... ... ... ... ... ... ... ... ... ... ... ... ... ... iterated execution. alternative execution. sequential execution. parallel execution



Similar documents
Regular Languages and Finite Automata

Process Modelling from Insurance Event Log

7. Classification. Business value. Structuring (repetition) Automation. Classification (after Leymann/Roller) Automation.

3. Mathematical Induction

Formal Approaches to Business Processes through Petri Nets

Arrangements of Stars on the American Flag

Oracle Turing machines faced with the verification problem

A Test Case Generator for the Validation of High-Level Petri Nets

Activity Mining for Discovering Software Process Models

Functional Dependencies and Finding a Minimal Cover

Business Process Management: A personal view

7 Gaussian Elimination and LU Factorization

PROCESS-ORIENTED ARCHITECTURES FOR ELECTRONIC COMMERCE AND INTERORGANIZATIONAL WORKFLOW

EMiT: A process mining tool

Chapter 5: FUNCTIONAL DEPENDENCIES AND NORMALIZATION FOR RELATIONAL DATABASES

KNOWLEDGE FACTORING USING NORMALIZATION THEORY

Normalization. CIS 331: Introduction to Database Systems

INCIDENCE-BETWEENNESS GEOMETRY

A PRACTICAL APPROACH FOR A WORKFLOW MANAGEMENT SYSTEM

Variation Management for Software Production Lines 1

Schema Design and Normal Forms Sid Name Level Rating Wage Hours

Modelling Workflow with Petri Nets. CA4 BPM PetriNets

Chapter 4 Software Lifecycle and Performance Analysis

Some other convex-valued selection theorems 147 (2) Every lower semicontinuous mapping F : X! IR such that for every x 2 X, F (x) is either convex and

Formal Languages and Automata Theory - Regular Expressions and Finite Automata -

PLG: a Framework for the Generation of Business Process Models and their Execution Logs

FileNet s BPM life-cycle support

2x + y = 3. Since the second equation is precisely the same as the first equation, it is enough to find x and y satisfying the system

DATABASE NORMALIZATION

Chapter 6 Experiment Process

Kenken For Teachers. Tom Davis June 27, Abstract

Mathematical Induction

Chapter 17. Orthogonal Matrices and Symmetries of Space

From Workflow Design Patterns to Logical Specifications

Sudoku puzzles and how to solve them

Chapter 6. Cuboids. and. vol(conv(p ))

Stochastic Inventory Control

Business Process Measurement in small enterprises after the installation of an ERP software.

OPRE 6201 : 2. Simplex Method

Supporting the BPM lifecycle with FileNet

cons of the handbook, and uniformity and professionalism. 3. telephone interviews with two other organisations involved in youth probation, the Child

Lecture 3: Finding integer solutions to systems of linear equations

Duality in Linear Programming

2. Argument Structure & Standardization

Neutrality s Much Needed Place In Dewey s Two-Part Criterion For Democratic Education

Supporting the BPM life-cycle with FileNet

Special Situations in the Simplex Algorithm

Writing Thesis Defense Papers

BIS 3106: Business Process Management. Lecture Two: Modelling the Control-flow Perspective

CRITICAL PATH ANALYSIS AND GANTT CHARTS

Towards Cross-Organizational Process Mining in Collections of Process Models and their Executions

Supporting the Workflow Management System Development Process with YAWL

Towards a Software Framework for Automatic Business Process Redesign Marwa M.Essam 1, Selma Limam Mansar 2 1

It all depends on independence

Advanced Relational Database Design

The phrases above are divided by their function. What is each section of language used to do?

Normalization of Database

Structural Detection of Deadlocks in Business Process Models

Normalization in Database Design

Software development process

The four [10,5,4] binary codes

Kant s deontological ethics

If it's in the 2nd NF and there are no non-key fields that depend on attributes in the table other than the Primary Key.

