Structural Detection of Deadlocks in Business Process Models
|
|
|
- Esmond Chandler
- 9 years ago
- Views:
Transcription
1 Structural Detection of Deadlocks in Business Process Models Ahmed Awad and Frank Puhlmann Business Process Technology Group Hasso Plattner Institut University of Potsdam, Germany Abstract. A common task in business process modelling is the verification of process models regarding syntactical and structural errors. While the former might be checked with low efforts, the latter usually requires a complex state-space analysis to prove properties like deadlock-freedom of the models. In this paper, we address the issue of deadlock detection with a novel approach based on business process querying. Using queries, we are able to detect a broad range of common structural errors that lead to deadlocks, such as misaligned splits and joins. While not being complete, the proposed approach has the advantages of low computational efforts as well as providing graphical outputs that directly lead to the errors. 1 Introduction With the maturing of business process management (BPM) as an integrated approach ranging from modeling over execution up to evaluation [3], the verification of process models becomes ever more important. This is obvious, since the direct execution of process models requires the detection of errors before the process models are executed. Typical errors can be classified into two categories, either syntactical or structural. A syntactical error is given if modeling elements are used in an invalid manner. The valid and invalid combinations are usually prescribed by the corresponding standard that is used. The Business Process Modeling Notation (BPMN), for instance, does not allow events with more than one outgoing arc [1]. Syntactical errors can usually be found within reasonable time by simply parsing through the process model. Structural errors, such as given by misaligned splits and joins, cannot be detected easily, since the runtime behavior of the process needs to be investigated. To achieve a complete judgement whether a process model fulfills certain structural criteria such as deadlock freedom usually the complete state-space has to be analyzed. This analysis, however, is costly in terms of required memory and computing time. In some cases, the result cannot be computed at all [2]. In this paper, we address the structural analysis of business process models regarding deadlocks. A deadlock in a process model is given if a certain instance of the model (but not necessarily all) cannot continue working, while it has
2 not yet reached its end. The proposed approach is based on graphical queries given in BPMN-Q as introduced in [7]. A BPMN-Q query is represented a as small business process diagram that might contain additional query elements that will be substituted with BPMN elements during its processing. The result of such a graphical query is given by a sub-graph of the original process model. We discuss the idea of detecting deadlocks in process models by formulating and evaluating queries that only result in non-empty sub-graphs of the queried process models if a deadlock is contained. For this purpose, we present a set of so called deadlock patterns whose occurrence in process models usually leads to deadlocks. While the approach is not complete in a sense of finding all possible deadlock sources each matching query relates to a structural error in the process model. The approach has two major advantages. First, we assume that is computable in polynomial time, meaning that a majority of structural errors are actually detectable. A formal proof, however, is ongoing research. Second, if an error is found, it provides a direct graphical output leading to the error the resulting sub-graph of the query. In contrast to state-space analysis that requires high efforts and is sometimes not computable, our approach is actually suited to support business process modelers in finding errors in their process models. The paper is structured as follows. We first extend the motivation and discuss related work in section 2. In section 3 the preliminaries that is BPMN-Q, the graphical query language, as well as existing deadlock pattern are introduced. The contribution is presented in section 4, where we discuss BPMN-Q-based deadlock queries. Section 5 gives a larger example. Finally, the paper is concluded with a discussion of future work in section 6. 2 Motivation and Related Work As already stated, the major motivation of our work is given by lowering the required efforts for detecting deadlocks in process models. Obviously, a full state-space analysis in a transition system underlying a graphical process model (e.g. Petri nets, π-calculus) is sufficient and complete. The drawbacks in many cases are the high computational efforts as well as the typically binary result. The backtracking of transition sequences to actual elements of a graphical process model is a complex process in itself. Our approach, in contrast, focuses on the graphical model, allowing the designer to receive direct feedback on erroneous part(s) of the process model. The technique that we apply is based on graphical queries denoted in BPMN-Q. While BPMN-Q in itself is very helpful for process modelers, e.g. in searching existing process models, we discuss how BPMN-Q can be applied to detect deadlocks in process models. Hence, we also provide an additional application area for graphical process queries. Our approach, however, does not resemble existing soundness properties [2]. We are not able to cover even weaker variants such as lazy or weak soundness [8, 6] since we do not have the possibilities to query all quantifications based on structural properties only.
