State Space Analysis: Properties, Reachability Graph, and Coverability graph. prof.dr.ir. Wil van der Aalst
|
|
- Marsha Pope
- 7 years ago
- Views:
Transcription
1 State Space Analysis: Properties, Reachability Graph, and Coverability graph prof.dr.ir. Wil van der Aalst
2 Outline Motivation Formalization Basic properties Reachability graph Coverability graph PAGE 1
3 Motivation
4 Design-time analysis vs run-time analysis validation world business processes people services components organizations models analyzes supports/ controls specifies configures implements analyzes (software) system records events, e.g., messages, transactions, etc. e.g., systems like WebSphere, Oracle, TIBCO/ Staffware, SAP, FLOWer, etc. verification discovery performance analysis (process) model conformance extension event logs design-time analysis e.g. process models represented in BPMN, BPEL, EPCs, Petri nets, UML AD, etc. or other types of models such as social networks, organizational networks, decision trees, etc. run-time analysis e.g., dedicated formats such as IBM s Common Event Infrastructure (CEI) and MXML or proprietary formats stored in flat files or database tables. PAGE 3
5 Analysis of processes X linear algebraic analysis techniques Y Z Petri net Markov chain analysis techniques state-space analysis techniques... PAGE 4
6 Generic questions terminating it has only finite occurrence sequences deadlock-free each reachable marking enables a transition live each reachable marking enables an occurrence sequence containing all transitions bounded each place has an upper bound that holds for all reachable markings 1-safe 1 is a bound for each place s reversible m0 is reachable from each reachable marking, i.e., the initial marking is a so-called home marking. PAGE 5
7 Example p4 t3 p3 p5 terminating it has only finite occurrence sequences deadlock-free each reachable marking enables a transition live each reachable marking enables an occurrence sequence containing all transitions bounded each place has an upper bound that holds for all reachable markings 1-safe 1 is a bound for each place s reversible m0 is reachable from each reachable marking, i.e., the initial marking is a so-called home marking. PAGE 6
8 Specific questions p4 t3 p3 p5 Is it possible to have a token in both and p5? Will t3 always take place? Will t3 always take place assuming "fairness"? Is it possible to execute after? Can both p4 and p5 be empty at the same time? PAGE 7
9 infinite state space state explosion problem PAGE 8
10 Concepts marked net (1,0) (1,1) (1,2)... reachability graph (1,0) (1,ω) coverability graph PAGE 9
11 Relevant material 1. Jörg Desel, Wolfgang Reisig: Place/Transition Petri Nets. Petri Nets 1996: DOI: / _ Tadao Murata, Petri Nets: Properties, Analysis and Applications, Proceedings of the IEEE. 77(4): , April, Wil van der Aalst: Process Mining: Discovery, Conformance and Enhancement of Business Processes, Springer Verlag 2011 (chapters 1 & 5) a) Chapter 1: DOI: / _1 b) Chapter 5: DOI: / _5 c) Events logs: Today's focus is on 1 & 2. PAGE 10
12 Formalization Note: refinement of earlier link between Petri net and transitions system (week 2/3) that is closer to standard literature.
13 Basic Petri net P = {,} T = {,} F = {(,), (,), (,), (,), (,)} PAGE 12
14 Place transition net P = {,} T = {,} F = {(,), (,), (,), (,)} W(,)=2, W(,)=2, W(,)=1, and W(,)=1 PAGE 13
15 Multi-sets M 0 () = 2 M 0 () = 3 PAGE 14
16 Operations on multi-sets PAGE 15
17 Notation M 0 = [,,,,] = [ 2, 3 ] = 2[]+3[] also denoted as (2,3) PAGE 16
18 Preset/postset PAGE 17
19 Examples = [] = [ 2 ] = [ 2 ] = [] = [] = [,] = [] = [] = [ 2 ] = [ 2 ] = [] = [] = [] = [,] = [,] = [ ] PAGE 18
20 Firing rule PAGE 19
21 Notations Murata Desel/Reisig PAGE 20
22 Notations: Firing rule Murata Desel/Reisig PAGE 21
23 Basic Properties
24 Basic properties of a marked Petri net PAGE 23
25 Terminating PAGE 24
26 Deadlock-free PAGE 25
27 Liveness PAGE 26
28 Basic idea of liveness all reachable markings markings where t is enabled PAGE 27
29 Boundedness is 1-bounded, is 3-bounded is 1-bounded, is unbounded PAGE 28
30 Safeness p6 p4 t3 p3 p5 p6 p4 t3 p3 p5 PAGE 29
31 Reversible/home marking. [] is home marking PAGE 30
32 Reachability Graph
33 Definition t M M PAGE 32
34 Reachability graph algorithm 1) Label the initial marking M 0 as the root and tag it "new". 2) While "new" markings exists, do the following: a) Select a new marking M. b) If no transitions are enabled at M, tag M "dead-end". c) While there exist enabled transitions at M, do the following for each enabled transition t at M: i. Obtain the marking M' that results from firing t at M. ii. If M' does not appear in the graph, add M' and tag it "new". iii. Draw an arc with label t from M to M' (if not already present). 3) Output the graph. PAGE 33
35 Example free p4 t3 p3 p5 Step 1: Label the initial marking M0 as the root and tag it "new" (indicated by green color). [,free,p4] PAGE 34
36 Example (continued) free p4 t3 p3 p5 [,free,p4] [,free,p4] [,free,p4] [,free,p5] PAGE 35
37 Example (continued) free p4 t3 p3 p5 [,free,p4] [,free,p4] [,free,p4] [,free,p4] [,p3,p4] [,free,p5] [,free,p5] [,free,p5] PAGE 36
38 Example (continued) free p4 t3 p3 p5 [,free,p4] [,free,p4] [,p3,p4] [,free,p4] [,free,p4] [,p3,p4] [,free,p5] [,free,p5] [,free,p5] [,free,p5] PAGE 37
39 Example (continued) free p4 t3 p3 p5 [,free,p4] [,free,p4] [,p3,p4] [,free,p4] [,free,p4] [,p3,p4] [,free,p5] [,free,p5] [,free,p5] [,free,p5] [,p3,p5] PAGE 38
40 Example (continued) free p4 t3 p3 p5 [,free,p4] [,free,p4] [,p3,p4] [,free,p4] [,free,p4] [,p3,p4] [,p3,p4] [,free,p5] [,free,p5] [,p3,p5] [,free,p5] [,free,p5] [,p3,p5] PAGE 39