French Scheme CSPN to CC Evaluation

Justice and Ethics. Jimmy Rising. October 18, 2002

Business Process Modeling

Handling Big(ger) Logs: Connecting ProM 6 to Apache Hadoop

Notes on Orthogonal and Symmetric Matrices MENU, Winter 2013

Business Process Management Demystified: A Tutorial on Models, Systems and Standards for Workflow Management

CS 377 Database Systems. Database Design Theory and Normalization. Li Xiong Department of Mathematics and Computer Science Emory University

Lab 11. Simulations. The Concept

EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES. Nataliya Golyan, Vera Golyan, Olga Kalynychenko

Process Modeling Notations and Workflow Patterns

THE DIMENSION OF A VECTOR SPACE

ECON 459 Game Theory. Lecture Notes Auctions. Luca Anderlini Spring 2015

RUP and XP, Part I: Finding Common Ground

Notes on Complexity Theory Last updated: August, Lecture 1

Generation of a Set of Event Logs with Noise

COMPUTER AUTOMATION OF BUSINESS PROCESSES T. Stoilov, K. Stoilova

COMPUTING PRACTICES ASlMPLE GUIDE TO FIVE NORMAL FORMS IN RELATIONAL DATABASE THEORY

Practical Guide to the Simplex Method of Linear Programming

Lecture 2 Normalization

Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts

Transcription:

Institut fuer Informatik Humboldt-Universitaet zu Berlin Mai 1998 Database Theory { Petri Net Theory { Workow Theory Ekkart Kindler Humboldt-Universitat zu Berlin, Institut fur Informatik, Unter den Linden 6, D-10099 Berlin y 1 Introduction Workow management is in vogue. Jablonski [Jab95] calls workow management the relational databases of the 90ties. However, Jablonski states one important dierence between workow management in the 90ties and relational databases in the 80ties: Whereas there has been a theoretical foundation for relational databases right from the beginning (in the early 70ties), there is no well-established workow theory yet. In this paper we will argue that there is a workow theory, which only needs to be rediscovered underneath a vast amount of existing theory. For example, some classical results from Petri net theory just need a new interpretation in order to make up a workow theory. Van der Aalst [Aal97b, Aal97a, Aal98] has shown that simple Petri net concepts such as liveness and boundedness can be used to characterize sound workows. We do not claim that this approach is a fully-edged workow theory yet but we claim that a helpful workow theory will be akin to it. This paper will substantiate the above statement by providing a avour of a future workow theory. From a theoreticians point of view this theory may appear trivial because there is not much hope for deep theorems. But, we make a plea by forming an analogy to a well-established part of database theory: normal forms and depency theory (cf. [Cod90, Dat90]). Depency theory is even simpler and has even less deep theorems but is a great success because it is just the bit of theory needed! This paper is not meant to develop new ideas we mainly present those of van der Aalst [Aal97a] and give a new interpretation to a result of Valette [Val79] (also rephrased in [Aal98]). The main purpose is to point out the right ideas from Petri net theory in the eld of workow management and to direct research into this eld. 2 Database theory In order to form the analogy to database theory, let us briey recall normal forms and depency theory which have been a great success within the eld of relational database systems [Dat90]. This theory was established by Codd in the early 70ties. Codd rephrases the main motivation for his theory as follows: `My main goal was to develop some theory that would be applicable to logical database design, and especially to the creation of a sound collection of base relations' [Cod90], p. 317. Normal forms capture formally, what a skilled database designer considers as a good design. Each normal form is motivated by anomalies which may occur in a bad database design. Let us consider an example of a simple database which consists of a single relation. The relation Supported by the Deutsche Forschungsgemeinschaft within the research project `Petri Net Technology' (DFG Forschergruppe `Petrinetz-Technologie'). y e-mail: kindler@informatik.hu-berlin.de 1