3 @Variable (a) (b) (c) (d) (e) (f) (g) Fig. 1. Extended Elements of BPMN-Q. Analyzing the structure of a business process to detect deadlocks has already been addressed in literature. In [9], the authors introduced a set of reduction rules for the process graph as means to indicate the correctness. When a process graph can be reduced to an empty graph, the process is said to be conflict free. On the other hand, if the reduction algorithm fails to reduce the process graph to an empty graph, this means the presence of a conflict. One limitation of this approach is that it works on acyclic process graphs only. Another limitation is, that when an identification of a conflict occurs, the reduced graph possibly looks different from the original graph (due to elimination of nodes and edges) which might make the visual identification of the problem difficult. Another approach called causal footprints was introduced recently in [10]. It is able to detect deadlock, trap, and multiple termination patterns by mapping the structure of Event-driven Process Chains [5] into the notion of these causal footprints. Afterwards, reasoning about properties of the resulting causality graphs is possible. Both mentioned approaches, however, have the drawbacks that all detection rules are hard-coded into the supporting tools. This means that any attempt or discovery of further patterns necessitates the modification of source code in these tools. 3 Preliminaries This section introduces the preliminaries required for detecting deadlocks using BPMN-Q. In particular, BPMN-Q is introduced, existing deadlock patterns are discussed, and limitations and assumptions are given. 3.1 BPMN-Q BPMN-Q [4] is a visual language that is based on BPMN [1]. It is used to query business process models based on their structure. Beside the set of notations defined in BPMN, BPMN-Q extends them with seven new elements. Some of these elements are flow objects, the others are for connectivity. These elements are shown in figure 1 and are described as follows: (a) Variable Node: it resembles an activity but is distinguished by sign in the beginning of the label. It is used to indicate unknown activities in a query. (b) Generic: this indicates an unknown node in a process. It could evaluate to anything even null except for start events.
4 Exclude(Event) Check Credit Verify Security Fig. 2. Sample Query. (c) Generic Split: a generalization of any type of split gateway. (d) Generic Join: a generalization of any type of join gateway. (e) Negative Sequence Flow: states that two nodes A and B are not directly related by sequence flow. (f) Path: states that there must be a path from A to B. A query usually returns all paths. (g) Negative Path: states that there is not any path between two nodes A and B. An example is shown in figure 2. It shows a simple query that detects if a given process model contains the tasks Check Credit and Verify Security in a parallel order. Since arbitrary nodes might be in-between the AND-gateway and the required tasks, path query elements are used. A path might have an additional path expression, written in brackets on the path. The only path expression that we use in this paper is the exclusion of certain nodes from a path, denoted as exclude(nodetype). The upper path of the example excludes intermediate events from the path for illustration purposes. 3.2 Deadlock Patterns Deadlock patterns have already been identified by Onada et al. in [7]. Two concepts were behind these patterns. The first is reachability. Reachability between two nodes A and B in a process graph simply means that there is at least one path from A to B. The second is absolute transferability. This is a much stronger concept because it states that a token (work item) can always be transferred from node A to all input points of node B. What makes absolute transferability reduce reachability between two nodes is the existence of routing control nodes in between. From the semantics of AND-join nodes, we know that a deadlock occurs if not all its input points are activated. If we analyze the type of connectivity between an AND-join node and its sources with respect to the absolute transferability and reachability concepts, we can come out with three combinations: Reachability with absolute transferability. The execution path from a node A to the input points of an AND-join is free of XOR and OR splits. According to the definition of absolute transferability, there is no chance for deadlocks.
5 Reachability without absolute transferability. Here the execution path from some node A to the input points of an AND-join node includes XOR (OR) splits. Here, there is a possibility for deadlocks. No Reachability. This means that there is no path from a certain node to the inputs of an AND-join, so no chance for deadlocks to occur. It is now clear, that whenever there is a reachability without absolute transferability, there is a chance for a deadlock. The authors of [7] also identified the possibility for a reachability without absolute transferability from the output of an AND-join back to its input. They called this behavior the loop deadlock type (see Table 3 row 4 in [7]). Another pattern they identified is the multiple source deadlock type. It occurs when an AND-join has input that stems from different sources (see Table 3 row 5 in [7]). According to the above discussion, five deadlock patterns were identified. We represent them next (in a compact form as three of them are variants of each other) along with a discussion when applying them to BPMN models. Loop: occurs when there is an execution path from the output of an AND-join back to a subset of its input points. If this path contains an XOR-split, deadlock occurs only when the branch leading to the loop is chosen. In case there is a path that does not contain XOR-splits deadlock occurrence is certain. Multiple Source: occurs when an AND-join has input points which are at some point in the process up-stream originate from two different sources. Assuming that none of the source nodes is the AND-Join itself, we can see that the multiple source pattern can occur (distinctly from other pattern) only when the process structure is one of the following: One of the two sources is an XOR-split. This specification intersects with the third type of patterns shown below. The process has multiple start points that are later on synchronized. In case of models specified in BPMN, multiple starts are permissible. Actually, multiple start points resemble an AND-split between the start events, hence we can deduce that there is reachability between two or more sources (start events) to the AND-join node. Improper structuring: an AND-join receives input that early started from an XOR-split. These types of patterns are shown in figure 3, where sequence flow edges labeled with 1 show a trivial representation of the multiple source pattern. Edges labeled with 2 show both patterns of loop and improper structuring, indicating that these patterns are not disjoint. 3.3 Limitations and Assumptions To highlight the key concepts, we limit our work on process models containing only AND- and XOR- gateways. We leave the more complex discussion related to OR-joins for future work. We also assume that the queried process models do not contain implicit splits or merges. This means, that the pattern shown
6 2 A 1,2 C B 1 Fig. 3. Faulty Process Model indicating the Types of (a) (b) Fig. 4. Implicit versus (a) (b) Fig. 5. Implicit versus explicit XOR-join. in figure 4 (a) must not appear; instead the explicit split shown in figure 4 (b) must be used. The similarity is stated in the BPMN specification document [1, p.111]. Unfortunately, implicit merges may not be mapped directly to explicit representations. The equivalent explicit representation depends on the type of the preceding split. Figure 5 shows the specific case, where an implicit merge is interpreted as an XOR-split (for more details about other scenarios please refer to the specification document). Another issue regarding multiple start events is given when all outgoing flows from these start events are leading to the same activity. In this case, there is an implicit AND-join node in front of the activity and all start events are necessary to start execution. To remove this ambiguity, we enforce an explicit AND-join. 4 Deadlock Queries In this section we present a set of queries that detect the different deadlock patterns. Some of these queries are direct representation of the patterns, whereas others need more details to ensure correct capturing of the patterns.