41 Example (continued) free p4 t3 p3 p5 [,free,p4] [,free,p5] [,free,p4] [,free,p5] [,p3,p4] [,p3,p5] [,p3,p4] [,free,p4] [,free,p5] [,free,p4] t3 [,free,p5] t3 [,p3,p4] [,p3,p5] [,p3,p4] [,p3,p5] PAGE 40
42 PAGE 41 Example (continued) t3 p5 p3 p4 free [,free,p4] [,free,p4] [,free,p5] [,free,p5] [,p3,p4] [,p3,p4] [,p3,p5] [,p3,p5] t3 t3 [,free,p4] [,free,p4] [,free,p5] [,free,p5] [,p3,p4] [,p3,p4] [,p3,p5] [,p3,p5] t3 t3
43 PAGE 42 Example (continued) t3 p5 p3 p4 free [,free,p4] [,free,p4] [,free,p5] [,free,p5] [,p3,p4] [,p3,p4] [,p3,p5] [,p3,p5] t3 t3 [,free,p4] [,free,p4] [,free,p5] [,free,p5] [,p3,p4] [,p3,p4] [,p3,p5] [,p3,p5] t3 t3
44 Example (complete) p3 free t3 p5 p4 [,free,p4] [,free,p5] [,free,p4] t3 [,free,p5] t3 [,p3,p4] [,p3,p5] [,p3,p4] [,p3,p5] The marked Petri net is: deadlock free live bounded safe reversible all markings are home markings PAGE 43
45 Coverability Graph
46 Problem (1,0) (1,1) (1,2)... ps. (n,m) is a shorthand for [ n, m ] PAGE 45
47 Coverability tree algorithm 1) Label the initial marking M 0 as the root and tag it "new". 2) While "new" markings exists, do the following: a) Select a new marking M and remove the "new" tag. b) If M is identical to a marking on the path from the root to M, then tag M "old" and go to another new marking. c) If no transitions are enabled at M, tag M "dead-end". d) While there exist enabled transitions at M, do the following for each enabled transition t at M: i. Obtain the marking M' that results from firing t at M. ii. If, on the path from the root to M, there exists a marking M'' such that M'(p) M''(p) for each p and M' M'' (i.e., M'' is coverable), then replace M'(p) by ω for each p such that M'(p) > M''(p). iii. Introduce M' as a node, draw an arc with label t from M to M', and tag M' "new". 3) Output the tree. PAGE 46
48 Example Step 1: Label the initial marking M 0 as the root and tag it "new" (indicated by green color). [] PAGE 47
49 Example (continued) Step 2: While "new" markings exists, do the following: Select a new marking M and remove the "new" tag. If M is identical to a marking on the path from the root to M, then tag M "old" and go to another new marking. If no transitions are enabled at M, tag M "dead-end". While there exist enabled transitions at M, do the following for each enabled transition t at M: Obtain the marking M' that results from firing t at M. If, on the path from the root to M, there exists a marking M'' such that M'(p) M''(p) for each p and M' M'' (i.e., M'' is coverable), then replace M'(p) by ω for each p such that M'(p) > M''(p). Introduce M' as a node, draw an arc with label t from M to M', and tag M' "new" [] [] [,] M [, ω ] M' PAGE 48
50 Example (continued) Step 2: While "new" markings exists, do the following: Select a new marking M and remove the "new" tag. If M is identical to a marking on the path from the root to M, then tag M "old" and go to another new marking. If no transitions are enabled at M, tag M "dead-end". While there exist enabled transitions at M, do the following for each enabled transition t at M: Obtain the marking M' that results from firing t at M. If, on the path from the root to M, there exists a marking M'' such that M'(p) M''(p) for each p and M' M'' (i.e., M'' is coverable), then replace M'(p) by ω for each p such that M'(p) > M''(p). Introduce M' as a node, draw an arc with label t from M to M', and tag M' "new" [] [, ω ] [] [, ω ] [, ω ] ω+k = ω-k = ω PAGE 49
51 Example (continued) Step 2: While "new" markings exists, do the following: Select a new marking M and remove the "new" tag. If M is identical to a marking on the path from the root to M, then tag M "old" and go to another new marking. If no transitions are enabled at M, tag M "dead-end". While there exist enabled transitions at M, do the following for each enabled transition t at M: Obtain the marking M' that results from firing t at M. If, on the path from the root to M, there exists a marking M'' such that M'(p) M''(p) for each p and M' M'' (i.e., M'' is coverable), then replace M'(p) by ω for each p such that M'(p) > M''(p). Introduce M' as a node, draw an arc with label t from M to M', and tag M' "new" [] [, ω ] [, ω ] [] [, ω ] [, ω ] PAGE 50
52 Example (complete) Step 3: Output the tree. [] [, ω ] [, ω ] Coverability graph: [] [, ω ] PAGE 51
53 Another example p3 [,p3] Step 1: Label the initial marking M 0 as the root and tag it "new" (indicated by green color). [,p3] [, ω,p3] p4 Step 2... [,p3,p4 ω ] PAGE 52
54 Example (continued) p3 [,p3] [, ω,p3] [, ω,p3] [,p3,p4 ω ] [, ω,p3,p4 ω ] p4 [,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3] [, ω,p3] [,p3] [, ω,p3] [, ω,p3] [,p3,p4 ω ] [,p3,p4 ω ] [, ω,p3,p4 ω ] PAGE 53
55 Example (continued) p3 [,p3] [, ω,p3] [, ω,p3] [,p3,p4 ω ] [, ω,p3,p4 ω ] p4 [,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3] [, ω,p3] [, ω,p3] [,p3] [, ω,p3] [, ω,p3] [,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3,p4 ω ] [, ω,p3,p4 ω ] PAGE 54
56 Example (continued) p3 [,p3] [, ω,p3] [, ω,p3] [,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] p4 [, ω,p3,p4 ω ] [,p3] [,p3,p4 ω ] [, ω,p3] [, ω,p3] [, ω,p3,p4 ω ] [,p3] [, ω,p3] [, ω,p3] [,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3,p4 ω ] [, ω,p3,p4 ω ] PAGE 55
57 Example (continued) p3 Step 3: Output the tree. [,p3] [, ω,p3] [, ω,p3] p4 [,p3] [, ω,p3] [, ω,p3] [,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] 4x [,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] PAGE 56