project administration consists of the following attributes: project, person, percentage of working hours spent on this project, and the telephone number of the person. Projects and persons are represented by some number. Essentially, a relation (or an instance of a relation) can be represented as a table as shown in Fig. 1 (without identical rows). The columns of the table correspond to the attributes of the relation. PROJECT# PERSON# PERCENT. TEL. 1 4711 15 208 2 4711 10 208 1 4712 100 209 1 4713 100 209 0 4711 30 208 2 4714 100 210 3 4715 100 207 0 4710 30 220 1 4710 10 220. Figure 1: The relation project administration The relation project administration is not well designed. This will be demonstrated by means of some anomalies (insert and update). Suppose, there is a new person who is not yet associated with a particular project. Then, it is impossible to insert this person into this relation. The insert anomaly means that we cannot store the telephone number of a person within relation project administration unless this person works on a project. Next suppose, we want to change the telephone number of person 4711 then we actually need to update three rows. The update anomaly means that updating one fact needs changes in several rows. Now, why is the above relation not well designed? The reason is that attribute TEL. is functionally depent (i.e. is fully determined by the value) of attribute PERSON#, since each person has only one telephone number. Another attribute PERCENT.,however, is not functionally depent on attribute PERSON# since the percentage of working time deps on the project either. A relation is well-designed, if for each collection of attributes we have: Either all (other) attributes are functionally depent on that collection or no (other) attribute is functionally depenton that collection. This requirement, called Boyce/Codd-normal-form (BCNF ) [Dat90], is violated by the relation project administration (as indicated above). Though we did not give a fully formal denition of BCNF, it should be clear that it is only based on the concept of functional depency which has a clear intuition and can be easily explained. 3 Workow theory In this section, we will sketch a workow theory introduced by van der Aalst [Aal97a, Aal97b, Aal98]. Its simplicity and its correspondence to intuitive ideas are analogous to Codd's database theory. Moreover, this workow theory helps to identify good workows. Note, that this work- ow theory is only concerned with the behavioural or process aspect of workows of course theories for the other aspects are necessary. Since the behavioural aspect is an important aspect of workows, it is justied to call it workow theory. Let us consider an example rst. A workow (resp. the behavioural aspect) can be modelled by a Petri net (a Place/Transition-System, to be precise) with a distinguished place and a distinguished place. Moreover, each place except is initially unmarked. A transition of the Petri net corresponds to an activity of the workow a place (or rather a token on a place) 2

corresponds to a document. The arcs of the Petri net indicate which documents are consumed and which are produced by an activity. t5 e t5 e a t2 c t6 a t2 c t6 t1 t4 t1 t4 b t3 d b t3 d Figure 2: Workow net 1 Figure 3: Workow net 2 Figure 2 shows an example of an ill-designed workow. We will point out some anomalies of this workow. Suppose, activities t1, t3, and t5 have been processed already. Then, we have documents (tokens on places) e and d in this situation no activity can be executed any more. Therefore, it is impossible to nish the workow correctly by putting a document (token) on place. Next, we try to x this anomaly by removing the arc from b to t6 as shown in Fig. 3. Then, activity t6 can be processed in the above situation and the workow terminates. This workow, however, shows another anomaly: When the workow terminates, there is still a document d within the workow. This corresponds to the loss of a document within the workow, whichisnot satisfactory. Another anomaly would be if there was an activity which is dead i.e. it is impossible to ever perform this activity. These three anomalies are excluded in so-called sound workows [Aal97a, Aal97b]. Up to now, we established an analogy to the anomalies of database theory. Next, we will give an analogy to the concept of functional depency. Here, two classical concepts of Petri net theory come in: liveness and boundedness (cf. [Pet81, Rei85]). Informally, a Petri net is live if every transition can occur again whatever happened before a Petri net is bounded if the number of tokensoneach place is bounded by somenumber. Now, these concepts can be used to characterize sound workows: Aworkow is sound, if and only if the Petri net exted by one transition between and as indicated in Fig. 4 is live and bounded [Aal97a, Aal97b]. workflow net Figure 4: Exted workow net Note that in a sound workow it is still possible that a document occurstwice on the same place (technically speaking, boundedness does not imply 1-safeness). From a practical point of view this is debatable. Therefore, we introduce a slightly stronger concept of soundness: A workow net is strong sound, if and only if the exted workow net is live and 1-safe. In addition to the practical motivation that we do not want duplicate documents, we will give a theoretical justication for this stronger requirement at the of the next section. In analogy to Codd's theory, the above workow theory helps to identify ill-designed workows. The soundness criterion is motivated by anomalies in a similar way Codd motivates his normal 3

