Diagnostic Information for Control-Flow Analysis of Workflow Graphs (aka Free-Choice Workflow Nets)
|
|
- Homer Harrell
- 5 years ago
- Views:
Transcription
1 Diagnostic Information for Control-Flow Analysis of Workflow Graphs (aka Free-Choice Workflow Nets) Cédric Favre(1,2), Hagen Völzer(1), Peter Müller(2) (1) IBM Research - Zurich (2) ETH Zurich 1
2 Outline Problem - Control-flow analysis of business process models Contribution - Graphical in-model diagnostic information for control-flow errors Conclusion and Outlook 2
3 A Business Process Model (1/2) 3
4 A Business Process Model (2/2) Usage of a business process model - Execution on a process engine - Simulation - Documentation Up to 50% of the processes contain a control-flow error 4
5 Workflow Graph and Corresponding Free-Choice Workflow Net Workflow graph - control flow graph (flow chart) with unique source and sink - concurrent fork and join (besides alternative choice and merge) - maps the core of process languages, but not all 5
6 Control-Flow Errors / Soundness (Local) Deadlock - A token blocked in the graph XOR-split XOR-join Lack of synchronization - Two tokens on one edge - aka unsafeness AND-split AND-join Sound - no deadlock and - no lack of synchronization - Soundness guarantees that the workflow terminates with unique token on the sink (when loops are terminating) 6
7 Simplest Examples Sound Unsound 7
8 A Complex Sound Example 8
9 Workflow Graph and Corresponding Free-Choice Workflow Net Workflow graph is sound iff connected version of corresponding Petri net is - safe = no two tokens on the same place and - live = from each reachable marking, for each transition t: a marking can be reached that enables t 9
10 Prior Work Approaches based on free-choice Petri nets theory - polynomial time complexity (!) - no diagnostic information Approaches based on state space exploration - state space explosion (can be successfully addressed) - provide a counterexample trace as diagnostic information detours/build up not contributing to error (esp. DFS) arbitrary interleaving difficult to visualize in model in case of loops Fahland, Lohmann [12]: heuristics can reduce size of trace by a factor of 10 not all modelers have a technical background 10
11 Anti-Patterns Modeling manuals show anti-patterns in terms of instructive examples 11
12 Problem Can we build graphical diagnostic information such that: - every error pattern implies unsoundness - unsoundness implies existence one of the error pattern - capture the essence of these simple examples 12
13 Outline Problem Contribution Conclusion and Outlook 13
14 Contribution New characterization of soundness in terms of offending graph-structures and Polynomial-time algorithm that - returns one of the graph structures for each unsound graph Experimental evaluation 14
15 Overview Error Patterns Path to sink with AND-XOR handle Empty siphon DQ-siphon with XOR-AND handle 15
16 Handle A handle on a subgraph G is a directed path from an element of G to another element b of G that is disjoint from G apart from start and end G G AND-XOR handle refers to the logic of start and end node 16
17 Error Patterns (1/3) Path from some node to sink with AND/XOR-handle 17
18 Siphon A subgraph G such that each transition that adds a token to G also takes a token from G - with an XOR node in G, all incoming edges belong to G - with an AND node - at least one incoming edge An empty siphon will remain empty 18
19 Error Patterns (2/3) empty A siphon that does not contain the source 19
20 DQ Siphon A DQ-siphon is a siphon G such that no AND-split has more than one outgoing edge in G the number of tokens is always 1 or less Not a DQ-siphon 20
21 Error Patterns (3/3) A DQ siphon with an XOR/AND handle 21
22 Structural characterization of soundness A workflow graph is unsound iff one of the following statements holds: 1. There exists a siphon that is not initially marked 2. There exists a DQ siphon with an XOR/AND handle 3. There exists a simple path to the sink with an AND/XOR handle 22
23 Strongly Related to and Making Use of Esparza/Silva [9] characterization: - A strongly connected free-choice net is safe and live iff none of the following exist: an empty siphon a circuit with a T/P handle a circuit with a P/T handle without bridges 23