58 Example (complete) p3 [,p3] [, ω,p3] p4 [,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3] [, ω,p3] [, ω,p3] [, ω,p3,p4 ω ] [,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3,p4 ω ] [, ω,p3,p4 ω ] Coverability graph [, ω,p3,p4 ω ] PAGE 57
59 Coverability graph Take the coverability tree and simply merge nodes with identical labels [] [, ω ] [, ω ] [] [, ω ] [,p3] [, ω,p3] [, ω,p3] [,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [, ω,p3,p4 ω ] [,p3] [,p3,p4 ω ] [, ω,p3] [, ω,p3,p4 ω ] PAGE 58
60 Another example marked net (1,0) (1,1) (1,2)... reachability graph (0,0) (0,1) (1,0) (1,ω) (1,ω) coverability tree (0,ω) (1,0) (1,ω) coverability graph (0,ω) ps. (n,m) is a shorthand for [ n, m ] PAGE 59
61 ω-markings [,p3] [, ω,p3] [,p3,p4 ω ] [, ω,p3,p4 ω ] PAGE 60
62 Properties The coverability tree/graph is always finite. The marked Petri net is bounded if and only if the corresponding coverability tree/graph contains only ω-free markings. The coverability tree/graph gives an over-approximation. Different Petri nets may have the same coverability tree/graph. PAGE 61
63 Basic relation between reachable markings and coverability tree/graph (1,0) (1,ω) (1,ω) (0,ω) Let n=180. There is a reachable marking with 0 tokens in and at least 180 tokens in. PAGE 62
64 Example (readers and writers) p4 t3 p3 p5 construct coverability graph... PAGE 63
65 Initial part [,p3 ω,p4] [,p4] [,p4] [,p5] [,p5] [,p5] [,p3 ω,p5] [,p3 ω,p5] t3 t3 p4 t3 p3 p5 PAGE 64
66 Coverability tree [,p3 ω,p5] [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p5] t3 [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p5] t3 [,p3 ω,p4] [,p3 ω,p5] [,p3 ω,p5] t3 [,p3 ω,p5] [,p3 ω,p4] t3 [,p3 ω,p4] [,p4] [,p4] [,p3 ω,p4] [,p3 ω,p5] [,p5] [,p5] [,p3 ω,p5] [,p3,p5] [,p3 ω,p5] t3 [,p3 ω,p5] [,p3 ω,p4] [,p3 ω,p4] [,p4] [,p3 ω,p4] [,p3 ω,p5] [,p5] t3 [,p3 ω,p5] [,p3 ω,p5] [,p3 ω,p5] [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p5] t3 [,p3 ω,p4] [,p3 ω,p5] [,p3 ω,p5] [,p3 ω,p5] [,p3 ω,p5] t3 t3 [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p5] [,p3 ω,p5] [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p5] [,p3 ω,p5] t3 [,p3 ω,p4] p4 t3 p3 p5 PAGE 65
67 Coverability graph [,p4] [,p4] [,p5] t3 [,p3 ω,p4] t3 [,p3 ω,p4] [,p3 ω,p5] [,p5] t3 [,p3 ω,p5] [,p3,p5] p4 t3 p3 p5 PAGE 66
68 [,p3 ω,p5] [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p5] t3 [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p5] t3 [,p3 ω,p4] [,p3 ω,p5] [,p3 ω,p5] t3 [,p3 ω,p5] [,p3 ω,p4] t3 [,p3 ω,p4] [,p4] [,p4] [,p3 ω,p4] [,p3 ω,p5] [,p5] [,p5] [,p3 ω,p5] [,p3,p5] [,p3 ω,p5] t3 [,p3 ω,p5] [,p3 ω,p4] [,p3 ω,p4] [,p4] [,p3 ω,p4] [,p3 ω,p5] [,p5] t3 [,p3 ω,p5] [,p3 ω,p5] [,p3 ω,p5] [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p5] t3 [,p3 ω,p4] [,p3 ω,p5] [,p3 ω,p5] [,p3 ω,p5] [,p3 ω,p5] t3 t3 [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p5] [,p3 ω,p5] [,p3 ω,p4] [,p3 ω,p4] [,p3 ω,p5] [,p3 ω,p5] t3 [,p3 ω,p4] [,p4] [,p4] [,p5] t3 [,p3 ω,p4] t3 [,p3 ω,p4] [,p3 ω,p5] [,p5] t3 [,p3 ω,p5] t3 p4 [,p3,p5] p3 p5 PAGE 67
69 Coverability graph (vector notation) (1,0,0,1,0) (0,1,0,1,0) (1,0,0,0,1) (0,1,0,0,1) t3 (1,0,1,0,1) (1,0,ω,1,0) t3 (0,1,ω,1,0) t3 (0,1,ω,0,1) (1,0,ω,0,1) p4 t3 p3 p5 PAGE 68
70 Analysis results,, p4, p5 are safe p3 is unbounded [,p5] is reachable [,] is not reachable [,p3 180,p5] is coverable p3 t3 p5 p4 [,p4] [,p4] [,p5] [,p5] t3 [,p3 ω,p4] t3 [,p3 ω,p4] [,p3 ω,p5] t3 [,p3 ω,p5] [,p3,p5] PAGE 69
71 Additional properties A transition t is dead if and only if if does not appear in the coverability graph. The coverability graph and reachability graph are identical if the marked Petri net is bounded (i.e., only ω-free markings). The marked Petri net is safe if only 0's and 1's appear in nodes. Any firing sequence of the marked Petri net can be matched by a "walk" through the coverability graph. The reverse is not true!!!! PAGE 70
72 Limitation: Loss of information Two nets with the same coverability graph! [] [, ω ] {[],[, 1 ], [, 2 ], [, 3 ], [, 4 ],...} {[],[, 3 ], [, 6 ], [, 9 ], [, 12 ],...} PAGE 71
73 State-explosion problem (1) 2 n +1 states PAGE 72
74 State-explosion problem (2) place s is 2 n bounded Each round the number of tokens in s can be doubled. PAGE 73
75 Variants Construct the coverability graph on the fly (i.e., do not first construct the coverability tree): the graph may become smaller but process is typically non-deterministic. Several approaches have been proposed to construct "minimal" coverability graphs/sets (see "Alain Finkel: The Minimal Coverability Graph for Petri Nets. Applications and Theory of Petri Nets 1991: ", and "Gilles Geeraerts, Jean-François Raskin, Laurent Van Begin: On the Efficient Computation of the Minimal Coverability Set for Petri Nets. ATVA 2007: ") PAGE 74
76 Conclusion
77 The coverability graph is finite but... some information gets lost in case of unbounded behavior, and it may be huge and impossible to construct. Next: structural methods like invariants, siphons, traps, etc. PAGE 76
78 After this lecture you should be able to: Understand the formalizations, i.e., (P,T,F,W), M, (N,M)[t>(N,M'), etc. Determine whether a concrete marked net is terminating, deadlockfree, live, bounded, safe, and/or reversible, whether a transition is live and/or dead, whether a place is k-bounded, etc. Construct a Petri net that has a set of desirable properties, e.g., a net that is live and bounded but not reversible. Construct the reachability graph of a marked net. Construct the coverability tree of a marked net. Construct the coverability graph of a marked net. Tell which properties can(not) be derived from the coverability tree/graph. Understand the limitations of the coverability tree/graph (loss of information, inability to decide liveness, etc.). Derive conclusions from a concrete coverability tree/graph. PAGE 77
