State Space Analysis: Properties, Reachability Graph, and Coverability graph. prof.dr.ir. Wil van der Aalst

Size: px
Start display at page:

Download "State Space Analysis: Properties, Reachability Graph, and Coverability graph. prof.dr.ir. Wil van der Aalst"

Transcription

1 State Space Analysis: Properties, Reachability Graph, and Coverability graph prof.dr.ir. Wil van der Aalst

2 Outline Motivation Formalization Basic properties Reachability graph Coverability graph PAGE 1

3 Motivation

4 Design-time analysis vs run-time analysis validation world business processes people services components organizations models analyzes supports/ controls specifies configures implements analyzes (software) system records events, e.g., messages, transactions, etc. e.g., systems like WebSphere, Oracle, TIBCO/ Staffware, SAP, FLOWer, etc. verification discovery performance analysis (process) model conformance extension event logs design-time analysis e.g. process models represented in BPMN, BPEL, EPCs, Petri nets, UML AD, etc. or other types of models such as social networks, organizational networks, decision trees, etc. run-time analysis e.g., dedicated formats such as IBM s Common Event Infrastructure (CEI) and MXML or proprietary formats stored in flat files or database tables. PAGE 3

5 Analysis of processes X linear algebraic analysis techniques Y Z Petri net Markov chain analysis techniques state-space analysis techniques... PAGE 4

6 Generic questions terminating it has only finite occurrence sequences deadlock-free each reachable marking enables a transition live each reachable marking enables an occurrence sequence containing all transitions bounded each place has an upper bound that holds for all reachable markings 1-safe 1 is a bound for each place s reversible m0 is reachable from each reachable marking, i.e., the initial marking is a so-called home marking. PAGE 5

7 Example p4 t3 p3 p5 terminating it has only finite occurrence sequences deadlock-free each reachable marking enables a transition live each reachable marking enables an occurrence sequence containing all transitions bounded each place has an upper bound that holds for all reachable markings 1-safe 1 is a bound for each place s reversible m0 is reachable from each reachable marking, i.e., the initial marking is a so-called home marking. PAGE 6

8 Specific questions p4 t3 p3 p5 Is it possible to have a token in both and p5? Will t3 always take place? Will t3 always take place assuming "fairness"? Is it possible to execute after? Can both p4 and p5 be empty at the same time? PAGE 7

9 infinite state space state explosion problem PAGE 8

10 Concepts marked net (1,0) (1,1) (1,2)... reachability graph (1,0) (1,ω) coverability graph PAGE 9

11 Relevant material 1. Jörg Desel, Wolfgang Reisig: Place/Transition Petri Nets. Petri Nets 1996: DOI: / _ Tadao Murata, Petri Nets: Properties, Analysis and Applications, Proceedings of the IEEE. 77(4): , April, Wil van der Aalst: Process Mining: Discovery, Conformance and Enhancement of Business Processes, Springer Verlag 2011 (chapters 1 & 5) a) Chapter 1: DOI: / _1 b) Chapter 5: DOI: / _5 c) Events logs: Today's focus is on 1 & 2. PAGE 10

12 Formalization Note: refinement of earlier link between Petri net and transitions system (week 2/3) that is closer to standard literature.

13 Basic Petri net P = {,} T = {,} F = {(,), (,), (,), (,), (,)} PAGE 12

14 Place transition net P = {,} T = {,} F = {(,), (,), (,), (,)} W(,)=2, W(,)=2, W(,)=1, and W(,)=1 PAGE 13

15 Multi-sets M 0 () = 2 M 0 () = 3 PAGE 14

16 Operations on multi-sets PAGE 15

17 Notation M 0 = [,,,,] = [ 2, 3 ] = 2[]+3[] also denoted as (2,3) PAGE 16

18 Preset/postset PAGE 17

19 Examples = [] = [ 2 ] = [ 2 ] = [] = [] = [,] = [] = [] = [ 2 ] = [ 2 ] = [] = [] = [] = [,] = [,] = [ ] PAGE 18

20 Firing rule PAGE 19

21 Notations Murata Desel/Reisig PAGE 20

22 Notations: Firing rule Murata Desel/Reisig PAGE 21

23 Basic Properties

24 Basic properties of a marked Petri net PAGE 23

25 Terminating PAGE 24

26 Deadlock-free PAGE 25

27 Liveness PAGE 26

28 Basic idea of liveness all reachable markings markings where t is enabled PAGE 27

29 Boundedness is 1-bounded, is 3-bounded is 1-bounded, is unbounded PAGE 28

30 Safeness p6 p4 t3 p3 p5 p6 p4 t3 p3 p5 PAGE 29

31 Reversible/home marking. [] is home marking PAGE 30

32 Reachability Graph

33 Definition t M M PAGE 32

34 Reachability graph algorithm 1) Label the initial marking M 0 as the root and tag it "new". 2) While "new" markings exists, do the following: a) Select a new marking M. b) If no transitions are enabled at M, tag M "dead-end". c) While there exist enabled transitions at M, do the following for each enabled transition t at M: i. Obtain the marking M' that results from firing t at M. ii. If M' does not appear in the graph, add M' and tag it "new". iii. Draw an arc with label t from M to M' (if not already present). 3) Output the graph. PAGE 33

35 Example free p4 t3 p3 p5 Step 1: Label the initial marking M0 as the root and tag it "new" (indicated by green color). [,free,p4] PAGE 34

36 Example (continued) free p4 t3 p3 p5 [,free,p4] [,free,p4] [,free,p4] [,free,p5] PAGE 35

37 Example (continued) free p4 t3 p3 p5 [,free,p4] [,free,p4] [,free,p4] [,free,p4] [,p3,p4] [,free,p5] [,free,p5] [,free,p5] PAGE 36

38 Example (continued) free p4 t3 p3 p5 [,free,p4] [,free,p4] [,p3,p4] [,free,p4] [,free,p4] [,p3,p4] [,free,p5] [,free,p5] [,free,p5] [,free,p5] PAGE 37

39 Example (continued) free p4 t3 p3 p5 [,free,p4] [,free,p4] [,p3,p4] [,free,p4] [,free,p4] [,p3,p4] [,free,p5] [,free,p5] [,free,p5] [,free,p5] [,p3,p5] PAGE 38

40 Example (continued) free p4 t3 p3 p5 [,free,p4] [,free,p4] [,p3,p4] [,free,p4] [,free,p4] [,p3,p4] [,p3,p4] [,free,p5] [,free,p5] [,p3,p5] [,free,p5] [,free,p5] [,p3,p5] PAGE 39

41 Example (continued) free p4 t3 p3 p5 [,free,p4] [,free,p5] [,free,p4] [,free,p5] [,p3,p4] [,p3,p5] [,p3,p4] [,free,p4] [,free,p5] [,free,p4] t3 [,free,p5] t3 [,p3,p4] [,p3,p5] [,p3,p4] [,p3,p5] PAGE 40

42 PAGE 41 Example (continued) t3 p5 p3 p4 free [,free,p4] [,free,p4] [,free,p5] [,free,p5] [,p3,p4] [,p3,p4] [,p3,p5] [,p3,p5] t3 t3 [,free,p4] [,free,p4] [,free,p5] [,free,p5] [,p3,p4] [,p3,p4] [,p3,p5] [,p3,p5] t3 t3