7 4.1 Loop Deadlock Pattern Figure 6 shows the corresponding query in BPMN-Q that declaratively describes the loop pattern. We have numbered the nodes to ease the explanation. Nodes 1 and 2 are called generic nodes that at query evaluation can match to any type of nodes in the process model. Both nodes 1, 2 represent input points to the ANDjoin (node 3). The path edge starting from node 3 back to node 1 represents an execution path from the AND-join back to node 1 (loop). To be sure that the resolved paths only reach a subset of the input points to node 3, we have put an extra constraint that is represented in the negative path from node 3 to node 2. This means that for some input point(s) of node 3 we fail to find that loop; i.e. the loop covers only a subset of the input points of the AND-join and hence a deadlock occurs Fig. 6. Loop Deadlock Query. 4.2 Multiple Source Deadlock Pattern With this pattern we address the case when a process has multiple start points (start event) which are later on synchronized. The query in figure 7 indicates two sources (nodes 1, 2), which are independent of each other. Each of them provides input to a subset of input points (nodes 3,4) to the AND-join (node 5). If we assume that only one of the start events is required to instantiate the process such as in BPMN a deadlock occurs at the AND-join. 4.3 Improper Structuring The mapping of the first two deadlock pattern to BPMN-Q was almost straightforward. When we consider the third case of deadlocks, the mapping is not straightforward. If we consider a direct mapping from the pattern description to a query, we would come out with a query like the one shown in figure 8. If we apply this query to the process model shown in figure 9(a), however, it would result in figure 9(b), showing a match. Although the query found a match in the
8 Fig. 7. Multiple Source Query. Fig. 8. Direct Description of the Improper Structuring Pattern as a Query. A A B B C (a) Process Model C (b) Result of the query (with red color) Fig. 9. Example: Deadlock-free Process Model and Query Result. process model, the model actually is not suffering from deadlocks. The mistake lies in the fact that there is no improper structuring here because the AND-join gate is not the match of the XOR-split, since there is an XOR-join in-between. To solve the issue, we need to modify this query to address patterns where an AND-join node is considered as the match to an XOR-split and whatever lies in-between is properly structured. We look for patterns that start with an XORsplit and end with an AND-join and what lies in-between is properly structured. The different combinations of proper structures in-between an XOR-split and an AND-join are given by: Balanced XOR-splits/joins and AND-splits/joins. Balanced XOR-splits/joins. Balanced AND-splits/joins. Sequence of nodes that does not contain gateways. In the following subsections we will discuss each case along with the query that expresses it. Balanced XOR-splits/joins and AND-splits/joins. The query shown in figure 10 looks for a pattern where there is some XOR-split (node 1) and an ANDjoin (node 6) and in-between there are balanced structures of XOR-splits/joins
9 Fig. 10. Improper Structure with in-between Balanced XOR/AND-splits/joins exclude(and SPLIT) 2 Fig. 11. Improper Structure with in-between Balanced XOR-splits/joins. and AND-splits/joins. To illustrate that the XOR-split (node 1) is not matched by an XOR-join (node 3), we stated that there is some node in the process graph (node 2) that follows the XOR-split (sequence flow edge between nodes 1, 2) but this node (node 2) is not enclosed in an execution path to the XOR-join (negative path edge between nodes 2, 3). Also we account for the existence of balanced AND-split/AND-join. In the same way we need to prove that there is no AND-split (node 5) that is considered as a match to the AND-join (node 6), by showing that there is some input node (node 4) to the AND-join (sequence flow edge between nodes 4, 6) that is not included in an execution path starting at the AND-split (negative path edge between nodes 5, 4). Balanced XOR-splits/joins. In this case, we focus on only detecting balanced XOR-gateways that lie between a source XOR-split node and a target AND-join node. Figure 11 is the query that detects this type of deadlock. The detection of the unmatched XOR-split is similar to figure 10. The difference is, that an execution path from the XOR-join (node 3) to the AND-join (node 4) excludes any AND-split nodes (path edge between nodes 3, 4). Balanced AND-splits/joins. Here, only balanced AND-splits/joins are inbetween a source XOR-split and a destination AND-join. Figure 12 shows the corresponding query. We follow the same approach as with balanced XORsplit/joins, but this time we need to show that we fail to find and AND-split (node 2) that acts as a match to the AND-join (node 4). We express this no match by finding a node (node 3) which is an input to the AND-join that is not enclosed by the AND-split (negative path edge between nodes 2, 3). We stress that the path from the XOR-split (node 1) to the AND-split (node 2) contains no XOR-joins (path edge between nodes 1, 2).