79 Appendix: Formalization of Coverability Graph based on Desel & Reisig
80 Coverability tree & graph Idea: cut-off unbounded behavior using omega (ω) markings (1,0, ω,1, ω,1,2,0) PAGE 79
81 Trivial example (1,0) (1,1) (1,2) (1,0) (1,ω) (1,ω) (1,0) (1,ω)... marked net reachability graph coverability tree coverability graph PAGE 80
82 Extended example marked net (1,0) (1,1) (1,2)... reachability graph (0,0) (0,1) (1,0) (1,ω) (1,ω) coverability tree (0,ω) (1,0) (1,ω) coverability graph (0,ω) PAGE 81
83 Approach 1. Define omega (ω) occurrence sequences. 2. Show that these are finite. 3. Construct coverability tree 4. Construct coverability graph (1,0) (1,ω) (1,0) (1,ω) (1,0) (1,ω) (1,0) (1,ω) (0,ω) (1,0) (1,ω) (0,ω) (0,ω) (1,ω) (1,ω) marked net ω-occurrence sequences coverability tree coverability graph PAGE 82
84 Example of a ω-occurrence sequence ω-occurrence sequence: (1,0) --> (1,ω) --> (1, ω) (1,0) (1,ω) (1,ω) marked net PAGE 83
85 PAGE 84
86 (1) Transitions need to be enabled (1,0) (1,ω) (1,0) (1,ω) (0,ω) (1,0) (1,ω) (1,ω) Only is enabled in (1,0), not. marked net ω-occurrence sequences PAGE 85
87 (2) For non-ω place markings: business as usual (1,0) (0,1) marked net ω-occurrence sequences PAGE 86
88 (3) Introducing omegas marked net (1,0) (1,ω) (0,ω) (1,0) (1,ω) (1,0) (1,ω) (1,ω) ω-occurrence sequences (1,ω) is "reachable" from (1,0) because there is a j (j=0) such that... PAGE 87
89 (4) Stop after second identical marking (1,0) (1,0) marked net (1,0) (1,ω) (0,ω) (1,ω) (1,0) (1,ω) (1,ω) ω-occurrence sequences (1,ω) (1,ω) (0,ω) Marking (0,ω) is dead while (1,ω) markings are not continued after second occurrence. PAGE 88
90 Finite? How long can a ω-occurrence sequence be? How many ω-occurrence sequences are there? Is the coverability tree/graph finite? PAGE 89
91 PAGE 90 Dickson's Lemma ( ) φ1 φ2 φ3 φ4 φ5 φ6 φ7 φ8 φ9 φ10 φ11 φ12 φ13 φ φ1 φ2 φ3 φ4 φ5 φ6 φ7 φ8 φ9 φ10 φ11 φ12 φ13 φ14
92 PAGE 91
93 PAGE 92
94 Coverability tree (1,0) (1,ω) (1,0) (1,0) (1,0) (1,ω) (0,ω) Diagrams are a bit misleading: vertices labeled with a ω-marking are really sequences, e.g., initial node is ε rather than (1,0). (1,ω) (0,ω) (1,ω) (1,ω) (1,ω) ω-occurrence sequences coverability tree PAGE 93
95 Finiteness PAGE 94
96 Example PAGE 95
97 Marking graph (i.e., reachability graph) PAGE 96
98 Coverability tree find the error (also in paper)... PAGE 97
99 Relation ω-markings and normal markings (1,0) (1,ω) (1,ω) (0,ω) Let b=180. There is a marking reachable with 0 tokens in and at least 180 tokens in. PAGE 98
100 Boundedness = "all ω-markings are ω- free" PAGE 99
101 b-boundedness (1,0) (1,ω) (1,ω) (0,ω) is 1-boundned (safe) is unbounded PAGE 100
102 Dead transitions do not appear in cov. tree PAGE 101
103 Coverability graph (versus cov. tree) (1,0) (1,ω) (0,ω) (1,0) (1,ω) (0,ω) (1,ω) coverability tree coverability graph PAGE 102
104 Boundedness implies equivalence PAGE 103
105 Appendix: Examples taken from Murata
106 Coverability tree (same as before) PAGE 105
107 Example PAGE 106
108 Properties PAGE 107
109 Coverability graph PAGE 108
110 PAGE 109
Process Mining. ^J Springer. Discovery, Conformance and Enhancement of Business Processes. Wil M.R van der Aalst Q UNIVERS1TAT.
Wil M.R van der Aalst Process Mining Discovery, Conformance and Enhancement of Business Processes Q UNIVERS1TAT m LIECHTENSTEIN Bibliothek ^J Springer Contents 1 Introduction I 1.1 Data Explosion I 1.2
More informationProcess Modelling from Insurance Event Log
Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R
More informationStructural Detection of Deadlocks in Business Process Models
Structural Detection of Deadlocks in Business Process Models Ahmed Awad and Frank Puhlmann Business Process Technology Group Hasso Plattner Institut University of Potsdam, Germany (ahmed.awad,frank.puhlmann)@hpi.uni-potsdam.de
More informationProcess Mining Using BPMN: Relating Event Logs and Process Models
Noname manuscript No. (will be inserted by the editor) Process Mining Using BPMN: Relating Event Logs and Process Models Anna A. Kalenkova W. M. P. van der Aalst Irina A. Lomazova Vladimir A. Rubin Received:
More informationDiagnosing workflow processes using Woflan
Diagnosing workflow processes using Woflan H.M.W. Verbeek 1, T. Basten 2, and W.M.P. van der Aalst 3 1 Dept. of Computing Science, Eindhoven University of Technology, The Netherlands wsineric@win.tue.nl
More informationBusiness Process Modeling
Business Process Concepts Process Mining Kelly Rosa Braghetto Instituto de Matemática e Estatística Universidade de São Paulo kellyrb@ime.usp.br January 30, 2009 1 / 41 Business Process Concepts Process
More informationSoundness of Workflow Nets with Reset Arcs
Soundness of Workflow Nets with Reset Arcs W.M.P. van der Aalst 1,2, K.M. van Hee 1, A.H.M. ter Hofstede 2, N. Sidorova 1, H.M.W. Verbeek 1, M. Voorhoeve 1, and M.T. Wynn 2 1 Department of Mathematics
More informationFormal Approaches to Business Processes through Petri Nets
Formal Approaches to Business Processes through Petri Nets Nick ussell Arthur H. M. ter Hofstede a university 2009, www.yawlfoundation.org Acknowledgement These slides summarize the content of Chapter
More informationBRIDGING THE GAP BETWEEN BUSINESS MODELS AND WORKFLOW SPECIFICATIONS
International Journal of Cooperative Information Systems c World Scientific Publishing Company BRIDGING THE GAP BETWEEN BUSINESS MODELS WORKFLOW SPECIFICATIONS JULIANE DEHNERT Fraunhofer ISST, Mollstr.