43 PAGE 42 Example (continued) t3 p5 p3 p4 free [,free,p4] [,free,p4] [,free,p5] [,free,p5] [,p3,p4] [,p3,p4] [,p3,p5] [,p3,p5] t3 t3 [,free,p4] [,free,p4] [,free,p5] [,free,p5] [,p3,p4] [,p3,p4] [,p3,p5] [,p3,p5] t3 t3

44 Example (complete) p3 free t3 p5 p4 [,free,p4] [,free,p5] [,free,p4] t3 [,free,p5] t3 [,p3,p4] [,p3,p5] [,p3,p4] [,p3,p5] The marked Petri net is: deadlock free live bounded safe reversible all markings are home markings PAGE 43

45 Coverability Graph

46 Problem (1,0) (1,1) (1,2)... ps. (n,m) is a shorthand for [ n, m ] PAGE 45

47 Coverability tree algorithm 1) Label the initial marking M 0 as the root and tag it "new". 2) While "new" markings exists, do the following: a) Select a new marking M and remove the "new" tag. b) If M is identical to a marking on the path from the root to M, then tag M "old" and go to another new marking. c) If no transitions are enabled at M, tag M "dead-end". d) While there exist enabled transitions at M, do the following for each enabled transition t at M: i. Obtain the marking M' that results from firing t at M. ii. If, on the path from the root to M, there exists a marking M'' such that M'(p) M''(p) for each p and M' M'' (i.e., M'' is coverable), then replace M'(p) by ω for each p such that M'(p) > M''(p). iii. Introduce M' as a node, draw an arc with label t from M to M', and tag M' "new". 3) Output the tree. PAGE 46

48 Example Step 1: Label the initial marking M 0 as the root and tag it "new" (indicated by green color). [] PAGE 47

49 Example (continued) Step 2: While "new" markings exists, do the following: Select a new marking M and remove the "new" tag. If M is identical to a marking on the path from the root to M, then tag M "old" and go to another new marking. If no transitions are enabled at M, tag M "dead-end". While there exist enabled transitions at M, do the following for each enabled transition t at M: Obtain the marking M' that results from firing t at M. If, on the path from the root to M, there exists a marking M'' such that M'(p) M''(p) for each p and M' M'' (i.e., M'' is coverable), then replace M'(p) by ω for each p such that M'(p) > M''(p). Introduce M' as a node, draw an arc with label t from M to M', and tag M' "new" [] [] [,] M [, ω ] M' PAGE 48

50 Example (continued) Step 2: While "new" markings exists, do the following: Select a new marking M and remove the "new" tag. If M is identical to a marking on the path from the root to M, then tag M "old" and go to another new marking. If no transitions are enabled at M, tag M "dead-end". While there exist enabled transitions at M, do the following for each enabled transition t at M: Obtain the marking M' that results from firing t at M. If, on the path from the root to M, there exists a marking M'' such that M'(p) M''(p) for each p and M' M'' (i.e., M'' is coverable), then replace M'(p) by ω for each p such that M'(p) > M''(p). Introduce M' as a node, draw an arc with label t from M to M', and tag M' "new" [] [, ω ] [] [, ω ] [, ω ] ω+k = ω-k = ω PAGE 49

51 Example (continued) Step 2: While "new" markings exists, do the following: Select a new marking M and remove the "new" tag. If M is identical to a marking on the path from the root to M, then tag M "old" and go to another new marking. If no transitions are enabled at M, tag M "dead-end". While there exist enabled transitions at M, do the following for each enabled transition t at M: Obtain the marking M' that results from firing t at M. If, on the path from the root to M, there exists a marking M'' such that M'(p) M''(p) for each p and M' M'' (i.e., M'' is coverable), then replace M'(p) by ω for each p such that M'(p) > M''(p). Introduce M' as a node, draw an arc with label t from M to M', and tag M' "new" [] [, ω ] [, ω ] [] [, ω ] [, ω ] PAGE 50

52 Example (complete) Step 3: Output the tree. [] [, ω ] [, ω ] Coverability graph: [] [, ω ] PAGE 51

53 Another example p3 [,p3] Step 1: Label the initial marking M 0 as the root and tag it "new" (indicated by green color). [,p3] [, ω,p3] p4 Step 2... [,p3,p4 ω ] PAGE 52

54 Example (continued) p3 [,p3] [, ω,p3] [, ω,p3] [,p3,p4 ω ] [, ω,p3,p4 ω ] p4 [,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3] [, ω,p3] [,p3] [, ω,p3] [, ω,p3] [,p3,p4 ω ] [,p3,p4 ω ] [, ω,p3,p4 ω ] PAGE 53

55 Example (continued) p3 [,p3] [, ω,p3] [, ω,p3] [,p3,p4 ω ] [, ω,p3,p4 ω ] p4 [,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3] [, ω,p3] [, ω,p3] [,p3] [, ω,p3] [, ω,p3] [,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3,p4 ω ] [, ω,p3,p4 ω ] PAGE 54

56 Example (continued) p3 [,p3] [, ω,p3] [, ω,p3] [,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] p4 [, ω,p3,p4 ω ] [,p3] [,p3,p4 ω ] [, ω,p3] [, ω,p3] [, ω,p3,p4 ω ] [,p3] [, ω,p3] [, ω,p3] [,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3,p4 ω ] [, ω,p3,p4 ω ] PAGE 55

57 Example (continued) p3 Step 3: Output the tree. [,p3] [, ω,p3] [, ω,p3] p4 [,p3] [, ω,p3] [, ω,p3] [,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] 4x [,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] PAGE 56

58 Example (complete) p3 [,p3] [, ω,p3] p4 [,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3] [, ω,p3] [, ω,p3] [, ω,p3,p4 ω ] [,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3,p4 ω ] [, ω,p3,p4 ω ] Coverability graph [, ω,p3,p4 ω ] PAGE 57

59 Coverability graph Take the coverability tree and simply merge nodes with identical labels [] [, ω ] [, ω ] [] [, ω ] [,p3] [, ω,p3] [, ω,p3] [,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3] [,p3,p4 ω ] [, ω,p3] [, ω,p3,p4 ω ] PAGE 58

60 Another example marked net (1,0) (1,1) (1,2)... reachability graph (0,0) (0,1) (1,0) (1,ω) (1,ω) coverability tree (0,ω) (1,0) (1,ω) coverability graph (0,ω) ps. (n,m) is a shorthand for [ n, m ] PAGE 59

61 ω-markings [,p3] [, ω,p3] [,p3,p4 ω ] [, ω,p3,p4 ω ] PAGE 60

62 Properties The coverability tree/graph is always finite. The marked Petri net is bounded if and only if the corresponding coverability tree/graph contains only ω-free markings. The coverability tree/graph gives an over-approximation. Different Petri nets may have the same coverability tree/graph. PAGE 61

63 Basic relation between reachable markings and coverability tree/graph (1,0) (1,ω) (1,ω) (0,ω) Let n=180. There is a reachable marking with 0 tokens in and at least 180 tokens in. PAGE 62

