Previous work has shown that considering reliability estimates can improve decision making during proactive process adaptation and can lead to cost savings. So far, only constant cost functions have been considered. In practice, however, costs may differ depending on the magnitude of the problem; e.g., a longer process delay may result in higher penalties. To capture different cost functions, we exploit numeric predictions computed from ensembles of regression models. We combine reliability estimates and predicted costs to quantify the risk of a problem, i.e., its probability and its severity. Proactive adaptations are triggered if risks are above a pre-defined threshold. A comparative evaluation indicates that cost savings of up\u00a0to 31%, with 14.8% savings on average, may be achieved by the risk-based approach.<\/jats:p>","DOI":"10.1007\/978-3-319-69035-3_25","type":"book-chapter","created":{"date-parts":[[2017,10,17]],"date-time":"2017-10-17T09:57:25Z","timestamp":1508234245000},"page":"351-366","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Risk-Based Proactive Process Adaptation"],"prefix":"10.1007","author":[{"given":"Andreas","family":"Metzger","sequence":"first","affiliation":[]},{"given":"Philipp","family":"Bohn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,18]]},"reference":[{"key":"25_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/978-3-642-25535-9_28","volume-title":"Service-Oriented Computing","author":"R Aschoff","year":"2011","unstructured":"Aschoff, R., Zisman, A.: QoS-driven proactive adaptation of service composition. In: Kappel, G., Maamar, Z., Motahari-Nezhad, H.R. (eds.) ICSOC 2011. LNCS, vol. 7084, pp. 421\u2013435. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-25535-9_28"},{"issue":"1","key":"25_CR2","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1017\/S0269888909990154","volume":"25","author":"Z Bosnic","year":"2010","unstructured":"Bosnic, Z., Kononenko, I.: Automatic selection of reliability estimates for individual regression predictions. Knowl. Eng. Rev. 25(1), 27\u201347 (2010)","journal-title":"Knowl. Eng. Rev."},{"key":"25_CR3","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/978-3-319-15895-2_46","volume-title":"Business Process Management Workshops","author":"D Breuker","year":"2015","unstructured":"Breuker, D., Delfmann, P., Matzner, M., Becker, J.: Designing and evaluating an interpretable predictive modeling technique for business processes. In: Fournier, F., Mendling, J. (eds.) BPM 2014. LNBIP, vol. 202, pp. 541\u2013553. Springer, Cham (2015). doi:10.1007\/978-3-319-15895-2_46"},{"key":"25_CR4","first-page":"1621","volume":"6","author":"G Brown","year":"2005","unstructured":"Brown, G., Wyatt, J.L., Ti\u00f1o, P.: Managing diversity in regression ensembles. J. Mach. Learn. Res. 6, 1621\u20131650 (2005)","journal-title":"J. Mach. Learn. Res."},{"key":"25_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1007\/978-3-319-10172-9_31","volume-title":"Business Process Management","author":"C Cabanillas","year":"2014","unstructured":"Cabanillas, C., Di Ciccio, C., Mendling, J., Baumgrass, A.: Predictive task monitoring for business processes. In: Sadiq, S., Soffer, P., V\u00f6lzer, H. (eds.) BPM 2014. LNCS, vol. 8659, pp. 424\u2013432. Springer, Cham (2014). doi:10.1007\/978-3-319-10172-9_31"},{"key":"25_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1007\/978-3-662-45391-9_49","volume-title":"Service-Oriented Computing","author":"CC Marquezan","year":"2014","unstructured":"Marquezan, C.C., Metzger, A., Franklin, R., Pohl, K.: Runtime management of multi-level SLAs for transport and logistics services. In: Franch, X., Ghose, A.K., Lewis, G.A., Bhiri, S. (eds.) ICSOC 2014. LNCS, vol. 8831, pp. 560\u2013574. Springer, Heidelberg (2014). doi:10.1007\/978-3-662-45391-9_49. (Industry paper)"},{"issue":"5\/6","key":"25_CR7","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1504\/IJCSE.2006.014772","volume":"2","author":"M Castellanos","year":"2006","unstructured":"Castellanos, M., Salazar, N., Casati, F., Dayal, U., Shan, M.C.: Predictive business operations management. Int. J. Comput. Sci. Eng. 2(5\/6), 292\u2013301 (2006)","journal-title":"Int. J. Comput. Sci. Eng."