More informationMaster Thesis September 2010 ALGORITHMS FOR PROCESS CONFORMANCE AND PROCESS REFINEMENT
Master in Computing Llenguatges i Sistemes Informàtics Master Thesis September 2010 ALGORITHMS FOR PROCESS CONFORMANCE AND PROCESS REFINEMENT Student: Advisor/Director: Jorge Muñoz-Gama Josep Carmona Vargas
More informationKirsten Sinclair SyntheSys Systems Engineers
Kirsten Sinclair SyntheSys Systems Engineers Kirsten Sinclair SyntheSys Systems Engineers Spicing-up IBM s Enterprise Architecture tools with Petri Nets On Today s Menu Appetiser: Background Starter: Use
More informationSystem modeling. Budapest University of Technology and Economics Department of Measurement and Information Systems
System modeling Business process modeling how to do it right Partially based on Process Anti-Patterns: How to Avoid the Common Traps of Business Process Modeling, J Koehler, J Vanhatalo, IBM Zürich, 2007.
More informationModel Discovery from Motor Claim Process Using Process Mining Technique
International Journal of Scientific and Research Publications, Volume 3, Issue 1, January 2013 1 Model Discovery from Motor Claim Process Using Process Mining Technique P.V.Kumaraguru *, Dr.S.P.Rajagopalan
More informationDr. Jana Koehler IBM Zurich Research Laboratory
Precise Modeling of Business Processes with the Business Process Modeling Notation BPMN 2.0 Dr. Jana Koehler IBM Zurich Research Laboratory ZRL BIT at a Glance Computer Science at ZRL: Security/Cryptography
More informationWoPeD - An Educational Tool for Workflow Nets
WoPeD - An Educational Tool for Workflow Nets Thomas Freytag, Cooperative State University (DHBW) Karlsruhe, Germany freytag@dhbw-karlsruhe.de Martin Sänger, 1&1 Internet AG, Karlsruhe, Germany m.saenger09@web.de
More informationThe Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
More informationBusiness Process Model and Soundness
Instantaneous Soundness Checking of Industrial Business Process Models Dirk Fahland 1, Cédric Favre 2, Barbara Jobstmann 4, Jana Koehler 2, Niels Lohmann 3, Hagen Völzer 2, and Karsten Wolf 3 1 Humboldt-Universität
More informationCoverability for Parallel Programs
2015 http://excel.fit.vutbr.cz Coverability for Parallel Programs Lenka Turoňová* Abstract We improve existing method for the automatic verification of systems with parallel running processes. The technique
More informationSoundness of Workflow Nets: Classification, Decidability, and Analysis
Accepted for publication in Formal Aspects of Computing Soundness of Workflow Nets: Classification, Decidability, and Analysis W.M.P. van der Aalst 1,2, K.M. van Hee 1, A.H.M. ter Hofstede 2,1, N. Sidorova
More informationBusiness Intelligence and Process Modelling
Business Intelligence and Process Modelling F.W. Takes Universiteit Leiden Lecture 7: Network Analytics & Process Modelling Introduction BIPM Lecture 7: Network Analytics & Process Modelling Introduction
More informationFaster and More Focused Control-Flow Analysis for Business Process Models through SESE Decomposition
Faster and More Focused Control-Flow Analysis for Business Process Models through SESE Decomposition Jussi Vanhatalo 1,2, Hagen Völzer 1, and Frank Leymann 2 1 IBM Zurich Research Laboratory, Säumerstrasse
More informationBusiness Process Management Demystified: A Tutorial on Models, Systems and Standards for Workflow Management
Business Process Management Demystified: A Tutorial on Models, Systems and Standards for Workflow Management Wil M.P. van der Aalst Department of Technology Management Eindhoven University of Technology
More informationReliability Guarantees in Automata Based Scheduling for Embedded Control Software
1 Reliability Guarantees in Automata Based Scheduling for Embedded Control Software Santhosh Prabhu, Aritra Hazra, Pallab Dasgupta Department of CSE, IIT Kharagpur West Bengal, India - 721302. Email: {santhosh.prabhu,
More informationDiagramming Techniques:
1 Diagramming Techniques: FC,UML,PERT,CPM,EPC,STAFFWARE,... Eindhoven University of Technology Faculty of Technology Management Department of Information and Technology P.O. Box 513 5600 MB Eindhoven The
More informationBusiness-Driven Software Engineering Lecture 3 Foundations of Processes
Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster jku@zurich.ibm.com Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary
More informationAn Operating Guideline Approach to the SOA
An Operating Guideline Approach to the SOA Peter Massuthe, Wolfgang Reisig, and Karsten Schmidt Humboldt-Universität zu Berlin Institut für Informatik Unter den Linden 6 D-10099 Berlin {massuthe, reisig,
More informationLluis Belanche + Alfredo Vellido. Intelligent Data Analysis and Data Mining. Data Analysis and Knowledge Discovery
Lluis Belanche + Alfredo Vellido Intelligent Data Analysis and Data Mining or Data Analysis and Knowledge Discovery a.k.a. Data Mining II An insider s view Geoff Holmes: WEKA founder Process Mining
More informationArchitecture of Information Systems
Architecture of Information Systems using the theory of Petri nets lecture notes for Systeemmodelleren 1 (2M310) K. van Hee N. Sidorova M. Voorhoeve and J. van der Woude Department of Computing Science
More informationBudapest University of Technology and Economics Department of Measurement and Information Systems. Business Process Modeling
Budapest University of Technology and Economics Department of Measurement and Information Systems Business Process Modeling Process, business process Workflow: sequence of given steps executed in order
More informationEMiT: A process mining tool
EMiT: A process mining tool B.F. van Dongen and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands. b.f.v.dongen@tue.nl
More informationModelling Workflow with Petri Nets. CA4 BPM PetriNets
Modelling Workflow with Petri Nets 1 Workflow Management Issues Georgakopoulos,Hornick, Sheth Process Workflow specification Workflow Implementation =workflow application Business Process Modelling/ Reengineering
More informationTest Suite Generation for Services
Test Suite Generation for Services Kathrin Kaschner and Niels Lohmann WESOA 2008 Sydney 1 December 2008 http://service technology.org/wesoa2008 UNIVERSITÄT ROSTOCK Testing Services: What's new? classical
More informationPlace/Transition Petri Nets
Place/Transition Petri Nets JSrg Desel 1 and Wolfgang Reisig 2 1 Institut fiir Angewandte Informatik und Formale Beschreibungsverfahren Universit t Karlsruhe, Germany desel@aifb.uni-karlsruhe.de 2 Institut
More informationFeature. Applications of Business Process Analytics and Mining for Internal Control. World
Feature Filip Caron is a doctoral researcher in the Department of Decision Sciences and Information Management, Information Systems Group, at the Katholieke Universiteit Leuven (Flanders, Belgium). Jan
