9th International Workshop on Business Process Intelligence 2013

to be held in conjunction with BPM 2013 Beijing, China, August 26th - 30th 2013


Business Processing Intelligence Challenge (BPIC)

Third International Business Process Intelligence Challenge (BPIC’13)

In this challenge, we provide participants with a real-life event log, and we ask them to analyze these data using whatever techniques available, focusing on one or more of the process owner's questions or proving other unique insights into the process captured in the event log.

A jury will decide which report is best and the winning participant will receive a prize! Furthermore, selected submissions will be published in the proceedings of the BPI workshop.

We strongly encourage people to use any tools, techniques, methods at their disposal. There is no need to restrict to open-source tools, and proprietary tools as well as techniques developed or implemented specifically for this challenge are welcome.

The winner will be announced at the Workshop on August 26th 2013.

Event Log

We have prepared an event log from Volvo IT Belgium for this challenge. The log contains events from an incident and problem management system called VINST. We provide you with the original CSV file as well as three event logs that were extracted from this CSV file with the incident or problem number as case ID.

Next to the CSV file and the three logs, there is also a document detailing the data in the CSV file and providing background to the process. Furthermore, this document contains a number of questions of the problem owner.

Finally, the manual of the VINST system is included.

Questions of the Process Owner

The process owner poses a number of possible questions on which answers are sought:

  1. Push to Front (incidents only) Is there evidence that cases are pushed to the 2nd and 3rd line too often or too soon?
  2. Ping Pong Behavior How often do cases ping pong between teams and which teams are more or less involved in ping-ponging?
  3. Wait User abuse Is the “wait user” substatus abused to hide problems with the total resolution time?
  4. Process Conformity per Organisation Where do the two IT organisations differ and why?


The logs are provided in the XES format. There are three file:

The source files are provided in CSV format:

There are two PDF files, one is a description of the process with the questions from the process owner, the other the manual of the VINST system (intended purely as background):

The XES format is a standard defined by the IEEE task force on process mining. For details on the XES format, please look here.

For your convenience all files can be downloaded in one ZIP archive here.

Submission guide

Submissions should be made by e-mail to: b.f.v.dongen@tue.nl. A submission should contain a pdf report of at most 30 pages, including figures, using the LNCS/LNBIP format (http://www.springer.com/computer/lncs?SGWID=0-164-6-791344-0) specified by Springer (available for both LaTeX and MS Word). Appendices may be included, but should only support the main text. The submitted reports will be published online at the challenge website.


Twelve submissions arrived and were judged by the jury. The submissions have been published as CEUR online proceedings and can be found at http://ceur-ws.org/Vol-1052/



Perceptive Software
Through the recent purchase of Pallas Athena,
Perceptive Software has become a world-leading
Business Process Management Software (BPM)
and Solutions provider. Their innovative software
platforms and user-friendly designs are well
known and recognized throughout the industry.
Fluxicon - Process mining for professionals
The process mining technology in Fluxicon's
products can automatically create smart flow
diagrams of your process. All you need are
event logs that are already on your IT systems.
Because our products work with this objective
information, you no longer need to rely on belief
or hearsay — you will know what's going on.

Important Dates

Report submission deadline: July 12, 2013, 23:59 CET
Announcement of winners: at the 9th Workshop on Business Process Intelligence (BPI 13),
Beijing, China, August 26th 2013


Boudewijn van DongenCorresponding Organizer
Department of Mathematics and Computer Science
Eindhoven University of Technology
P.O. Box 513, 5600 MB, Eindhoven, The Netherlands
Tel: +31 40 247 2181
Fax: +31 40 246 3992
E-mail: b.f.v.dongen@tue.nl
URL: http://www.processmining.org/
Diogo R. Ferreira
IST – Technical University of Lisbon
Avenida Prof. Dr. Cavaco Silva
2744-016 Porto Salvo
Tel.: +351 21 423 35 52
E-mail: diogo.ferreira@tagus.ist.utl.pt
Url: http://web.tagus.ist.utl.pt/~diogo.ferreira/
Barbara Weber
Institut für Informatik
Universität Innsbruck
Technikerstraße 21a, 6020 Innsbruck
Tel.: +43 507 512 6474
Fax: +43 507 512 9871
E-mail: Barbara.Weber@uibk.ac.at
Url: http://qe-informatik.uibk.ac.at
Jochen De Weerdt
Information Systems School
Queensland University of Technology
P-block Level 8, Gardens Point Campus - 2 George St
Brisbane QLD 4000, Australia
Tel.: +61 7 3138 9489
E-mail: jochen.deweerdt@qut.edu.au
URL: http://www.jochendeweerdt.be/

The challenge is co-organized by the IEEE Task Force on Process Mining. The goal of this Task Force is to promote the research, development, education and understanding of process mining. For more information about the activities of the IEEE Task Force on Process Mining and its members see http://www.win.tue.nl/ieeetfpm/

Jury (tentative)

  • Peter van den Brand, Futura Technology, The Netherlands
  • Andrea Burattin, Padua University, Italy
  • Boudewijn van Dongen, Eindhoven University of Technology, The Netherlands
  • Diogo R. Ferreira, Technical University of Lisbon, Portugal
  • Anne Rozinat, Fluxicon, The Netherlands
  • Marcello La Rosa, Queensland University of Technology, Australia
  • Barbara Weber, University of Innsbruck, Austria
  • Lijie Wen, Tshingua School of Software, China
  • Jan Claes, University of Gent, Belgium
  • Dirk Fahland, Eindhoven University of Technology, The Netherlands