64 Example (readers and writers) p4 t3 p3 p5 construct coverability graph... PAGE 63

65 Initial part [,p3 ω,p4] [,p4] [,p4] [,p5] [,p5] [,p5] [,p3 ω,p5] [,p3 ω,p5] t3 t3 p4 t3 p3 p5 PAGE 64

66 Coverability tree [,p3 ω,p5] [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p5] t3 [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p5] t3 [,p3 ω,p4] [,p3 ω,p5] [,p3 ω,p5] t3 [,p3 ω,p5] [,p3 ω,p4] t3 [,p3 ω,p4] [,p4] [,p4] [,p3 ω,p4] [,p3 ω,p5] [,p5] [,p5] [,p3 ω,p5] [,p3,p5] [,p3 ω,p5] t3 [,p3 ω,p5] [,p3 ω,p4] [,p3 ω,p4] [,p4] [,p3 ω,p4] [,p3 ω,p5] [,p5] t3 [,p3 ω,p5] [,p3 ω,p5] [,p3 ω,p5] [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p5] t3 [,p3 ω,p4] [,p3 ω,p5] [,p3 ω,p5] [,p3 ω,p5] [,p3 ω,p5] t3 t3 [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p5] [,p3 ω,p5] [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p5] [,p3 ω,p5] t3 [,p3 ω,p4] p4 t3 p3 p5 PAGE 65

67 Coverability graph [,p4] [,p4] [,p5] t3 [,p3 ω,p4] t3 [,p3 ω,p4] [,p3 ω,p5] [,p5] t3 [,p3 ω,p5] [,p3,p5] p4 t3 p3 p5 PAGE 66

68 [,p3 ω,p5] [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p5] t3 [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p5] t3 [,p3 ω,p4] [,p3 ω,p5] [,p3 ω,p5] t3 [,p3 ω,p5] [,p3 ω,p4] t3 [,p3 ω,p4] [,p4] [,p4] [,p3 ω,p4] [,p3 ω,p5] [,p5] [,p5] [,p3 ω,p5] [,p3,p5] [,p3 ω,p5] t3 [,p3 ω,p5] [,p3 ω,p4] [,p3 ω,p4] [,p4] [,p3 ω,p4] [,p3 ω,p5] [,p5] t3 [,p3 ω,p5] [,p3 ω,p5] [,p3 ω,p5] [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p5] t3 [,p3 ω,p4] [,p3 ω,p5] [,p3 ω,p5] [,p3 ω,p5] [,p3 ω,p5] t3 t3 [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p5] [,p3 ω,p5] [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p5] [,p3 ω,p5] t3 [,p3 ω,p4] [,p4] [,p4] [,p5] t3 [,p3 ω,p4] t3 [,p3 ω,p4] [,p3 ω,p5] [,p5] t3 [,p3 ω,p5] t3 p4 [,p3,p5] p3 p5 PAGE 67

69 Coverability graph (vector notation) (1,0,0,1,0) (0,1,0,1,0) (1,0,0,0,1) (0,1,0,0,1) t3 (1,0,1,0,1) (1,0,ω,1,0) t3 (0,1,ω,1,0) t3 (0,1,ω,0,1) (1,0,ω,0,1) p4 t3 p3 p5 PAGE 68

70 Analysis results,, p4, p5 are safe p3 is unbounded [,p5] is reachable [,] is not reachable [,p3 180,p5] is coverable p3 t3 p5 p4 [,p4] [,p4] [,p5] [,p5] t3 [,p3 ω,p4] t3 [,p3 ω,p4] [,p3 ω,p5] t3 [,p3 ω,p5] [,p3,p5] PAGE 69

71 Additional properties A transition t is dead if and only if if does not appear in the coverability graph. The coverability graph and reachability graph are identical if the marked Petri net is bounded (i.e., only ω-free markings). The marked Petri net is safe if only 0's and 1's appear in nodes. Any firing sequence of the marked Petri net can be matched by a "walk" through the coverability graph. The reverse is not true!!!! PAGE 70

72 Limitation: Loss of information Two nets with the same coverability graph! [] [, ω ] {[],[, 1 ], [, 2 ], [, 3 ], [, 4 ],...} {[],[, 3 ], [, 6 ], [, 9 ], [, 12 ],...} PAGE 71

73 State-explosion problem (1) 2 n +1 states PAGE 72

74 State-explosion problem (2) place s is 2 n bounded Each round the number of tokens in s can be doubled. PAGE 73

75 Variants Construct the coverability graph on the fly (i.e., do not first construct the coverability tree): the graph may become smaller but process is typically non-deterministic. Several approaches have been proposed to construct "minimal" coverability graphs/sets (see "Alain Finkel: The Minimal Coverability Graph for Petri Nets. Applications and Theory of Petri Nets 1991: ", and "Gilles Geeraerts, Jean-François Raskin, Laurent Van Begin: On the Efficient Computation of the Minimal Coverability Set for Petri Nets. ATVA 2007: ") PAGE 74

76 Conclusion

77 The coverability graph is finite but... some information gets lost in case of unbounded behavior, and it may be huge and impossible to construct. Next: structural methods like invariants, siphons, traps, etc. PAGE 76

78 After this lecture you should be able to: Understand the formalizations, i.e., (P,T,F,W), M, (N,M)[t>(N,M'), etc. Determine whether a concrete marked net is terminating, deadlockfree, live, bounded, safe, and/or reversible, whether a transition is live and/or dead, whether a place is k-bounded, etc. Construct a Petri net that has a set of desirable properties, e.g., a net that is live and bounded but not reversible. Construct the reachability graph of a marked net. Construct the coverability tree of a marked net. Construct the coverability graph of a marked net. Tell which properties can(not) be derived from the coverability tree/graph. Understand the limitations of the coverability tree/graph (loss of information, inability to decide liveness, etc.). Derive conclusions from a concrete coverability tree/graph. PAGE 77

79 Appendix: Formalization of Coverability Graph based on Desel & Reisig

80 Coverability tree & graph Idea: cut-off unbounded behavior using omega (ω) markings (1,0, ω,1, ω,1,2,0) PAGE 79

81 Trivial example (1,0) (1,1) (1,2) (1,0) (1,ω) (1,ω) (1,0) (1,ω)... marked net reachability graph coverability tree coverability graph PAGE 80

82 Extended example marked net (1,0) (1,1) (1,2)... reachability graph (0,0) (0,1) (1,0) (1,ω) (1,ω) coverability tree (0,ω) (1,0) (1,ω) coverability graph (0,ω) PAGE 81

83 Approach 1. Define omega (ω) occurrence sequences. 2. Show that these are finite. 3. Construct coverability tree 4. Construct coverability graph (1,0) (1,ω) (1,0) (1,ω) (1,0) (1,ω) (1,0) (1,ω) (0,ω) (1,0) (1,ω) (0,ω) (0,ω) (1,ω) (1,ω) marked net ω-occurrence sequences coverability tree coverability graph PAGE 82

84 Example of a ω-occurrence sequence ω-occurrence sequence: (1,0) --> (1,ω) --> (1, ω) (1,0) (1,ω) (1,ω) marked net PAGE 83

85 PAGE 84

86 (1) Transitions need to be enabled (1,0) (1,ω) (1,0) (1,ω) (0,ω) (1,0) (1,ω) (1,ω) Only is enabled in (1,0), not. marked net ω-occurrence sequences PAGE 85

87 (2) For non-ω place markings: business as usual (1,0) (0,1) marked net ω-occurrence sequences PAGE 86

88 (3) Introducing omegas marked net (1,0) (1,ω) (0,ω) (1,0) (1,ω) (1,0) (1,ω) (1,ω) ω-occurrence sequences (1,ω) is "reachable" from (1,0) because there is a j (j=0) such that... PAGE 87