10 1 2 4 exclude(xor JOIN) 3 Fig. 12. Improper Structure with in-between Balanced AND-splits/joins. Sequence of nodes. The fourth case occurs when an XOR-split is matched by an AND-join with only a sequence of activities or intermediate events in-between (without any gateways). To express this as a query, we use the exclude property of path operator in BPMN-Q. The visualization of the query is the same as the one in figure 8, but the path exclude condition is Type(Gateway). Finally, we need to state that the different queries have to be applied in a certain order. First, the query shown in figure 10 needs to be applied. If it does not find a match, either the query shown in figure 11 or 12 are applied. If both do not find a match, finally the query from figure 8 with the additional exclude condition of gateways should be applied. If all these queries fail to find a match, the process model is free of the kinds of deadlocks we discussed. 5 Example Figure 13 shows a sample process model that should be examined. When we check queries in the order specified in the end of section 4, the query in figure 10 is the one that finds a match in the process as follows: the XOR-Split (node 1) in the query graph is bound to XOR-Split 1 in the process graph. Node 1 did not bind to XOR-Split 2 because BPMN-Q failed to find a node (in process graph) that is a successor of XOR-Split 2 and in mean time does not have a path to XOR-Join. Generic node (node 2) is bound to activity Obtain Info as it is a direct successor to the XOR-Split (by the sequence flow edge) and it has no path to an XOR-join node (negative path edge between node 2 and 3 in the query graph). In turn, node 3 in the query is bound to the XOR-Join in the process graph. Generic Node 4 is bound to the XOR-join as this node satisfies the constraint of being a predecessor of an AND-Join node (AND-Join 2) and there is no execution path from an AND-Split to it. Node 5 is bound to the AND-Split node and the AND-Join node (node 6) is bound to AND-Join 2 as we pointed shortly before. To visualize the query, we reproduced the process model from figure 13 in figure 14. It contains all nodes in the match of the query where the source of the mismatch is XOR-Split 1 and the destination is the AND-Join 2.
11 Obtain Info XOR-split 1 Identify Info AND-split Select Service Analyze Relation Retrieve Full Dtl XOR-split 2 Submit AND-join 1 AND-join 2 XOR-join Prepare Prop. Doc Record Info Propose Account Opening Record Acc Info Schedule Status Review Open Acc Status Review Verify ID Open Account Validate Acc Info Apply Acc Policy Close Acc Activate Acc Evaluate Val Do Report Large Notify Fig. 13. Process Model suffering from a deadlock Obtain Info XOR-split 1 Identify Info AND-split Select Service Analyze Relation Retrieve Full Dtl XOR-split 2 Submit AND-join 1 AND-join 2 XOR-join Fig. 14. Query of figure 10 matched to process model in figure 13 6 Conclusion The paper discussed a novel approach to detect deadlocks in process models via querying them with certain deadlock patterns. In particular, we discussed the translation from deadlock patterns into BPMN-Q queries. This translation required a deeper understanding of the BPMN as well as the BPMN-Q semantics. The results, however, may be applied by process designers without any deeper understanding of BPMN-Q. If a BPMN-Q deadlock query produces a non-empty subset of a process model s graph, this sub-graph directly highlights the problematic areas of the process model. Hence, the process designer is able to directly fix the problems that occur. Regard practical feasibility, our approach has the advantage of requiring low computational effort. The drawback, however, is the
12 incompleteness of the results. If a query matches, a deadlock is found. If no deadlock query matches a given process model at all, this doesn t guarantee that the model is deadlock free. What has been proven instead, is that certain types of deadlocks do not occur in the process model. Future work will focus on expanding the deadlock detection patterns. We will add support for additional types of unwanted behavior in process models, like for instance lifelocks. We also plan to investigate the required efforts for a larger set of process models, where we additionally plan to compare the results with traditional soundness investigations [2]. References 1. Business Process Modeling Notation (BPMN) Specification, Final Adopted Specification. Technical report, OMG, W. Aalst. Verification of Workflow Nets. In P. Azéma and G. Balbo, editors, Application and Theory of Petri Nets 1997, volume 1248 of LNCS, pages , Berlin, Springer Verlag. 3. W. Aalst, A. ter Hofstede, and M. Weske. Business Process Management: A Survey. In W. Aalst, A. Hofstede, and M. Weske, editors, Business Process Management, volume 2678 of LNCS, pages 1 12, Berlin, Springer Verlag. 4. A. Awad. BPMN-Q a Language to Query Business Processes. In Proceedings of the 2nd International Workshop on Enterprise Modelling and Information Systems Architectures(EMISA 2007), Oct G. Keller, M. Nüttgens, and A. Scheer. Semantische Prozessmodellierung auf der Grundlage Ereignisgesteuerter Prozessketten (EPK). Technical Report 89, Institut für Wirtschaftsinformatik, Saarbrücken, A. Martens. Analyzing Web Service based Business Processes. In M. Cerioli, editor, Fundamental Approaches to Software Engineering (FASE 05), volume 3442 of LNCS, pages Springer Verlag, April S. Onoda, Y. Ikkai, T. Kobayashi, and N. Komoda. Definition of deadlock patterns for business processes workflow models. In HICSS 99: Proceedings of the Thirtysecond Annual Hawaii International Conference on System Sciences-Volume 5, pages 50 65, Washington, DC, USA, IEEE Computer Society. 8. F. Puhlmann and M. Weske. Investigations on Soundness Regarding Lazy Activities. In S. Dustdar, J. Fiadeiro, and A. Sheth, editors, Business Process Management, volume 4102 of LNCS, pages , Berlin, Springer Verlag. 9. W. Sadiq and M. E. Orlowska. Applying graph reduction techniques for identifying structural conflicts in process models. In CAiSE 99: Proceedings of the 11th International Conference on Advanced Information Systems Engineering, pages , London, UK, Springer-Verlag. 10. B. F. van Dongen, J. Mendling, and W. M. P. van der Aalst. Structural patterns for soundness of business process models. In EDOC 06: Proceedings of the 10th IEEE International Enterprise Distributed Object Computing Conference (EDOC 06), pages , Washington, DC, USA, IEEE Computer Society.