forms. Liveness and boundedness are almost as simple as Codd's functional depencies. 4 Workow construct theory The workow theory as presented in the previous section helps to identify ill-designed workows. But, it is only possible to check for soundness at the of the design process there are no guidelines for designing sound workows. Here, we will briey present another part of workow theory which tackles this problem. One way to enforce the design of good workows is to construct workows by so-called routing constructs. The Workow Management Coalition (WfMC) proposes four routing constructs: sequential, alternative, parallel, and iterated execution. These routing constructs can be rephrased in terms of the transformation rules shown in Fig. 5. Van der Aalst [Aal97b] has shown that each sequential execution alternative execution parallel execution iterated execution Figure 5: Routing constructs and transformation rules transformation 1 preserves soundness of a workow. In particular, any workow net constructed by the above transformation rules from the workow net shown in Fig. 6 is sound indeed, it is strongly sound. Figure 6: Workow for ing the construction The problem, however, is that the routing constructs of the WfMC are rather restrictive. Therefore, we need a theory to design additional routing constructs. Most interesting, this theory has already been proposed by Valette [Val79] at a time when workow was not an issue! When we represent a routing construct by a transformation rule as shown above, his result basically says: We can use any strongly sound workow net as a workow construct i.e. as right-hand side of the transformation rule. The above condition even guarantees that the workows built from the new routing constructs are strongly sound. What is more, it is even a necessary and sucient condition for routing constructs which guarantee strong sound workows. This exact correspondence is a theoretical justication for strong soundness. 1 Note that we have slightly changed the rule for iteration. 4

5 Conclusion The technical contribution of this paper is rather modest: We have proposed a slightly modied soundness criterion for workow nets. The main purpose of this paper is to give a avour of a future workow theory based on the ideas of van der Aalst. Though it might appear trivial from a theoreticians point of view, it is just the bit of theory needed. As a justication we have compared his approach to Codd's doubtless successful database theory. We do not claim that the development of this workow theory is nished but we claim that future workow theory will consist of many results similar to those mentioned in this paper. Slight variations, e.g. strong soundness instead of soundness, may turn out to be more suitable even this variation has a counterpart in Codd's theory: 3NF as dened by Codd has later been replaced by BCNF [Dat90]. What is more, we have given a new interpretation to Valette's [Val79] results: A criterion for dening new workow constructs. We believe that more old Petri net results have a workow interpretation and need just to be rediscovered and given a new interpretation. There is only little need for new Petri net theory, but a great need for Petri net archaeology. Acknowledgments Iwould like to thank Wil van der Aalst for his tutorials on workow, a day of discussion on his approach, and his comments on a preliminary version of this paper. Iwould also like to thank those theoreticians who argued that Wil's approach is no theory their arguments inspired me to think of a striking analogy and to write this paper. Moreover, many thanks to Wolfgang Reisig and to my colleagues Rolf Walter, Sibylle Peuker, Tobias Vesper, Hagen Volzer, and Michael Weber who gave helpful hints for improving the presentation of this paper. References [Aal97a] W.M.P. van der Aalst. Exploring the process dimension of workow management. Computing Science Reports 97/13, Eindhoven University of Technology, September 1997. [Aal97b] W.M.P. van der Aalst. Verication of workow nets. In P. Azema and G. Balbo, editors, Application and Theory of Petri Nets, LNCS 1248, pages 407{426. Springer- Verlag, June 1997. [Aal98] W.M.P. van der Aalst. Finding errors in the design of a workow process: APetri net approach. Unpublished manuscript, received January 1998. [Cod90] E.F. Codd. The Relational Model for Database Management, Version 2. Addison- Wesley, 1990. [Dat90] C.J. Date. An Introduction to Database Systems, Volume I. The Systems Programming Series. Addison-Wesley, 1990. [Jab95] Stefan Jablonski. Workow-Management-Systeme: Modellierung und Architektur. Thomson Publishers, 1995. [Pet81] James L. Peterson. Petri Net Theory And The Modeling of Systems. Prentice-Hall, 1981. [Rei85] Wolfgang Reisig. Petri Nets, EATCS Monographs on Theoretical Computer Science 4. Springer-Verlag, 1985. [Val79] Robert Valette. Analysis of Petri nets by stepwise renements. Journal of Computer and System Sciences, 18:35{46, 1979. 5