More informationA FEATURE COMPUTATION TREE MODEL TO SPECIFY REQUIREMENTS AND REUSE
A FEATURE COMPUTATION TREE MODEL TO SPECIFY REQUIREMENTS AND REUSE E.E.Roubtsova Open University of the Netherlands Postbus 2960, 6401DL, Heerlen, the Netherlands Ella.Roubtsova@ou.nl S.A.Roubtsov Technical
More informationDotted Chart and Control-Flow Analysis for a Loan Application Process
Dotted Chart and Control-Flow Analysis for a Loan Application Process Thomas Molka 1,2, Wasif Gilani 1 and Xiao-Jun Zeng 2 Business Intelligence Practice, SAP Research, Belfast, UK The University of Manchester,
More informationThe Analysis Method about Change Domain of Business Process Model Based on the Behavior Profile of Petri Net
Appl. Math. Inf. Sci. 6-3S, No. 3, 943-949 (2012) 943 Applied Mathematics & Information Sciences An International Journal The Analysis Method about Change Domain of Business Process Model Based on the
More informationDetermine If An Equation Represents a Function
Question : What is a linear function? The term linear function consists of two parts: linear and function. To understand what these terms mean together, we must first understand what a function is. The
More informationUniversity of Pisa. MSc in Computer Engineering. Business Processes Management. Lectures
University of Pisa MSc in Computer Engineering Business Processes Management Large and complex organizations are a tangible manifestation of advanced technology, more than machinery itself. (J.K. Galbraith)
More informationProM 6 Tutorial. H.M.W. (Eric) Verbeek mailto:h.m.w.verbeek@tue.nl R. P. Jagadeesh Chandra Bose mailto:j.c.b.rantham.prabhakara@tue.
ProM 6 Tutorial H.M.W. (Eric) Verbeek mailto:h.m.w.verbeek@tue.nl R. P. Jagadeesh Chandra Bose mailto:j.c.b.rantham.prabhakara@tue.nl August 2010 1 Introduction This document shows how to use ProM 6 to
More informationEFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES. Nataliya Golyan, Vera Golyan, Olga Kalynychenko
380 International Journal Information Theories and Applications, Vol. 18, Number 4, 2011 EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES Nataliya Golyan, Vera Golyan, Olga Kalynychenko
More informationBusiness Process Configuration in The Cloud: How to Support and Analyze Multi-Tenant Processes?
Business Process Configuration in The Cloud: How to Support and Analyze Multi-Tenant Processes? W.M.P. van der Aalst Department of Mathematics and Computer Science, Eindhoven University of Technology Eindhoven,
More information10g versions followed on separate paths due to different approaches, but mainly due to differences in technology that were known to be huge.
Oracle BPM 11g Platform Analysis May 2010 I was privileged to be invited to participate in "EMEA BPM 11g beta bootcamp" in April 2010, where I had close contact with the latest release of Oracle BPM 11g.
More informationLECTURE 4. Last time: Lecture outline
LECTURE 4 Last time: Types of convergence Weak Law of Large Numbers Strong Law of Large Numbers Asymptotic Equipartition Property Lecture outline Stochastic processes Markov chains Entropy rate Random
More informationConfiguring IBM WebSphere Monitor for Process Mining
Configuring IBM WebSphere Monitor for Process Mining H.M.W. Verbeek and W.M.P. van der Aalst Technische Universiteit Eindhoven Department of Mathematics and Computer Science P.O. Box 513, 5600 MB Eindhoven,
More informationGenet A tool for the synthesis and mining of Petri nets. Josep Carmona jcarmonalsi.upc.edu Software Department Universitat Politcnica de Catalunya
Genet A tool for the synthesis and mining of Petri nets Josep Carmona jcarmonalsi.upc.edu Software Department Universitat Politcnica de Catalunya 2 Contents 1.1 Overview of the tool.......................
More informationFacilitating Business Process Discovery using Email Analysis
Facilitating Business Process Discovery using Email Analysis Matin Mavaddat Matin.Mavaddat@live.uwe.ac.uk Stewart Green Stewart.Green Ian Beeson Ian.Beeson Jin Sa Jin.Sa Abstract Extracting business process
More informationGeneration of a Set of Event Logs with Noise
Generation of a Set of Event Logs with Noise Ivan Shugurov International Laboratory of Process-Aware Information Systems National Research University Higher School of Economics 33 Kirpichnaya Str., Moscow,
More informationClass notes Program Analysis course given by Prof. Mooly Sagiv Computer Science Department, Tel Aviv University second lecture 8/3/2007
Constant Propagation Class notes Program Analysis course given by Prof. Mooly Sagiv Computer Science Department, Tel Aviv University second lecture 8/3/2007 Osnat Minz and Mati Shomrat Introduction This
More information2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8]
Code No: R05220502 Set No. 1 1. (a) Describe the performance analysis in detail. (b) Show that f 1 (n)+f 2 (n) = 0(max(g 1 (n), g 2 (n)) where f 1 (n) = 0(g 1 (n)) and f 2 (n) = 0(g 2 (n)). [8+8] 2. (a)
More informationData Structures Fibonacci Heaps, Amortized Analysis
Chapter 4 Data Structures Fibonacci Heaps, Amortized Analysis Algorithm Theory WS 2012/13 Fabian Kuhn Fibonacci Heaps Lacy merge variant of binomial heaps: Do not merge trees as long as possible Structure:
More informationSummary and Outlook. Business Process Intelligence Course Lecture 8. prof.dr.ir. Wil van der Aalst. www.processmining.org
Business Process Intelligence Course Lecture 8 Summary and Outlook prof.dr.ir. Wil van der Aalst www.processmining.org Overview Chapter 1 Introduction Part I: Preliminaries Chapter 2 Process Modeling and
More informationThe Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge,
The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge, cheapest first, we had to determine whether its two endpoints
More informationTest Coverage Criteria for Autonomous Mobile Systems based on Coloured Petri Nets
9th Symposium on Formal Methods for Automation and Safety in Railway and Automotive Systems Institut für Verkehrssicherheit und Automatisierungstechnik, TU Braunschweig, 2012 FORMS/FORMAT 2012 (http://www.forms-format.de)
More informationWorkflow Patterns Put Into Context
Software and Systems Modeling manuscript No. (will be inserted by the editor) Workflow Patterns Put Into Context W.M.P. van der Aalst 1,2, A.H.M. ter Hofstede 2,1 1 Eindhoven University of Technology,
More informationFormalization of Workflows Using Fork-Join Automata
Formalization of Workflows Using Fork-Join Automata Tudor Jebelean 1 and Anna Medve 2 1 RISC, Johannes Kepler University, Linz, Austria 2 Department of Electrical Engineering and Information Systems, University
More informationlogic language, static/dynamic models SAT solvers Verified Software Systems 1 How can we model check of a program or system?