24 Contribution New characterization of soundness in terms of offending graph-structures and Polynomial-time algorithm that - returns one of the graph structures for each unsound graph Experimental evaluation 24
25 Known Algorithm - Based on the Rank Theorem Check for empty siphons unsound Decomposition into S-components unsound Check rank equation unsound sound 25
26 New Algorithm Check for empty siphons empty Decomposition into S-components Check rank equation sound unsound Reduce & decompose into S-components 26
27 Decomposition into S-Components A sound graph is decomposable into sequential components Each S-component has always exactly one token Decomposition can be computed in polynomial time 27
28 Another Sound Example 28
29 A Minimal Siphon Generates an S-component (in a Sound Graph) A minimal siphon that is not an S-component contains: or From which we obtain an error pattern: 29
30 New Algorithm Check for empty siphons empty Decomposition into S-components Check rank equation sound unsound Reduce & decompose into S-components 30
31 New Algorithm Check for empty siphons empty Decomposition into S-components Check rank equation sound unsound Reduce & decompose into S-components 31
32 Lucky Decomposition Failure of an Unsound Graph 32
33 Unlucky Decomposition Success of the Same Graph 33
34 A Reduction Step 34
35 Decomposition Failure on Reduced Graph Decomposition failure Error pattern generated Error pattern on original graph 35
36 Algorithm - Conclusion Prove that reduction eventually leads to a graph that is not decomposable Prove that error pattern in reduced graph are valid in the original (unreduced) graph Soundness of N can be decided in time O( P 2 * (max( P, T )3) such that the algorithm returns one of the structural error patterns in case N is unsound. 36
37 Contribution New Characterization of soundness in terms of offending graph-structures and Polynomial-time algorithm such that Experimental evaluation 37
38 Experimental Evaluation - Data Set (703 unique original) business process models from the financial domain - Average number of nodes between 89 and 107 per library - Several large nets with up to 627 nodes - 47 nets from library B3 have 200 or more nodes. - Some models have state spaces with more than 1 million states - We validated the correctness of the results with other model checkers 38
39 Results Fast enough to support demanding use cases - checking while modeling - checking while loading entire libraries into workspace 2-6 times faster than some state space exploration approaches - but those were already fast enough for most use cases 39
40 Visualization in Modeling Tool 40
41 Outline Problem Contribution Conclusion and Outlook 41
42 Conclusion Graphical in-model diagnostic information can be obtained in polynomial time - avoiding some problems of traces Limited expressiveness of free-choice (e.g. no races) allows for polynomial-time verification - sufficient for data set in case study - still applicable in more expressive BPMN models Can be combined with SESE decomposition for further error localization (and speed-up) 42
43 SESE Decomposition Can be done in linear time Soundness is compositional wrt SESE blocks Errors can be localized to a SESE block 43
44 What is still missing User study Soundness under data (except one first paper) Control-flow errors dues to message/event passing across processes (orthogonal) 44
Analysis on Demand: Instantaneous Soundness Checking of Industrial Business Process Models
Analysis on Demand: Instantaneous Soundness Checking of Industrial Business Process Models Dirk Fahland a, Cédric Favre b, Jana Koehler 1c, Niels Lohmann d, Hagen Völzer b, Karsten Wolf d a Humboldt-Universität
More informationThe Difficulty of Replacing an Inclusive OR-Join
The Difficulty of Replacing an Inclusive OR-Join Cédric Favre and Hagen Völzer Translating an inclusive OR-join Identify customer New customer Existing customer Create customer record Retrieve Customer
More informationFaster Or-join Enactment for BPMN 2.0
Faster Or-join Enactment for BPMN 2.0 Hagen Völzer, IBM Research Zurich Joint work with Beat Gfeller and Gunnar Wilmsmann Contribution: BPMN Diagram Enactment Or-join Tokens define the control state Execution
More informationDynamic Skipping and Blocking, Dead Path Elimination for Cyclic Workflows, and a Local Semantics for Inclusive Gateways