},{"issue":"11","key":"25_CR8","doi-asserted-by":"publisher","first-page":"2939","DOI":"10.1016\/j.jss.2013.07.024","volume":"86","author":"R Conforti","year":"2013","unstructured":"Conforti, R., Rosa, M.L., Fortino, G., ter Hofstede, A.H.M., Recker, J., Adams, M.: Real-time risk monitoring in business processes: a sensor-based approach. J. Syst. Softw. 86(11), 2939\u20132965 (2013)","journal-title":"J. Syst. Softw."},{"key":"25_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45014-9_1","volume-title":"Multiple Classifier Systems","author":"TG Dietterich","year":"2000","unstructured":"Dietterich, T.G.: Ensemble methods in machine learning. In: Kittler, J., Roli, F. (eds.) MCS 2000. LNCS, vol. 1857, pp. 1\u201315. Springer, Heidelberg (2000). doi:10.1007\/3-540-45014-9_1"},{"key":"25_CR10","unstructured":"Elkan, C.: The foundations of cost-sensitive learning. In: Nebel, B. (ed.) 7th Intl Joint Conference on Artificial Intelligence (IJCAI 2001), Seattle, Washington, pp. 973\u2013978. Morgan Kaufmann (2001)"},{"key":"25_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-319-39696-5_22","volume-title":"Advanced Information Systems Engineering","author":"C Di Francescomarino","year":"2016","unstructured":"Di Francescomarino, C., Dumas, M., Federici, M., Ghidini, C., Maggi, F.M., Rizzi, W.: Predictive business process monitoring framework with hyperparameter optimization. In: Nurcan, S., Soffer, P., Bajec, M., Eder, J. (eds.) CAiSE 2016. LNCS, vol. 9694, pp. 361\u2013376. Springer, Cham (2016). doi:10.1007\/978-3-319-39696-5_22"},{"key":"25_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-319-46295-0_4","volume-title":"Service-Oriented Computing","author":"R Ghosh","year":"2016","unstructured":"Ghosh, R., Ghose, A., Hegde, A., Mukherjee, T., Mos, A.: QoS-driven management of business process variants in cloud based execution environments. In: Sheng, Q.Z., Stroulia, E., Tata, S., Bhiri, S. (eds.) ICSOC 2016. LNCS, vol. 9936, pp. 55\u201369. Springer, Cham (2016). doi:10.1007\/978-3-319-46295-0_4"},{"issue":"3","key":"25_CR13","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/j.compind.2003.10.007","volume":"53","author":"D Grigori","year":"2004","unstructured":"Grigori, D., Casati, F., Castellanos, M., Dayal, U., Sayal, M., Shan, M.C.: Business process intelligence. Comput. Ind. 53(3), 321\u2013343 (2004)","journal-title":"Comput. Ind."},{"key":"25_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1007\/978-3-642-45005-1_47","volume-title":"Service-Oriented Computing","author":"AM Guti\u00e9rrez","year":"2013","unstructured":"Guti\u00e9rrez, A.M., Cassales Marquezan, C., Resinas, M., Metzger, A., Ruiz-Cort\u00e9s, A., Pohl, K.: Extending WS-Agreement to Support Automated Conformity Check on Transport and Logistics Service Agreements. In: Basu, S., Pautasso, C., Zhang, L., Fu, X. (eds.) ICSOC 2013. LNCS, vol. 8274, pp. 567\u2013574. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-45005-1_47"},{"key":"25_CR15","volume-title":"Neural Networks and Learning Machines: A Comprehensive Foundation","author":"S Haykin","year":"2008","unstructured":"Haykin, S.: Neural Networks and Learning Machines: A Comprehensive Foundation, 3rd edn. Prentice Hall, Englewood Cliffs (2008)","edition":"3"},{"issue":"1","key":"25_CR16","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1002\/kpm.1527","volume":"24","author":"J Kim","year":"2017","unstructured":"Kim, J., Lee, J., Lee, J., Choi, I.: An integrated process-related risk management approach to proactive threat and opportunity handling: a framework and rule language. Knowl. Process Manag. 24(1), 23\u201337 (2017)","journal-title":"Knowl. Process Manag."},{"issue":"2","key":"25_CR17","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1109\/TSC.2011.53","volume":"6","author":"P Leitner","year":"2013","unstructured":"Leitner, P., Hummer, W., Dustdar, S.: Cost-based optimization of service compositions. IEEE Trans. Serv. Comput. 