89 (4) Stop after second identical marking (1,0) (1,0) marked net (1,0) (1,ω) (0,ω) (1,ω) (1,0) (1,ω) (1,ω) ω-occurrence sequences (1,ω) (1,ω) (0,ω) Marking (0,ω) is dead while (1,ω) markings are not continued after second occurrence. PAGE 88

90 Finite? How long can a ω-occurrence sequence be? How many ω-occurrence sequences are there? Is the coverability tree/graph finite? PAGE 89

91 PAGE 90 Dickson's Lemma ( ) φ1 φ2 φ3 φ4 φ5 φ6 φ7 φ8 φ9 φ10 φ11 φ12 φ13 φ φ1 φ2 φ3 φ4 φ5 φ6 φ7 φ8 φ9 φ10 φ11 φ12 φ13 φ14

92 PAGE 91

93 PAGE 92

94 Coverability tree (1,0) (1,ω) (1,0) (1,0) (1,0) (1,ω) (0,ω) Diagrams are a bit misleading: vertices labeled with a ω-marking are really sequences, e.g., initial node is ε rather than (1,0). (1,ω) (0,ω) (1,ω) (1,ω) (1,ω) ω-occurrence sequences coverability tree PAGE 93

95 Finiteness PAGE 94

96 Example PAGE 95

97 Marking graph (i.e., reachability graph) PAGE 96

98 Coverability tree find the error (also in paper)... PAGE 97

99 Relation ω-markings and normal markings (1,0) (1,ω) (1,ω) (0,ω) Let b=180. There is a marking reachable with 0 tokens in and at least 180 tokens in. PAGE 98

100 Boundedness = "all ω-markings are ω- free" PAGE 99

101 b-boundedness (1,0) (1,ω) (1,ω) (0,ω) is 1-boundned (safe) is unbounded PAGE 100

102 Dead transitions do not appear in cov. tree PAGE 101

103 Coverability graph (versus cov. tree) (1,0) (1,ω) (0,ω) (1,0) (1,ω) (0,ω) (1,ω) coverability tree coverability graph PAGE 102

104 Boundedness implies equivalence PAGE 103

105 Appendix: Examples taken from Murata

106 Coverability tree (same as before) PAGE 105

107 Example PAGE 106

108 Properties PAGE 107

109 Coverability graph PAGE 108

110 PAGE 109

Process Mining. ^J Springer. Discovery, Conformance and Enhancement of Business Processes. Wil M.R van der Aalst Q UNIVERS1TAT.

Process Mining. ^J Springer. Discovery, Conformance and Enhancement of Business Processes. Wil M.R van der Aalst Q UNIVERS1TAT. Wil M.R van der Aalst Process Mining Discovery, Conformance and Enhancement of Business Processes Q UNIVERS1TAT m LIECHTENSTEIN Bibliothek ^J Springer Contents 1 Introduction I 1.1 Data Explosion I 1.2

More information

Process Modelling from Insurance Event Log

Process Modelling from Insurance Event Log Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R

More information

Structural Detection of Deadlocks in Business Process Models

Structural Detection of Deadlocks in Business Process Models Structural Detection of Deadlocks in Business Process Models Ahmed Awad and Frank Puhlmann Business Process Technology Group Hasso Plattner Institut University of Potsdam, Germany (ahmed.awad,frank.puhlmann)@hpi.uni-potsdam.de

More information

Process Mining Using BPMN: Relating Event Logs and Process Models

Process Mining Using BPMN: Relating Event Logs and Process Models Noname manuscript No. (will be inserted by the editor) Process Mining Using BPMN: Relating Event Logs and Process Models Anna A. Kalenkova W. M. P. van der Aalst Irina A. Lomazova Vladimir A. Rubin Received:

More information

Diagnosing workflow processes using Woflan

Diagnosing workflow processes using Woflan Diagnosing workflow processes using Woflan H.M.W. Verbeek 1, T. Basten 2, and W.M.P. van der Aalst 3 1 Dept. of Computing Science, Eindhoven University of Technology, The Netherlands wsineric@win.tue.nl

More information

Business Process Modeling

Business Process Modeling Business Process Concepts Process Mining Kelly Rosa Braghetto Instituto de Matemática e Estatística Universidade de São Paulo kellyrb@ime.usp.br January 30, 2009 1 / 41 Business Process Concepts Process

More information

Soundness of Workflow Nets with Reset Arcs

Soundness of Workflow Nets with Reset Arcs Soundness of Workflow Nets with Reset Arcs W.M.P. van der Aalst 1,2, K.M. van Hee 1, A.H.M. ter Hofstede 2, N. Sidorova 1, H.M.W. Verbeek 1, M. Voorhoeve 1, and M.T. Wynn 2 1 Department of Mathematics

More information

Formal Approaches to Business Processes through Petri Nets

Formal Approaches to Business Processes through Petri Nets Formal Approaches to Business Processes through Petri Nets Nick ussell Arthur H. M. ter Hofstede a university 2009, www.yawlfoundation.org Acknowledgement These slides summarize the content of Chapter

More information

BRIDGING THE GAP BETWEEN BUSINESS MODELS AND WORKFLOW SPECIFICATIONS

BRIDGING THE GAP BETWEEN BUSINESS MODELS AND WORKFLOW SPECIFICATIONS International Journal of Cooperative Information Systems c World Scientific Publishing Company BRIDGING THE GAP BETWEEN BUSINESS MODELS WORKFLOW SPECIFICATIONS JULIANE DEHNERT Fraunhofer ISST, Mollstr.

More information

Master Thesis September 2010 ALGORITHMS FOR PROCESS CONFORMANCE AND PROCESS REFINEMENT

Master Thesis September 2010 ALGORITHMS FOR PROCESS CONFORMANCE AND PROCESS REFINEMENT Master in Computing Llenguatges i Sistemes Informàtics Master Thesis September 2010 ALGORITHMS FOR PROCESS CONFORMANCE AND PROCESS REFINEMENT Student: Advisor/Director: Jorge Muñoz-Gama Josep Carmona Vargas

More information

Kirsten Sinclair SyntheSys Systems Engineers

Kirsten Sinclair SyntheSys Systems Engineers Kirsten Sinclair SyntheSys Systems Engineers Kirsten Sinclair SyntheSys Systems Engineers Spicing-up IBM s Enterprise Architecture tools with Petri Nets On Today s Menu Appetiser: Background Starter: Use

More information

System modeling. Budapest University of Technology and Economics Department of Measurement and Information Systems

System modeling. Budapest University of Technology and Economics Department of Measurement and Information Systems System modeling Business process modeling how to do it right Partially based on Process Anti-Patterns: How to Avoid the Common Traps of Business Process Modeling, J Koehler, J Vanhatalo, IBM Zürich, 2007.