5. LTL, CTL Last part: Alloy logic language, static/dynamic models SAT solvers Today: Temporal Logic (LTL, CTL) Verified Software Systems 1 Overview How can we model check of a program or system? Modeling
More informationProcess-Aware Information Systems: Design, Enactment, and Analysis
Process-Aware Information Systems: Design, Enactment, and Analysis Wil M.P. van der Aalst Department of Mathematics and Computer Science, Eindhoven University of Technology, P.O. Box 513, NL-5600 MB Eindhoven,
More informationCombination of Process Mining and Simulation Techniques for Business Process Redesign: A Methodological Approach
Combination of Process Mining and Simulation Techniques for Business Process Redesign: A Methodological Approach Santiago Aguirre, Carlos Parra, and Jorge Alvarado Industrial Engineering Department, Pontificia
More informationBusiness Process Quality Metrics: Log-based Complexity of Workflow Patterns
Business Process Quality Metrics: Log-based Complexity of Workflow Patterns Jorge Cardoso Department of Mathematics and Engineering, University of Madeira, Funchal, Portugal jcardoso@uma.pt Abstract. We
More informationUsing Trace Clustering for Configurable Process Discovery Explained by Event Log Data
Master of Business Information Systems, Department of Mathematics and Computer Science Using Trace Clustering for Configurable Process Discovery Explained by Event Log Data Master Thesis Author: ing. Y.P.J.M.
More informationProcess Modeling Notations and Workflow Patterns
Process Modeling Notations and Workflow Patterns Stephen A. White, IBM Corp., United States ABSTRACT The research work of Wil van der Aalst, Arthur ter Hofstede, Bartek Kiepuszewski, and Alistair Barros
More information6.852: Distributed Algorithms Fall, 2009. Class 2
.8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparison-based algorithms. Basic computation in general synchronous networks: Leader election
More informationPOMPDs Make Better Hackers: Accounting for Uncertainty in Penetration Testing. By: Chris Abbott
POMPDs Make Better Hackers: Accounting for Uncertainty in Penetration Testing By: Chris Abbott Introduction What is penetration testing? Methodology for assessing network security, by generating and executing
More informationScheduling Shop Scheduling. Tim Nieberg
Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations
More informationWhat is Linear Programming?
Chapter 1 What is Linear Programming? An optimization problem usually has three essential ingredients: a variable vector x consisting of a set of unknowns to be determined, an objective function of x to
More informationChapter 2 Introduction to Business Processes, BPM, and BPM Systems
Chapter 2 Introduction to Business Processes, BPM, and BPM Systems This chapter provides a basic overview on business processes. In particular it concentrates on the actual definition and characterization
More informationDiagram Models in Continuous Business Process Improvement
JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 22 No. 2 (2014), pp. 118-133 Diagram Models in Continuous Business Process Improvement Mateusz Wibig 1 1 CGI Polska Energy and Resources 39 Sienna Street, Warszawa
More informationMTAT.03.231 Business Process Management (BPM) (for Masters of IT) Lecture 2: Introduction to BPMN
MTAT.03.231 Business Process Management (BPM) (for Masters of IT) Lecture 2: Introduction to BPMN Marlon Dumas marlon.dumas ät ut. ee How to engage in BPM? 1. Opportunity assessment 2. Process modelling
More informationModel based testing tools. Olli Pekka Puolitaival
Model based testing tools Olli Pekka Puolitaival Index 1. Software testing evolution 2. model based testing (MBT): main idea 3. MBT: step by step 4. MBT: tools 5. Questions Software testing evolution model
More informationChapter 4: Architecture for Performance Monitoring of Complex Information Technology (IT) Infrastructures using Petri Net
Chapter 4: Architecture for Performance Monitoring of Complex Information Technology (IT) Infrastructures using Petri Net This chapter will focus on the various approaches that we have taken in the modeling
More informationFrom Workflow Design Patterns to Logical Specifications
AUTOMATYKA/ AUTOMATICS 2013 Vol. 17 No. 1 http://dx.doi.org/10.7494/automat.2013.17.1.59 Rados³aw Klimek* From Workflow Design Patterns to Logical Specifications 1. Introduction Formal methods in software
More informationLecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
More informationWeb Data Extraction: 1 o Semestre 2007/2008
Web Data : Given Slides baseados nos slides oficiais do livro Web Data Mining c Bing Liu, Springer, December, 2006. Departamento de Engenharia Informática Instituto Superior Técnico 1 o Semestre 2007/2008
More informationPETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS. G. Mušič and D. Matko
PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS G. Mušič and D. Matko Faculty of Electrical Engineering, University of Ljubljana, Slovenia. E-mail: gasper.music@fe.uni-lj.si Abstract: The
More informationScheduling Home Health Care with Separating Benders Cuts in Decision Diagrams
Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams André Ciré University of Toronto John Hooker Carnegie Mellon University INFORMS 2014 Home Health Care Home health care delivery
More informationProcess Mining and Network Analysis
Towards Comprehensive Support for Organizational Mining Minseok Song and Wil M.P. van der Aalst Eindhoven University of Technology P.O.Box 513, NL-5600 MB, Eindhoven, The Netherlands. {m.s.song, w.m.p.v.d.aalst}@tue.nl
More informationFormal Modeling Approach for Supply Chain Event Management
Formal Modeling Approach for Supply Chain Event Management Rong Liu and Akhil Kumar Smeal College of Business Penn State University University Park, PA 16802, USA {rul110,akhilkumar}@psu.edu Wil van der
More informationBusiness Process Modelling Languages, Goals and Variabilities