6(2), 239\u2013251 (2013)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Leitner, P., Michlmayr, A., Rosenberg, F., Dustdar, S.: Monitoring, prediction and prevention of SLA violations in composite services. In: International Conference on Web Services (ICWS 2010), Miami, Florida, pp. 369\u2013376. IEEE Computer Society (2010)","DOI":"10.1109\/ICWS.2010.21"},{"key":"25_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/978-3-319-07881-6_31","volume-title":"Advanced Information Systems Engineering","author":"FM Maggi","year":"2014","unstructured":"Maggi, F.M., Di Francescomarino, C., Dumas, M., Ghidini, C.: Predictive monitoring of business processes. In: Jarke, M., Mylopoulos, J., Quix, C., Rolland, C., Manolopoulos, Y., Mouratidis, H., Horkoff, J. (eds.) CAiSE 2014. LNCS, vol. 8484, pp. 457\u2013472. Springer, Cham (2014). doi:10.1007\/978-3-319-07881-6_31"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Metzger, A., Chi, C.H., Engel, Y., Marconi, A.: Research challenges on online service quality prediction for proactive adaptation. In: ICSE 2012 Workshop on European Software Services and Systems Research (S-Cube), Zurich, Switzerland. IEEE (2012)","DOI":"10.1109\/S-Cube.2012.6225512"},{"key":"25_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/978-3-319-59536-8_28","volume-title":"Advanced Information Systems Engineering","author":"A Metzger","year":"2017","unstructured":"Metzger, A., F\u00f6cker, F.: Predictive business process monitoring considering reliability estimates. In: Dubois, E., Pohl, K. (eds.) CAiSE 2017. LNCS, vol. 10253, pp. 445\u2013460. Springer, Cham (2017). doi:10.1007\/978-3-319-59536-8_28"},{"issue":"2","key":"25_CR22","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1109\/TSMC.2014.2347265","volume":"45","author":"A Metzger","year":"2015","unstructured":"Metzger, A., Leitner, P., Ivanovi\u0107, D., Schmieders, E., Franklin, R., Carro, M., Dustdar, S., Pohl, K.: Comparing and combining predictive business process monitoring techniques. IEEE Trans. Syst. Man Cybern. Syst. 45(2), 276\u2013290 (2015)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"25_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/978-3-642-36249-1_9","volume-title":"Assurances for Self-Adaptive Systems","author":"A Metzger","year":"2013","unstructured":"Metzger, A., Sammodi, O., Pohl, K.: Accurate proactive adaptation of service-oriented systems. In: C\u00e1mara, J., de Lemos, R., Ghezzi, C., Lopes, A. (eds.) Assurances for Self-Adaptive Systems. LNCS, vol. 7740, pp. 240\u2013265. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-36249-1_9"},{"key":"25_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1007\/978-3-642-25535-9_43","volume-title":"Service-Oriented Computing","author":"B Pernici","year":"2011","unstructured":"Pernici, B., Siadat, S.H., Benbernou, S., Ouziri, M.: A penalty-based approach for QoS dissatisfaction using fuzzy rules. In: Kappel, G., Maamar, Z., Motahari-Nezhad, H.R. (eds.) ICSOC 2011. LNCS, vol. 7084, pp. 574\u2013581. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-25535-9_43"},{"key":"25_CR25","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.ins.2016.03.003","volume":"352\u2013353","author":"A Pika","year":"2016","unstructured":"Pika, A., van der Aalst, W.M.P., Wynn, M.T., Fidge, C.J., ter Hofstede, A.H.M.: Evaluating and predicting overall process risk using event logs. Inf. Sci. 352\u2013353, 98\u2013120 (2016)","journal-title":"Inf. Sci."},{"issue":"3","key":"25_CR26","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MCAS.2006.1688199","volume":"6","author":"R Polikar","year":"2006","unstructured":"Polikar, R.: Ensemble based systems in decision making. IEEE Circ. Syst. Mag. 6(3), 21\u201345 (2006)","journal-title":"IEEE Circ. Syst. Mag."