Process Modeling Notations and Workflow Patterns
Process Modeling Notations and Workflow Patterns Stephen A. White, IBM Corp., United States ABSTRACT The research work of Wil van der Aalst, Arthur ter Hofstede, Bartek Kiepuszewski, and Alistair Barros
BIS 3106: Business Process Management. Lecture Two: Modelling the Control-flow Perspective
BIS 3106: Business Process Management Lecture Two: Modelling the Control-flow Perspective Makerere University School of Computing and Informatics Technology Department of Computer Science SEM I 2015/2016
Towards Process Evaluation in Non-automated Process Execution Environments
Towards Process Evaluation in Non-automated Process Execution Environments Nico Herzberg, Matthias Kunze, Andreas Rogge-Solti Hasso Plattner Institute at the University of Potsdam Prof.-Dr.-Helmert-Strasse
Semantic Analysis of Flow Patterns in Business Process Modeling
Semantic Analysis of Flow Patterns in Business Process Modeling Pnina Soffer 1, Yair Wand 2, and Maya Kaner 3 1 University of Haifa, Carmel Mountain 31905, Haifa 31905, Israel 2 Sauder School of Business,
Business Process Modeling
Business Process Concepts Process Mining Kelly Rosa Braghetto Instituto de Matemática e Estatística Universidade de São Paulo [email protected] January 30, 2009 1 / 41 Business Process Concepts Process
EXTENDING BUSINESS PROCESS MODELING TOOLS WITH WORKFLOW PATTERN REUSE
EXTENDING BUSINESS PROCESS MODELING TOOLS WITH WORKFLOW PATTERN REUSE Lucinéia Heloisa Thom 1, Jean Michael Lau 1, Cirano Iochpe 1,2, Jan Mendling 3 1 Institute of Informatics, Federal University of Rio
Process Mining Using BPMN: Relating Event Logs and Process Models
Noname manuscript No. (will be inserted by the editor) Process Mining Using BPMN: Relating Event Logs and Process Models Anna A. Kalenkova W. M. P. van der Aalst Irina A. Lomazova Vladimir A. Rubin Received:
Dr. Jana Koehler IBM Zurich Research Laboratory
Precise Modeling of Business Processes with the Business Process Modeling Notation BPMN 2.0 Dr. Jana Koehler IBM Zurich Research Laboratory ZRL BIT at a Glance Computer Science at ZRL: Security/Cryptography
Business Process Quality Metrics: Log-based Complexity of Workflow Patterns
Business Process Quality Metrics: Log-based Complexity of Workflow Patterns Jorge Cardoso Department of Mathematics and Engineering, University of Madeira, Funchal, Portugal [email protected] Abstract. We
Business Process Model and Soundness
Instantaneous Soundness Checking of Industrial Business Process Models Dirk Fahland 1, Cédric Favre 2, Barbara Jobstmann 4, Jana Koehler 2, Niels Lohmann 3, Hagen Völzer 2, and Karsten Wolf 3 1 Humboldt-Universität
WoPeD - An Educational Tool for Workflow Nets
WoPeD - An Educational Tool for Workflow Nets Thomas Freytag, Cooperative State University (DHBW) Karlsruhe, Germany [email protected] Martin Sänger, 1&1 Internet AG, Karlsruhe, Germany [email protected]
Workflow Patterns for Business Process Modeling
Workflow Patterns for Business Process Modeling Lucinéia Heloisa Thom 1, Cirano Iochpe 1,2, Manfred Reichert 3 1 Federal University of Rio Grande do Sul, Informatics Institute, Av. Bento Gonçalves, 9500,
Modeling Workflow Patterns
Modeling Workflow Patterns Bizagi Suite Workflow Patterns 1 Table of Contents Modeling workflow patterns... 4 Implementing the patterns... 4 Basic control flow patterns... 4 WCP 1- Sequence... 4 WCP 2-
Weak Conformance between Process Models and Synchronized Object Life Cycles
Weak Conformance between Process Models and Synchronized Object Life Cycles Andreas Meyer, Mathias Weske Technische Berichte Nr. 91 des Hasso-Plattner-Instituts für Softwaresystemtechnik an der Universität
Methods for the specification and verification of business processes MPB (6 cfu, 295AA)
Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Roberto Bruni http://www.di.unipi.it/~bruni 19 - Event-driven process chains 1 Object We overview EPC and the main
Chapter 2 Introduction to Business Processes, BPM, and BPM Systems
Chapter 2 Introduction to Business Processes, BPM, and BPM Systems This chapter provides a basic overview on business processes. In particular it concentrates on the actual definition and characterization
Modeling Guidelines Manual
Modeling Guidelines Manual [Insert company name here] July 2014 Author: John Doe [email protected] Page 1 of 22 Table of Contents 1. Introduction... 3 2. Business Process Management (BPM)... 4 2.1.