More information

Model Discovery from Motor Claim Process Using Process Mining Technique

Model Discovery from Motor Claim Process Using Process Mining Technique International Journal of Scientific and Research Publications, Volume 3, Issue 1, January 2013 1 Model Discovery from Motor Claim Process Using Process Mining Technique P.V.Kumaraguru *, Dr.S.P.Rajagopalan

More information

Dr. Jana Koehler IBM Zurich Research Laboratory

Dr. Jana Koehler IBM Zurich Research Laboratory Precise Modeling of Business Processes with the Business Process Modeling Notation BPMN 2.0 Dr. Jana Koehler IBM Zurich Research Laboratory ZRL BIT at a Glance Computer Science at ZRL: Security/Cryptography

More information

WoPeD - An Educational Tool for Workflow Nets

WoPeD - An Educational Tool for Workflow Nets WoPeD - An Educational Tool for Workflow Nets Thomas Freytag, Cooperative State University (DHBW) Karlsruhe, Germany freytag@dhbw-karlsruhe.de Martin Sänger, 1&1 Internet AG, Karlsruhe, Germany m.saenger09@web.de

More information

The Goldberg Rao Algorithm for the Maximum Flow Problem

The Goldberg Rao Algorithm for the Maximum Flow Problem The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }

More information

Business Process Model and Soundness

Business Process Model and Soundness Instantaneous Soundness Checking of Industrial Business Process Models Dirk Fahland 1, Cédric Favre 2, Barbara Jobstmann 4, Jana Koehler 2, Niels Lohmann 3, Hagen Völzer 2, and Karsten Wolf 3 1 Humboldt-Universität

More information

Coverability for Parallel Programs

Coverability for Parallel Programs 2015 http://excel.fit.vutbr.cz Coverability for Parallel Programs Lenka Turoňová* Abstract We improve existing method for the automatic verification of systems with parallel running processes. The technique

More information

Soundness of Workflow Nets: Classification, Decidability, and Analysis

Soundness of Workflow Nets: Classification, Decidability, and Analysis Accepted for publication in Formal Aspects of Computing Soundness of Workflow Nets: Classification, Decidability, and Analysis W.M.P. van der Aalst 1,2, K.M. van Hee 1, A.H.M. ter Hofstede 2,1, N. Sidorova

More information

Business Intelligence and Process Modelling

Business Intelligence and Process Modelling Business Intelligence and Process Modelling F.W. Takes Universiteit Leiden Lecture 7: Network Analytics & Process Modelling Introduction BIPM Lecture 7: Network Analytics & Process Modelling Introduction

More information

Faster and More Focused Control-Flow Analysis for Business Process Models through SESE Decomposition

Faster and More Focused Control-Flow Analysis for Business Process Models through SESE Decomposition Faster and More Focused Control-Flow Analysis for Business Process Models through SESE Decomposition Jussi Vanhatalo 1,2, Hagen Völzer 1, and Frank Leymann 2 1 IBM Zurich Research Laboratory, Säumerstrasse

More information

Business Process Management Demystified: A Tutorial on Models, Systems and Standards for Workflow Management

Business Process Management Demystified: A Tutorial on Models, Systems and Standards for Workflow Management Business Process Management Demystified: A Tutorial on Models, Systems and Standards for Workflow Management Wil M.P. van der Aalst Department of Technology Management Eindhoven University of Technology

More information

Reliability Guarantees in Automata Based Scheduling for Embedded Control Software

Reliability Guarantees in Automata Based Scheduling for Embedded Control Software 1 Reliability Guarantees in Automata Based Scheduling for Embedded Control Software Santhosh Prabhu, Aritra Hazra, Pallab Dasgupta Department of CSE, IIT Kharagpur West Bengal, India - 721302. Email: {santhosh.prabhu,

More information

Diagramming Techniques:

Diagramming Techniques: 1 Diagramming Techniques: FC,UML,PERT,CPM,EPC,STAFFWARE,... Eindhoven University of Technology Faculty of Technology Management Department of Information and Technology P.O. Box 513 5600 MB Eindhoven The

More information

Business-Driven Software Engineering Lecture 3 Foundations of Processes

Business-Driven Software Engineering Lecture 3 Foundations of Processes Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster jku@zurich.ibm.com Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary

More information

An Operating Guideline Approach to the SOA

An Operating Guideline Approach to the SOA An Operating Guideline Approach to the SOA Peter Massuthe, Wolfgang Reisig, and Karsten Schmidt Humboldt-Universität zu Berlin Institut für Informatik Unter den Linden 6 D-10099 Berlin {massuthe, reisig,

More information

Lluis Belanche + Alfredo Vellido. Intelligent Data Analysis and Data Mining. Data Analysis and Knowledge Discovery

Lluis Belanche + Alfredo Vellido. Intelligent Data Analysis and Data Mining. Data Analysis and Knowledge Discovery Lluis Belanche + Alfredo Vellido Intelligent Data Analysis and Data Mining or Data Analysis and Knowledge Discovery a.k.a. Data Mining II An insider s view Geoff Holmes: WEKA founder Process Mining

More information

Architecture of Information Systems

Architecture of Information Systems Architecture of Information Systems using the theory of Petri nets lecture notes for Systeemmodelleren 1 (2M310) K. van Hee N. Sidorova M. Voorhoeve and J. van der Woude Department of Computing Science

More information

Budapest University of Technology and Economics Department of Measurement and Information Systems. Business Process Modeling

Budapest University of Technology and Economics Department of Measurement and Information Systems. Business Process Modeling Budapest University of Technology and Economics Department of Measurement and Information Systems Business Process Modeling Process, business process Workflow: sequence of given steps executed in order

More information

EMiT: A process mining tool

EMiT: A process mining tool EMiT: A process mining tool B.F. van Dongen and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands. b.f.v.dongen@tue.nl

More information

Modelling Workflow with Petri Nets. CA4 BPM PetriNets

Modelling Workflow with Petri Nets. CA4 BPM PetriNets Modelling Workflow with Petri Nets 1 Workflow Management Issues Georgakopoulos,Hornick, Sheth Process Workflow specification Workflow Implementation =workflow application Business Process Modelling/ Reengineering

More information

Test Suite Generation for Services

Test Suite Generation for Services Test Suite Generation for Services Kathrin Kaschner and Niels Lohmann WESOA 2008 Sydney 1 December 2008 http://service technology.org/wesoa2008 UNIVERSITÄT ROSTOCK Testing Services: What's new? classical

More information

Place/Transition Petri Nets

Place/Transition Petri Nets Place/Transition Petri Nets JSrg Desel 1 and Wolfgang Reisig 2 1 Institut fiir Angewandte Informatik und Formale Beschreibungsverfahren Universit t Karlsruhe, Germany desel@aifb.uni-karlsruhe.de 2 Institut

More information

Feature. Applications of Business Process Analytics and Mining for Internal Control. World

Feature. Applications of Business Process Analytics and Mining for Internal Control. World Feature Filip Caron is a doctoral researcher in the Department of Decision Sciences and Information Management, Information Systems Group, at the Katholieke Universiteit Leuven (Flanders, Belgium). Jan

More information

A FEATURE COMPUTATION TREE MODEL TO SPECIFY REQUIREMENTS AND REUSE

A FEATURE COMPUTATION TREE MODEL TO SPECIFY REQUIREMENTS AND REUSE A FEATURE COMPUTATION TREE MODEL TO SPECIFY REQUIREMENTS AND REUSE E.E.Roubtsova Open University of the Netherlands Postbus 2960, 6401DL, Heerlen, the Netherlands Ella.Roubtsova@ou.nl S.A.Roubtsov Technical

More information

Dotted Chart and Control-Flow Analysis for a Loan Application Process

Dotted Chart and Control-Flow Analysis for a Loan Application Process Dotted Chart and Control-Flow Analysis for a Loan Application Process Thomas Molka 1,2, Wasif Gilani 1 and Xiao-Jun Zeng 2 Business Intelligence Practice, SAP Research, Belfast, UK The University of Manchester,