Business Process Modelling Languages, Goals and Variabilities Birgit Korherr Women s Postgraduate College for Internet Technologies Institute of Software Technology and Interactive Systems Vienna University
More informationFlexible Process Notations for Cross-organizational Case Management Systems
IT University of Copenhagen Ph.D. Dissertation Flexible Process Notations for Cross-organizational Case Management Systems Author: Tijs Slaats Supervisor: Dr. Thomas T. Hildebrandt Co-supervisor: Dr. Marco
More informationProcess Mining and Monitoring Processes and Services: Workshop Report
Process Mining and Monitoring Processes and Services: Workshop Report Wil van der Aalst (editor) Eindhoven University of Technology, P.O.Box 513, NL-5600 MB, Eindhoven, The Netherlands. w.m.p.v.d.aalst@tm.tue.nl
More informationMidterm Practice Problems
6.042/8.062J Mathematics for Computer Science October 2, 200 Tom Leighton, Marten van Dijk, and Brooke Cowan Midterm Practice Problems Problem. [0 points] In problem set you showed that the nand operator
More informationModel Checking: An Introduction
Announcements Model Checking: An Introduction Meeting 2 Office hours M 1:30pm-2:30pm W 5:30pm-6:30pm (after class) and by appointment ECOT 621 Moodle problems? Fundamentals of Programming Languages CSCI
More informationRelational XES: Data Management for Process Mining
Relational XES: Data Management for Process Mining B.F. van Dongen and Sh. Shabani Department of Mathematics and Computer Science, Eindhoven University of Technology, The Netherlands. B.F.v.Dongen, S.Shabaninejad@tue.nl
More informationTransforming PICTURE to BPMN 2.0 as Part of the Model-driven Development of Electronic Government Systems
Heitkötter, Henning, Transforming PICTURE to BPMN 2.0 as Part of the Model-Driven Development of Electronic Government Systems, 44th Hawaii International Conference on System Sciences (HICSS), pp. 1 10,
More informationComplexity Results for 1-safe Nets
Complexity Results for 1-safe Nets Allan Cheng Computer Science Department, Aarhus University Ny Munkegade, DK 8000 Aarhus C, Denmark acheng@daimi.aau.dk Javier Esparza Laboratory for Foundations of Computer
More informationONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015
ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015 ONLINE STEINER FOREST PROBLEM An initially given graph G. s 1 s 2 A sequence of demands (s i, t i ) arriving
More informationSafety verification of software using structured Petri nets
Safety verification of software using structured Petri nets Krzysztof Sacha Warsaw University of Technology, Institute of Control and Computation Engineering, ul. Nowowiejska 15/19, 00-665 Warszawa, Poland
More informationBusiness Process Management and IT Architecture Design. The T case study. Dr. Jana Koehler Olaf Zimmermann IBM Zurich Research Laboratory
Business Process Management and IT Architecture Design The T case study Dr. Jana Koehler Olaf Zimmermann IBM Zurich Research Laboratory ZRL BIT at a Glance IBM Zurich Research Lab (ZRL), Rüschlikon/ZH
More informationModeling and Performance Evaluation of Computer Systems Security Operation 1
Modeling and Performance Evaluation of Computer Systems Security Operation 1 D. Guster 2 St.Cloud State University 3 N.K. Krivulin 4 St.Petersburg State University 5 Abstract A model of computer system
More informationProcess-Aware Information Systems: Lessons to be Learned from Process Mining
Process-Aware Information Systems: Lessons to be Learned from Process Mining W.M.P. van der Aalst Department of Mathematics and Computer Science, Eindhoven University of Technology P.O. Box 513, NL-5600
More informationA Test Case Generator for the Validation of High-Level Petri Nets
A Test Case Generator for the Validation of High-Level Petri Nets Jörg Desel Institut AIFB Universität Karlsruhe D 76128 Karlsruhe Germany E-mail: desel@aifb.uni-karlsruhe.de Andreas Oberweis, Torsten
More informationFormal Verification Problems in a Bigdata World: Towards a Mighty Synergy
Dept. of Computer Science Formal Verification Problems in a Bigdata World: Towards a Mighty Synergy Matteo Camilli matteo.camilli@unimi.it http://camilli.di.unimi.it ICSE 2014 Hyderabad, India June 3,
More informationDecision Mining in Business Processes
Decision Mining in Business Processes A. Rozinat and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands {a.rozinat,w.m.p.v.d.aalst}@tm.tue.nl
More informationGenerating models of a matched formula with a polynomial delay
Generating models of a matched formula with a polynomial delay Petr Savicky Institute of Computer Science, Academy of Sciences of Czech Republic, Pod Vodárenskou Věží 2, 182 07 Praha 8, Czech Republic
More information2005 3rd IEEE International Conference on Industrial Informatics (INDIN) Perth, Australia 10-12 August 2005
Citation: Pudhota, Leo and Chang, Elizabeth. 2005. : Coloured petrinet for flexible business workflow modelling, in Dillon, T. and Yu, X. and Chan, E. (ed), INDIN 2005: 3rd International Conference on
More informationSUBGROUPS OF CYCLIC GROUPS. 1. Introduction In a group G, we denote the (cyclic) group of powers of some g G by
SUBGROUPS OF CYCLIC GROUPS KEITH CONRAD 1. Introduction In a group G, we denote the (cyclic) group of powers of some g G by g = {g k : k Z}. If G = g, then G itself is cyclic, with g as a generator. Examples
More informationConceptual Model for On Line Auditing
Conceptual Model for On Line Auditing Wil van der Aalst, Kees van Hee, Jan Martijn van der Werf Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, P.O. Box 513, 5600 MB
More informationEDIminer: A Toolset for Process Mining from EDI Messages
EDIminer: A Toolset for Process Mining from EDI Messages Robert Engel 1, R. P. Jagadeesh Chandra Bose 2, Christian Pichler 1, Marco Zapletal 1, and Hannes Werthner 1 1 Vienna University of Technology,
More informationSoftware Visualization and Model Generation
Software Visualization and Model Generation Erik Doernenburg Software Developer ThoughtWorks, Inc. Gregor Hohpe Software Engineer Google, Inc. Where are the most defects? 2006 Erik Doernenburg & Gregor
More information