Transforming PICTURE to BPMN 2.0 as Part of the Model-driven Development of Electronic Government Systems
Heitkötter, Henning, Transforming PICTURE to BPMN 2.0 as Part of the Model-Driven Development of Electronic Government Systems, 44th Hawaii International Conference on System Sciences (HICSS), pp. 1 10,
Diagnosing workflow processes using Woflan
Diagnosing workflow processes using Woflan H.M.W. Verbeek 1, T. Basten 2, and W.M.P. van der Aalst 3 1 Dept. of Computing Science, Eindhoven University of Technology, The Netherlands [email protected]
1 Business Modeling. 1.1 Event-driven Process Chain (EPC) Seite 2
Business Process Modeling with EPC and UML Transformation or Integration? Dr. Markus Nüttgens, Dipl.-Inform. Thomas Feld, Dipl.-Kfm. Volker Zimmermann Institut für Wirtschaftsinformatik (IWi), Universität
BPMN PATTERNS USED IN MANAGEMENT INFORMATION SYSTEMS
BPMN PATTERNS USED IN MANAGEMENT INFORMATION SYSTEMS Gabriel Cozgarea 1 Adrian Cozgarea 2 ABSTRACT: Business Process Modeling Notation (BPMN) is a graphical standard in which controls and activities can
Chapter 3 Essential Process Modeling
Chapter 3 Essential Process Modeling Essentially, all models are wrong, but some are useful. George E.P. Box (1919 ) Business process models are important at various stages of the BPM lifecycle. Before
IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD
Journal homepage: www.mjret.in ISSN:2348-6953 IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Deepak Ramchandara Lad 1, Soumitra S. Das 2 Computer Dept. 12 Dr. D. Y. Patil School of Engineering,(Affiliated
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Research Motivation In today s modern digital environment with or without our notice we are leaving our digital footprints in various data repositories through our daily activities,
Interaction Choreography Models in BPEL: Choreographies on the Enterprise Service Bus
S BPM ONE 2010 the Subjectoriented BPM Conference http://www.aifb.kit.edu/web/s bpm one/2010 Interaction Choreography Models in BPEL: Choreographies on the Enterprise Service Bus Oliver Kopp, Lasse Engler,
A business process metamodel for Enterprise Information Systems automatic generation
A business process metamodel for Enterprise Information Systems automatic generation Luiz Fernando Batista Loja 1, Valdemar Vicente Graciano Neto 1, Sofia Larissa da Costa 1, Juliano Lopes de Oliveira
Modelling and Verification of Business Processes
Modelling and Verification of Business Processes Costin Bădică Department of Computer Science King s College London, WC2R 2LS, UK [email protected] Chris Fox Department of Computer Science University
Formal Approaches to Business Processes through Petri Nets
Formal Approaches to Business Processes through Petri Nets Nick ussell Arthur H. M. ter Hofstede a university 2009, www.yawlfoundation.org Acknowledgement These slides summarize the content of Chapter
Modelling Workflow with Petri Nets. CA4 BPM PetriNets
Modelling Workflow with Petri Nets 1 Workflow Management Issues Georgakopoulos,Hornick, Sheth Process Workflow specification Workflow Implementation =workflow application Business Process Modelling/ Reengineering
From Workflow Design Patterns to Logical Specifications
AUTOMATYKA/ AUTOMATICS 2013 Vol. 17 No. 1 http://dx.doi.org/10.7494/automat.2013.17.1.59 Rados³aw Klimek* From Workflow Design Patterns to Logical Specifications 1. Introduction Formal methods in software
Ensuring Quality in Business-driven Development of IT Systems using Workflow Patterns
Ensuring Quality in Business-driven Development of IT Systems using Workflow Patterns Masud Fazal-Baqaie Datenbank- und Informationssysteme AG Engels What is a Business Process? A business process is a
Diagramming Techniques:
1 Diagramming Techniques: FC,UML,PERT,CPM,EPC,STAFFWARE,... Eindhoven University of Technology Faculty of Technology Management Department of Information and Technology P.O. Box 513 5600 MB Eindhoven The
CHAPTER 22 Database Security Integration Using Role-Based Access Control
CHAPTER 22 Database Security Integration Using Role-Based Access Control Sylvia Osborn Department of Computer Science, The University of Western Ontario London, Ontario, Canada, N6A-5B7 [email protected]
Test Coverage Criteria for Autonomous Mobile Systems based on Coloured Petri Nets
9th Symposium on Formal Methods for Automation and Safety in Railway and Automotive Systems Institut für Verkehrssicherheit und Automatisierungstechnik, TU Braunschweig, 2012 FORMS/FORMAT 2012 (http://www.forms-format.de)
Time Patterns in Workflow Management Systems
Time Patterns in Workflow Management Systems Cosmina Cristina Niculae Department of Mathematics and Computer Science, Eindhoven University of Technology P.O. Box 513, 5600 MB, Eindhoven, the Netherlands
Model Simulation in Rational Software Architect: Business Process Simulation
Model Simulation in Rational Software Architect: Business Process Simulation Mattias Mohlin Senior Software Architect IBM The BPMN (Business Process Model and Notation) is the industry standard notation
Analysis of Service Level Agreements using Process Mining techniques
Analysis of Service Level Agreements using Process Mining techniques CHRISTIAN MAGER University of Applied Sciences Wuerzburg-Schweinfurt Process Mining offers powerful methods to extract knowledge from
YAWL: Yet Another Workflow Language (Revised version) 2
YAWL: Yet Another Workflow Language (Revised version) W.M.P. van der Aalst ½ ¾ and A.H.M. ter Hofstede ¾ ¾ ½ Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600
Process Mining. ^J Springer. Discovery, Conformance and Enhancement of Business Processes. Wil M.R van der Aalst Q UNIVERS1TAT.