More information

The Analysis Method about Change Domain of Business Process Model Based on the Behavior Profile of Petri Net

The Analysis Method about Change Domain of Business Process Model Based on the Behavior Profile of Petri Net Appl. Math. Inf. Sci. 6-3S, No. 3, 943-949 (2012) 943 Applied Mathematics & Information Sciences An International Journal The Analysis Method about Change Domain of Business Process Model Based on the

More information

Determine If An Equation Represents a Function

Determine If An Equation Represents a Function Question : What is a linear function? The term linear function consists of two parts: linear and function. To understand what these terms mean together, we must first understand what a function is. The

More information

University of Pisa. MSc in Computer Engineering. Business Processes Management. Lectures

University of Pisa. MSc in Computer Engineering. Business Processes Management. Lectures University of Pisa MSc in Computer Engineering Business Processes Management Large and complex organizations are a tangible manifestation of advanced technology, more than machinery itself. (J.K. Galbraith)

More information

ProM 6 Tutorial. H.M.W. (Eric) Verbeek mailto:h.m.w.verbeek@tue.nl R. P. Jagadeesh Chandra Bose mailto:j.c.b.rantham.prabhakara@tue.

ProM 6 Tutorial. H.M.W. (Eric) Verbeek mailto:h.m.w.verbeek@tue.nl R. P. Jagadeesh Chandra Bose mailto:j.c.b.rantham.prabhakara@tue. ProM 6 Tutorial H.M.W. (Eric) Verbeek mailto:h.m.w.verbeek@tue.nl R. P. Jagadeesh Chandra Bose mailto:j.c.b.rantham.prabhakara@tue.nl August 2010 1 Introduction This document shows how to use ProM 6 to

More information

EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES. Nataliya Golyan, Vera Golyan, Olga Kalynychenko

EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES. Nataliya Golyan, Vera Golyan, Olga Kalynychenko 380 International Journal Information Theories and Applications, Vol. 18, Number 4, 2011 EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES Nataliya Golyan, Vera Golyan, Olga Kalynychenko

More information

Business Process Configuration in The Cloud: How to Support and Analyze Multi-Tenant Processes?

Business Process Configuration in The Cloud: How to Support and Analyze Multi-Tenant Processes? Business Process Configuration in The Cloud: How to Support and Analyze Multi-Tenant Processes? W.M.P. van der Aalst Department of Mathematics and Computer Science, Eindhoven University of Technology Eindhoven,

More information

10g versions followed on separate paths due to different approaches, but mainly due to differences in technology that were known to be huge.

10g versions followed on separate paths due to different approaches, but mainly due to differences in technology that were known to be huge. Oracle BPM 11g Platform Analysis May 2010 I was privileged to be invited to participate in "EMEA BPM 11g beta bootcamp" in April 2010, where I had close contact with the latest release of Oracle BPM 11g.

More information

LECTURE 4. Last time: Lecture outline

LECTURE 4. Last time: Lecture outline LECTURE 4 Last time: Types of convergence Weak Law of Large Numbers Strong Law of Large Numbers Asymptotic Equipartition Property Lecture outline Stochastic processes Markov chains Entropy rate Random

More information

Configuring IBM WebSphere Monitor for Process Mining

Configuring IBM WebSphere Monitor for Process Mining Configuring IBM WebSphere Monitor for Process Mining H.M.W. Verbeek and W.M.P. van der Aalst Technische Universiteit Eindhoven Department of Mathematics and Computer Science P.O. Box 513, 5600 MB Eindhoven,

More information

Genet A tool for the synthesis and mining of Petri nets. Josep Carmona jcarmonalsi.upc.edu Software Department Universitat Politcnica de Catalunya

Genet A tool for the synthesis and mining of Petri nets. Josep Carmona jcarmonalsi.upc.edu Software Department Universitat Politcnica de Catalunya Genet A tool for the synthesis and mining of Petri nets Josep Carmona jcarmonalsi.upc.edu Software Department Universitat Politcnica de Catalunya 2 Contents 1.1 Overview of the tool.......................

More information

Facilitating Business Process Discovery using Email Analysis

Facilitating Business Process Discovery using Email Analysis Facilitating Business Process Discovery using Email Analysis Matin Mavaddat Matin.Mavaddat@live.uwe.ac.uk Stewart Green Stewart.Green Ian Beeson Ian.Beeson Jin Sa Jin.Sa Abstract Extracting business process

More information

Generation of a Set of Event Logs with Noise

Generation of a Set of Event Logs with Noise Generation of a Set of Event Logs with Noise Ivan Shugurov International Laboratory of Process-Aware Information Systems National Research University Higher School of Economics 33 Kirpichnaya Str., Moscow,

More information

Class notes Program Analysis course given by Prof. Mooly Sagiv Computer Science Department, Tel Aviv University second lecture 8/3/2007

Class notes Program Analysis course given by Prof. Mooly Sagiv Computer Science Department, Tel Aviv University second lecture 8/3/2007 Constant Propagation Class notes Program Analysis course given by Prof. Mooly Sagiv Computer Science Department, Tel Aviv University second lecture 8/3/2007 Osnat Minz and Mati Shomrat Introduction This

More information

2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8]

2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8] Code No: R05220502 Set No. 1 1. (a) Describe the performance analysis in detail. (b) Show that f 1 (n)+f 2 (n) = 0(max(g 1 (n), g 2 (n)) where f 1 (n) = 0(g 1 (n)) and f 2 (n) = 0(g 2 (n)). [8+8] 2. (a)

More information

Data Structures Fibonacci Heaps, Amortized Analysis

Data Structures Fibonacci Heaps, Amortized Analysis Chapter 4 Data Structures Fibonacci Heaps, Amortized Analysis Algorithm Theory WS 2012/13 Fabian Kuhn Fibonacci Heaps Lacy merge variant of binomial heaps: Do not merge trees as long as possible Structure:

More information

Summary and Outlook. Business Process Intelligence Course Lecture 8. prof.dr.ir. Wil van der Aalst. www.processmining.org

Summary and Outlook. Business Process Intelligence Course Lecture 8. prof.dr.ir. Wil van der Aalst. www.processmining.org Business Process Intelligence Course Lecture 8 Summary and Outlook prof.dr.ir. Wil van der Aalst www.processmining.org Overview Chapter 1 Introduction Part I: Preliminaries Chapter 2 Process Modeling and

More information

The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge,

The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge, The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge, cheapest first, we had to determine whether its two endpoints

More information

Test Coverage Criteria for Autonomous Mobile Systems based on Coloured Petri Nets

Test Coverage Criteria for Autonomous Mobile Systems based on Coloured Petri Nets 9th Symposium on Formal Methods for Automation and Safety in Railway and Automotive Systems Institut für Verkehrssicherheit und Automatisierungstechnik, TU Braunschweig, 2012 FORMS/FORMAT 2012 (http://www.forms-format.de)

More information

Workflow Patterns Put Into Context

Workflow Patterns Put Into Context Software and Systems Modeling manuscript No. (will be inserted by the editor) Workflow Patterns Put Into Context W.M.P. van der Aalst 1,2, A.H.M. ter Hofstede 2,1 1 Eindhoven University of Technology,