Dynamic Skipping and Blocking, Dead Path Elimination for Cyclic Workflows, and a Local Semantics for Inclusive Gateways Dirk Fahland a, Hagen Völzer b a Eindhoven University of Technology, The Netherlands
More informationPetri Nets ee249 Fall 2000
Petri Nets ee249 Fall 2000 Marco Sgroi Most slides borrowed from Luciano Lavagno s lecture ee249 (1998) 1 Models Of Computation for reactive systems Main MOCs: Communicating Finite State Machines Dataflow
More informationOutline. Petri nets. Introduction Examples Properties Analysis techniques. 1 EE249Fall04
Outline Petri nets Introduction Examples Properties Analysis techniques 1 Petri Nets (PNs) Model introduced by C.A. Petri in 1962 Ph.D. Thesis: Communication with Automata Applications: distributed computing,
More informationRZ 3884 (# ZUR ) 10/17/2014 (Revised May 2015) Computer Sciences/Mathematics
RZ 3884 (# ZUR1410-050) 10/17/2014 (Revised May 2015) Computer Sciences/Mathematics 18 pages Research Report The Complexity of Deadline Analysis for Workflow Graphs with a Single Resource (Revised Version)
More information14 More Graphs: Euler Tours and Hamilton Cycles
14 More Graphs: Euler Tours and Hamilton Cycles 14.1 Degrees The degree of a vertex is the number of edges coming out of it. The following is sometimes called the First Theorem of Graph Theory : Lemma
More informationResearch Collection. Formal background and algorithms. Other Conference Item. ETH Library. Author(s): Biere, Armin. Publication Date: 2001
Research Collection Other Conference Item Formal background and algorithms Author(s): Biere, Armin Publication Date: 2001 Permanent Link: https://doi.org/10.3929/ethz-a-004239730 Rights / License: In Copyright
More informationOn Application of Structural Decomposition for Process Model Abstraction. Artem Polyvyanyy Sergey Smirnov Mathias Weske
On Application of Structural Decomposition for Process Model Abstraction Artem Polyvyanyy Sergey Smirnov Mathias Weske BPSC 2009 24 March 2009 Motivation 2 Research project with AOK Brandenburg Goal: detailed
More informationWorkflow : Patterns and Specifications
Workflow : Patterns and Specifications Seminar Presentation by Ahana Pradhan Under the guidance of Prof. Rushikesh K. Joshi Department of Computer Science and Engineering Indian Institute of Technology,
More informationWEEK 5 - APPLICATION OF PETRI NETS. 4.4 Producers-consumers problem with priority
4.4 Producers-consumers problem with priority The net shown in Fig. 27 represents a producers-consumers system with priority, i.e., consumer A has priority over consumer B in the sense that A can consume
More informationANALYZING PROCESS MODELS USING GRAPH REDUCTION TECHNIQUES
NLYZING PROCESS MODELS USING GRPH REDUCTION TECHNIQUES WSIM SDIQ ND MRI E. ORLOWSK Distributed Systems Technology Centre Department of Computer Science & Electrical Engineering The University of Queensland,
More informationEE249 Discussion Petri Nets: Properties, Analysis and Applications - T. Murata. Chang-Ching Wu 10/9/2007
EE249 Discussion Petri Nets: Properties, Analysis and Applications - T. Murata Chang-Ching Wu 10/9/2007 What are Petri Nets A graphical & modeling tool. Describe systems that are concurrent, asynchronous,
More informationReachability Analysis
Reachability Analysis prof.dr.ir. Wil van der Aalst www.vdaalst.com Strong point of Petri nets Math. foundation Graphical notation Compactness Today s lecture Concurrency, locality Analysis techniques
More informationFrom Task Graphs to Petri Nets
From Task Graphs to Petri Nets Anthony Spiteri Staines Department of Computer Inf. Systems, Faculty of ICT, University of Malta Abstract This paper describes the similarities between task graphs and Petri
More informationProcess Modelling using Petri Nets
Process Modelling using Petri Nets Katalina Grigorova Abstract: This paper discusses the reasons, which impose Petri nets as a conceptual standard for modelling and analysis of workflow. Petri nets notation
More informationDynamic Skipping and Blocking and Dead Path Elimination for Cyclic Workflows
Dynamic Skipping and locking and Dead Path Elimination for Cyclic Workflows Dirk Fahland 1 and Hagen Völzer 2 1 Eindhoven University of Technology, The Netherlands 2 IM Research Zurich, Switzerland bstract.