Wil M.R van der Aalst Process Mining Discovery, Conformance and Enhancement of Business Processes Q UNIVERS1TAT m LIECHTENSTEIN Bibliothek ^J Springer Contents 1 Introduction I 1.1 Data Explosion I 1.2
EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES. Nataliya Golyan, Vera Golyan, Olga Kalynychenko
380 International Journal Information Theories and Applications, Vol. 18, Number 4, 2011 EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES Nataliya Golyan, Vera Golyan, Olga Kalynychenko
Towards an Integration of Business Process Modeling and Object-Oriented Software Development
Towards an Integration of Business Process Modeling and Object-Oriented Software Development Peter Loos, Peter Fettke Chemnitz Univeristy of Technology, Chemnitz, Germany {loos peter.fettke}@isym.tu-chemnitz.de
BPMN A Logical Model and Property Analysis. Antoni Ligęza
Decision Making in Manufacturing and Services Vol. 5 2011 No. 1 2 pp. 57 67 BPMN A Logical Model and Property Analysis Antoni Ligęza Abstract. Business Process Modeling Notation has become a powerful and
Modeling BPMN Diagrams within XTT2 Framework. A Critical Analysis**
AUTOMATYKA 2011 Tom 15 Zeszyt 2 Antoni Ligêza*, Tomasz Maœlanka*, Krzysztof Kluza*, Grzegorz Jacek Nalepa* Modeling BPMN Diagrams within XTT2 Framework. A Critical Analysis** 1. Introduction Design, analysis
08 BPMN/1. Software Technology 2. MSc in Communication Sciences 2009-10 Program in Technologies for Human Communication Davide Eynard
MSc in Communication Sciences 2009-10 Program in Technologies for Human Communication Davide Eynard Software Technology 2 08 BPMN/1 2 ntro Sequence of (three?) lessons on BPMN and technologies related
The Analysis Method about Change Domain of Business Process Model Based on the Behavior Profile of Petri Net
Appl. Math. Inf. Sci. 6-3S, No. 3, 943-949 (2012) 943 Applied Mathematics & Information Sciences An International Journal The Analysis Method about Change Domain of Business Process Model Based on the
A Business Process Services Portal
A Business Process Services Portal IBM Research Report RZ 3782 Cédric Favre 1, Zohar Feldman 3, Beat Gfeller 1, Thomas Gschwind 1, Jana Koehler 1, Jochen M. Küster 1, Oleksandr Maistrenko 1, Alexandru
Dotted Chart and Control-Flow Analysis for a Loan Application Process
Dotted Chart and Control-Flow Analysis for a Loan Application Process Thomas Molka 1,2, Wasif Gilani 1 and Xiao-Jun Zeng 2 Business Intelligence Practice, SAP Research, Belfast, UK The University of Manchester,
On the Modeling and Verification of Security-Aware and Process-Aware Information Systems
On the Modeling and Verification of Security-Aware and Process-Aware Information Systems 29 August 2011 What are workflows to us? Plans or schedules that map users or resources to tasks Such mappings may
On the Cognitive Effectiveness of Routing Symbols in Process Modeling Languages
On the Cognitive Effectiveness of Routing Symbols in Process Modeling Languages Kathrin Figl 1, Jan Mendling 2, Mark Strembeck 1, Jan Recker 3 1 Vienna University of Economics and Business, 1090 Vienna,
The BPM to UML activity diagram transformation using XSLT
The BPM to UML activity diagram transformation using XSLT Ondřej Macek 1 and Karel Richta 1,2 1 Department of Computer Science and Engineering, Faculty of Electrical Engineering, Czech Technical University,
Testing LTL Formula Translation into Büchi Automata
Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland
Integration of SAP NetWeaver BPM and Signavio Process Editor. A White Paper
Integration of SAP NetWeaver BPM and Signavio Process Editor A White Paper February 2013 Authors Gero Decker, Signavio GmbH ([email protected]) Nico Herzberg, HPI at University of Potsdam ([email protected])
Process Mining by Measuring Process Block Similarity
Process Mining by Measuring Process Block Similarity Joonsoo Bae, James Caverlee 2, Ling Liu 2, Bill Rouse 2, Hua Yan 2 Dept of Industrial & Sys Eng, Chonbuk National Univ, South Korea jsbae@chonbukackr
Business Independent Model of Mobile Workforce Management
Business Independent Model of Mobile Workforce Management Volker Gruhn and Thomas Richter Chair of Applied Telematics / e-business, University of Leipzig Klostergasse 3, 04109 Leipzig, Germany {gruhn,richter}@ebus.informatik.uni-leipzig.de
Workflow Management Models and ConDec
A Declarative Approach for Flexible Business Processes Management M. Pesic and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology, P.O.Box 513, NL-5600 MB, Eindhoven,
Process Modeling using BPMN 2.0
Process Modeling using BPMN 2.0 This chapter provides a brief overview of Business Process Modeling Notation (BPMN) concepts with particular emphasis on the BPMN 2.0 additions. In addition, it describes
OMG releases BPMN 1.1 - What's changed?