More information

Formalization of Workflows Using Fork-Join Automata

Formalization of Workflows Using Fork-Join Automata Formalization of Workflows Using Fork-Join Automata Tudor Jebelean 1 and Anna Medve 2 1 RISC, Johannes Kepler University, Linz, Austria 2 Department of Electrical Engineering and Information Systems, University

More information

logic language, static/dynamic models SAT solvers Verified Software Systems 1 How can we model check of a program or system?

logic language, static/dynamic models SAT solvers Verified Software Systems 1 How can we model check of a program or system? 5. LTL, CTL Last part: Alloy logic language, static/dynamic models SAT solvers Today: Temporal Logic (LTL, CTL) Verified Software Systems 1 Overview How can we model check of a program or system? Modeling

More information

Process-Aware Information Systems: Design, Enactment, and Analysis

Process-Aware Information Systems: Design, Enactment, and Analysis Process-Aware Information Systems: Design, Enactment, and Analysis Wil M.P. van der Aalst Department of Mathematics and Computer Science, Eindhoven University of Technology, P.O. Box 513, NL-5600 MB Eindhoven,

More information

Combination of Process Mining and Simulation Techniques for Business Process Redesign: A Methodological Approach

Combination of Process Mining and Simulation Techniques for Business Process Redesign: A Methodological Approach Combination of Process Mining and Simulation Techniques for Business Process Redesign: A Methodological Approach Santiago Aguirre, Carlos Parra, and Jorge Alvarado Industrial Engineering Department, Pontificia

More information

Business Process Quality Metrics: Log-based Complexity of Workflow Patterns

Business Process Quality Metrics: Log-based Complexity of Workflow Patterns Business Process Quality Metrics: Log-based Complexity of Workflow Patterns Jorge Cardoso Department of Mathematics and Engineering, University of Madeira, Funchal, Portugal jcardoso@uma.pt Abstract. We

More information

Using Trace Clustering for Configurable Process Discovery Explained by Event Log Data

Using Trace Clustering for Configurable Process Discovery Explained by Event Log Data Master of Business Information Systems, Department of Mathematics and Computer Science Using Trace Clustering for Configurable Process Discovery Explained by Event Log Data Master Thesis Author: ing. Y.P.J.M.

More information

Process Modeling Notations and Workflow Patterns

Process Modeling Notations and Workflow Patterns Process Modeling Notations and Workflow Patterns Stephen A. White, IBM Corp., United States ABSTRACT The research work of Wil van der Aalst, Arthur ter Hofstede, Bartek Kiepuszewski, and Alistair Barros

More information

6.852: Distributed Algorithms Fall, 2009. Class 2

6.852: Distributed Algorithms Fall, 2009. Class 2 .8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparison-based algorithms. Basic computation in general synchronous networks: Leader election

More information

POMPDs Make Better Hackers: Accounting for Uncertainty in Penetration Testing. By: Chris Abbott

POMPDs Make Better Hackers: Accounting for Uncertainty in Penetration Testing. By: Chris Abbott POMPDs Make Better Hackers: Accounting for Uncertainty in Penetration Testing By: Chris Abbott Introduction What is penetration testing? Methodology for assessing network security, by generating and executing

More information

Scheduling Shop Scheduling. Tim Nieberg

Scheduling Shop Scheduling. Tim Nieberg Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations

More information

What is Linear Programming?

What is Linear Programming? Chapter 1 What is Linear Programming? An optimization problem usually has three essential ingredients: a variable vector x consisting of a set of unknowns to be determined, an objective function of x to

More information

Chapter 2 Introduction to Business Processes, BPM, and BPM Systems

Chapter 2 Introduction to Business Processes, BPM, and BPM Systems Chapter 2 Introduction to Business Processes, BPM, and BPM Systems This chapter provides a basic overview on business processes. In particular it concentrates on the actual definition and characterization

More information

Diagram Models in Continuous Business Process Improvement

Diagram Models in Continuous Business Process Improvement JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 22 No. 2 (2014), pp. 118-133 Diagram Models in Continuous Business Process Improvement Mateusz Wibig 1 1 CGI Polska Energy and Resources 39 Sienna Street, Warszawa

More information

MTAT.03.231 Business Process Management (BPM) (for Masters of IT) Lecture 2: Introduction to BPMN

MTAT.03.231 Business Process Management (BPM) (for Masters of IT) Lecture 2: Introduction to BPMN MTAT.03.231 Business Process Management (BPM) (for Masters of IT) Lecture 2: Introduction to BPMN Marlon Dumas marlon.dumas ät ut. ee How to engage in BPM? 1. Opportunity assessment 2. Process modelling

More information

Model based testing tools. Olli Pekka Puolitaival

Model based testing tools. Olli Pekka Puolitaival Model based testing tools Olli Pekka Puolitaival Index 1. Software testing evolution 2. model based testing (MBT): main idea 3. MBT: step by step 4. MBT: tools 5. Questions Software testing evolution model

More information

Chapter 4: Architecture for Performance Monitoring of Complex Information Technology (IT) Infrastructures using Petri Net

Chapter 4: Architecture for Performance Monitoring of Complex Information Technology (IT) Infrastructures using Petri Net Chapter 4: Architecture for Performance Monitoring of Complex Information Technology (IT) Infrastructures using Petri Net This chapter will focus on the various approaches that we have taken in the modeling

More information

From Workflow Design Patterns to Logical Specifications

From Workflow Design Patterns to Logical Specifications AUTOMATYKA/ AUTOMATICS 2013 Vol. 17 No. 1 http://dx.doi.org/10.7494/automat.2013.17.1.59 Rados³aw Klimek* From Workflow Design Patterns to Logical Specifications 1. Introduction Formal methods in software

More information

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like

More information

Web Data Extraction: 1 o Semestre 2007/2008

Web Data Extraction: 1 o Semestre 2007/2008 Web Data : Given Slides baseados nos slides oficiais do livro Web Data Mining c Bing Liu, Springer, December, 2006. Departamento de Engenharia Informática Instituto Superior Técnico 1 o Semestre 2007/2008

More information

PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS. G. Mušič and D. Matko

PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS. G. Mušič and D. Matko PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS G. Mušič and D. Matko Faculty of Electrical Engineering, University of Ljubljana, Slovenia. E-mail: gasper.music@fe.uni-lj.si Abstract: The

More information

Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams

Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams André Ciré University of Toronto John Hooker Carnegie Mellon University INFORMS 2014 Home Health Care Home health care delivery

More information

Process Mining and Network Analysis

Process Mining and Network Analysis Towards Comprehensive Support for Organizational Mining Minseok Song and Wil M.P. van der Aalst Eindhoven University of Technology P.O.Box 513, NL-5600 MB, Eindhoven, The Netherlands. {m.s.song, w.m.p.v.d.aalst}@tue.nl

More information

Formal Modeling Approach for Supply Chain Event Management

Formal Modeling Approach for Supply Chain Event Management Formal Modeling Approach for Supply Chain Event Management Rong Liu and Akhil Kumar Smeal College of Business Penn State University University Park, PA 16802, USA {rul110,akhilkumar}@psu.edu Wil van der

More information

Business Process Modelling Languages, Goals and Variabilities

Business Process Modelling Languages, Goals and Variabilities Business Process Modelling Languages, Goals and Variabilities Birgit Korherr Women s Postgraduate College for Internet Technologies Institute of Software Technology and Interactive Systems Vienna University