},{"issue":"6","key":"25_CR27","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1111\/j.1539-6924.2010.01442.x","volume":"30","author":"G Purdy","year":"2010","unstructured":"Purdy, G.: ISO 31000: 2009 - setting a new standard for risk management. Risk Anal. 30(6), 881\u2013886 (2010)","journal-title":"Risk Anal."},{"key":"25_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.is.2015.04.004","volume":"54","author":"A Rogge-Solti","year":"2015","unstructured":"Rogge-Solti, A., Weske, M.: Prediction of business process durations using non-markovian stochastic petri nets. Inf. Syst. 54, 1\u201314 (2015)","journal-title":"Inf. Syst."},{"issue":"3","key":"25_CR29","doi-asserted-by":"publisher","first-page":"10:1","DOI":"10.1145\/1670679.1670680","volume":"42","author":"F Salfner","year":"2010","unstructured":"Salfner, F., Lenk, M., Malek, M.: A survey of online failure prediction methods. ACM Comput. Surv. 42(3), 10:1\u201310:42 (2010)","journal-title":"ACM Comput. Surv."},{"key":"25_CR30","doi-asserted-by":"crossref","unstructured":"Schuller, D., Siebenhaar, M., Hans, R., Wenge, O., Steinmetz, R., Schulte, S.: Towards heuristic optimization of complex service-based workflows for stochastic QoS attributes. In: International Conference on Web Services (ICWS 2014), Anchorage, Alaska, pp. 361\u2013368. IEEE Computer Society (2014)","DOI":"10.1109\/ICWS.2014.59"},{"key":"25_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-319-39696-5_5","volume-title":"Advanced Information Systems Engineering","author":"M Skouradaki","year":"2016","unstructured":"Skouradaki, M., Ferme, V., Pautasso, C., Leymann, F., van Hoorn, A.: Micro-benchmarking BPMN 2.0 workflow management systems with workflow patterns. In: Nurcan, S., Soffer, P., Bajec, M., Eder, J. (eds.) CAiSE 2016. LNCS, vol. 9694, pp. 67\u201382. Springer, Cham (2016). doi:10.1007\/978-3-319-39696-5_5"},{"key":"25_CR32","doi-asserted-by":"crossref","unstructured":"Suriadi, S., et al.: Current research in risk-aware business process management - overview, comparison, and gap analysis. Commun. Assoc. Inf. Syst. (CAIS) 34, 52 (2014)","DOI":"10.17705\/1CAIS.03452"},{"key":"25_CR33","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-319-42887-1_18","volume-title":"Business Process Management Workshops","author":"I Verenich","year":"2016","unstructured":"Verenich, I., Dumas, M., La Rosa, M., Maggi, F.M., Di Francescomarino, C.: Complex symbolic sequence clustering and multiple classifiers for predictive process monitoring. In: Reichert, M., Reijers, H.A. (eds.) BPM 2015. LNBIP, vol. 256, pp. 218\u2013229. Springer, Cham (2016). doi:10.1007\/978-3-319-42887-1_18"},{"key":"25_CR34","doi-asserted-by":"crossref","unstructured":"Zadrozny, B., Elkan, C.: Learning and making decisions when costs and probabilities are both unknown. In: Lee, D., Schkolnick, M., Provost, F.J., Srikant, R. (eds.) 7th International Conference on Knowledge Discovery and Data Mining (KDD 2001), San Francisco, California, pp. 204\u2013213. ACM (2001)","DOI":"10.1145\/502512.502540"},{"issue":"3","key":"25_CR35","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1016\/j.dss.2011.01.003","volume":"51","author":"H Zhao","year":"2011","unstructured":"Zhao, H., Sinha, A.P., Bansal, G.: An extended tuning method for cost-sensitive regression and forecasting. Decis. Support Syst. 51(3), 372\u2013383 (2011)","journal-title":"Decis. Support Syst."}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69035-3_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T16:41:18Z","timestamp":1709829678000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-69035-3_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319690346","9783319690353"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69035-3_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"18 October 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSOC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Service-Oriented Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaga","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icsoc2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icsoc.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}