OMG releases BPMN 1.1 - What's changed? (revised version as of April 2008) Gero Decker 1 and Torben Schreiter 2 1 Hasso Plattner Institute, Potsdam, Germany 2 inubit AG, Berlin, Germany Abstract The Business
BPIC 2014: Insights from the Analysis of Rabobank Service Desk Processes
BPIC 2014: Insights from the Analysis of Rabobank Service Desk Processes Bruna Christina P. Brandão, Guilherme Neves Lopes, Pedro Henrique P. Richetti Department of Applied Informatics - Federal University
Towards Cross-Organizational Process Mining in Collections of Process Models and their Executions
Towards Cross-Organizational Process Mining in Collections of Process Models and their Executions J.C.A.M. Buijs, B.F. van Dongen, W.M.P. van der Aalst Department of Mathematics and Computer Science, Eindhoven
Modeling Business Processes with BPMN. Andrea Marrella [email protected]
Modeling Business Processes with BPMN Andrea Marrella [email protected] Presentation Outline This seminar introduces business process modeling using the BPMN (Business Process Model and Notation)
Prediction of Business Process Model Quality based on Structural Metrics
Prediction of Business Process Model Quality based on Structural Metrics Laura Sánchez-González 1, Félix García 1, Jan Mendling 2, Francisco Ruiz 1, Mario Piattini 1 1 Alarcos Research Group, TSI Department,
Human-Readable BPMN Diagrams
Human-Readable BPMN Diagrams Refactoring OMG s E-Mail Voting Example Thomas Allweyer V 1.1 1 The E-Mail Voting Process Model The Object Management Group (OMG) has published a useful non-normative document
MANY organizations have built over time repositories
1 Similarity of Business Process Models: Metrics and Evaluation Remco Dijkman, Marlon Dumas, Boudewijn van Dongen, Reina Käärik, Jan Mendling Abstract It is common for large and comple organizations to
A BPMN Model of the Charite Stroke Treatment Process
A BPMN Model of the Charite Stroke Treatment Process Kristian Duske 1 and Richard Müller 2,3 and Robert Prüfer 3 and Daniel Stöhr 1 1 Institut für Softwaretechnik und Theoretische Informatik, Technische
Transformation of BPMN models for Behaviour Analysis
Transformation of BPMN models for Behaviour Analysis Ivo Raedts 1, Marija Petković 1, Yaroslav S. Usenko 1, Jan Martijn van der Werf 1, Jan Friso Groote 1, Lou Somers 1 1 LaQuSo, Laboratory for Quality
Data in Business Processes
Data in Business Processes Andreas Meyer, Sergey Smirnov, Mathias Weske Technische Berichte Nr. 50 des Hasso-Plattner-Instituts für Softwaresystemtechnik an der Universität Potsdam Technische Berichte
Activity Mining for Discovering Software Process Models
Activity Mining for Discovering Software Process Models Ekkart Kindler, Vladimir Rubin, Wilhelm Schäfer Software Engineering Group, University of Paderborn, Germany [kindler, vroubine, wilhelm]@uni-paderborn.de
Applying a Generic Conceptual Workflow Modeling Technique to Document Workflows *
Applying a Generic Conceptual Workflow Modeling Technique to Document Workflows * Wasim Sadiq Maria E. Orlowska CRC for Distributed Systems Technology School of Information Technology The University of
CPN Tools 4: A Process Modeling Tool Combining Declarative and Imperative Paradigms
CPN Tools 4: A Process Modeling Tool Combining Declarative and Imperative Paradigms Michael Westergaard 1,2 and Tijs Slaats 3,4 1 Department of Mathematics and Computer Science, Eindhoven University of
Business-Driven Software Engineering Lecture 3 Foundations of Processes
Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster [email protected] Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary
Policy Modeling and Compliance Verification in Enterprise Software Systems: a Survey
Policy Modeling and Compliance Verification in Enterprise Software Systems: a Survey George Chatzikonstantinou, Kostas Kontogiannis National Technical University of Athens September 24, 2012 MESOCA 12,
Business Process Modeling Information Systems in Industry (372-1-4207 )
Business Process Modeling Information Systems in Industry (372-1-4207 ) Arnon Sturm The material of this presentation is adopted from various people including:, Pnina Soffer, Iris Reinhartz-Berger 1 Outline