More information

Flexible Process Notations for Cross-organizational Case Management Systems

Flexible Process Notations for Cross-organizational Case Management Systems IT University of Copenhagen Ph.D. Dissertation Flexible Process Notations for Cross-organizational Case Management Systems Author: Tijs Slaats Supervisor: Dr. Thomas T. Hildebrandt Co-supervisor: Dr. Marco

More information

Process Mining and Monitoring Processes and Services: Workshop Report

Process Mining and Monitoring Processes and Services: Workshop Report Process Mining and Monitoring Processes and Services: Workshop Report Wil van der Aalst (editor) Eindhoven University of Technology, P.O.Box 513, NL-5600 MB, Eindhoven, The Netherlands. w.m.p.v.d.aalst@tm.tue.nl

More information

Midterm Practice Problems

Midterm Practice Problems 6.042/8.062J Mathematics for Computer Science October 2, 200 Tom Leighton, Marten van Dijk, and Brooke Cowan Midterm Practice Problems Problem. [0 points] In problem set you showed that the nand operator

More information

Model Checking: An Introduction

Model Checking: An Introduction Announcements Model Checking: An Introduction Meeting 2 Office hours M 1:30pm-2:30pm W 5:30pm-6:30pm (after class) and by appointment ECOT 621 Moodle problems? Fundamentals of Programming Languages CSCI

More information

Relational XES: Data Management for Process Mining

Relational XES: Data Management for Process Mining Relational XES: Data Management for Process Mining B.F. van Dongen and Sh. Shabani Department of Mathematics and Computer Science, Eindhoven University of Technology, The Netherlands. B.F.v.Dongen, S.Shabaninejad@tue.nl

More information

Transforming PICTURE to BPMN 2.0 as Part of the Model-driven Development of Electronic Government Systems

Transforming PICTURE to BPMN 2.0 as Part of the Model-driven Development of Electronic Government Systems Heitkötter, Henning, Transforming PICTURE to BPMN 2.0 as Part of the Model-Driven Development of Electronic Government Systems, 44th Hawaii International Conference on System Sciences (HICSS), pp. 1 10,

More information

Complexity Results for 1-safe Nets

Complexity Results for 1-safe Nets Complexity Results for 1-safe Nets Allan Cheng Computer Science Department, Aarhus University Ny Munkegade, DK 8000 Aarhus C, Denmark acheng@daimi.aau.dk Javier Esparza Laboratory for Foundations of Computer

More information

ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015

ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015 ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015 ONLINE STEINER FOREST PROBLEM An initially given graph G. s 1 s 2 A sequence of demands (s i, t i ) arriving

More information

Safety verification of software using structured Petri nets

Safety verification of software using structured Petri nets Safety verification of software using structured Petri nets Krzysztof Sacha Warsaw University of Technology, Institute of Control and Computation Engineering, ul. Nowowiejska 15/19, 00-665 Warszawa, Poland

More information

Business Process Management and IT Architecture Design. The T case study. Dr. Jana Koehler Olaf Zimmermann IBM Zurich Research Laboratory

Business Process Management and IT Architecture Design. The T case study. Dr. Jana Koehler Olaf Zimmermann IBM Zurich Research Laboratory Business Process Management and IT Architecture Design The T case study Dr. Jana Koehler Olaf Zimmermann IBM Zurich Research Laboratory ZRL BIT at a Glance IBM Zurich Research Lab (ZRL), Rüschlikon/ZH

More information

Modeling and Performance Evaluation of Computer Systems Security Operation 1

Modeling and Performance Evaluation of Computer Systems Security Operation 1 Modeling and Performance Evaluation of Computer Systems Security Operation 1 D. Guster 2 St.Cloud State University 3 N.K. Krivulin 4 St.Petersburg State University 5 Abstract A model of computer system

More information

Process-Aware Information Systems: Lessons to be Learned from Process Mining

Process-Aware Information Systems: Lessons to be Learned from Process Mining Process-Aware Information Systems: Lessons to be Learned from Process Mining W.M.P. van der Aalst Department of Mathematics and Computer Science, Eindhoven University of Technology P.O. Box 513, NL-5600

More information

A Test Case Generator for the Validation of High-Level Petri Nets

A Test Case Generator for the Validation of High-Level Petri Nets A Test Case Generator for the Validation of High-Level Petri Nets Jörg Desel Institut AIFB Universität Karlsruhe D 76128 Karlsruhe Germany E-mail: desel@aifb.uni-karlsruhe.de Andreas Oberweis, Torsten

More information

Formal Verification Problems in a Bigdata World: Towards a Mighty Synergy

Formal Verification Problems in a Bigdata World: Towards a Mighty Synergy Dept. of Computer Science Formal Verification Problems in a Bigdata World: Towards a Mighty Synergy Matteo Camilli matteo.camilli@unimi.it http://camilli.di.unimi.it ICSE 2014 Hyderabad, India June 3,

More information

Decision Mining in Business Processes

Decision Mining in Business Processes Decision Mining in Business Processes A. Rozinat and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands {a.rozinat,w.m.p.v.d.aalst}@tm.tue.nl

More information

Generating models of a matched formula with a polynomial delay

Generating models of a matched formula with a polynomial delay Generating models of a matched formula with a polynomial delay Petr Savicky Institute of Computer Science, Academy of Sciences of Czech Republic, Pod Vodárenskou Věží 2, 182 07 Praha 8, Czech Republic

More information

2005 3rd IEEE International Conference on Industrial Informatics (INDIN) Perth, Australia 10-12 August 2005

2005 3rd IEEE International Conference on Industrial Informatics (INDIN) Perth, Australia 10-12 August 2005 Citation: Pudhota, Leo and Chang, Elizabeth. 2005. : Coloured petrinet for flexible business workflow modelling, in Dillon, T. and Yu, X. and Chan, E. (ed), INDIN 2005: 3rd International Conference on

More information

SUBGROUPS OF CYCLIC GROUPS. 1. Introduction In a group G, we denote the (cyclic) group of powers of some g G by

SUBGROUPS OF CYCLIC GROUPS. 1. Introduction In a group G, we denote the (cyclic) group of powers of some g G by SUBGROUPS OF CYCLIC GROUPS KEITH CONRAD 1. Introduction In a group G, we denote the (cyclic) group of powers of some g G by g = {g k : k Z}. If G = g, then G itself is cyclic, with g as a generator. Examples

More information

Conceptual Model for On Line Auditing

Conceptual Model for On Line Auditing Conceptual Model for On Line Auditing Wil van der Aalst, Kees van Hee, Jan Martijn van der Werf Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, P.O. Box 513, 5600 MB

More information

EDIminer: A Toolset for Process Mining from EDI Messages

EDIminer: A Toolset for Process Mining from EDI Messages EDIminer: A Toolset for Process Mining from EDI Messages Robert Engel 1, R. P. Jagadeesh Chandra Bose 2, Christian Pichler 1, Marco Zapletal 1, and Hannes Werthner 1 1 Vienna University of Technology,

More information

Software Visualization and Model Generation

Software Visualization and Model Generation Software Visualization and Model Generation Erik Doernenburg Software Developer ThoughtWorks, Inc. Gregor Hohpe Software Engineer Google, Inc. Where are the most defects? 2006 Erik Doernenburg & Gregor

More information