More informationFrom Business Process Models to Process-oriented Software Systems: The BPMN to BPEL Way
From Business Process Models to Process-oriented Software Systems: The BPMN to BPEL Way Chun Ouyang 1, Marlon Dumas 1, Wil M.P. van der Aalst 2,1, and Arthur H.M. ter Hofstede 1 1 Faculty of Information
More informationEmbedded Systems 7 BF - ES - 1 -
Embedded Systems 7-1 - Production system A modelbased realtime faultdiagnosis system for technical processes Ch. Steger, R. Weiss - 2 - Sprout Counter Flow Pipeline-Processor Based on a stream of data
More informationManaging test suites for services
Managing test suites for services Kathrin Kaschner Universität Rostock, Institut für Informatik, 18051 Rostock, Germany kathrin.kaschner@uni-rostock.de Abstract. When developing an existing service further,
More informationBinary Decision Diagrams and Symbolic Model Checking
Binary Decision Diagrams and Symbolic Model Checking Randy Bryant Ed Clarke Ken McMillan Allen Emerson CMU CMU Cadence U Texas http://www.cs.cmu.edu/~bryant Binary Decision Diagrams Restricted Form of
More informationLezione 14 Model Transformations for BP Analysis and Execution
Lezione 14 Model Transformations for BP Analysis and Execution Ingegneria dei Processi Aziendali Modulo 1 - Servizi Web Unità didattica 1 Protocolli Web Ernesto Damiani 1 Università di Milano 1 Business
More informationAn Algebraic Method for Analysing Control Flow of BPMN Models
An Algebraic Method for Analysing Control Flow of BPMN Models http://dx.doi.org/10.3991/ijes.v3i3.4862 Outman El Hichami 1, Mohamed Naoum 1, Mohammed Al Achhab 2, Ismail Berrada 3 and Badr Eddine El Mohajir
More informationAssignment # 4 Selected Solutions
Assignment # 4 Selected Solutions Problem 2.3.3 Let G be a connected graph which is not a tree (did you notice this is redundant?) and let C be a cycle in G. Prove that the complement of any spanning tree
More informationCHAPTER 5 GENERATING TEST SCENARIOS AND TEST CASES FROM AN EVENT-FLOW MODEL
CHAPTER 5 GENERATING TEST SCENARIOS AND TEST CASES FROM AN EVENT-FLOW MODEL 5.1 INTRODUCTION The survey presented in Chapter 1 has shown that Model based testing approach for automatic generation of test
More informationQualitative Analysis of WorkFlow nets using Linear Logic: Soundness Verification
Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Qualitative Analysis of WorkFlow nets using Linear Logic: Soundness Verification
More informationBusiness Processes Modelling MPB (6 cfu, 295AA)
Business Processes Modelling MPB (6 cfu, 295AA) Roberto Bruni http://www.di.unipi.it/~bruni 13 - Workflow nets!1 Object We study some special kind of Petri nets, that are suitable models of workflows Ch.4.4
More informationINF672 Protocol Safety and Verification. Karthik Bhargavan Xavier Rival Thomas Clausen
INF672 Protocol Safety and Verication Karthik Bhargavan Xavier Rival Thomas Clausen 1 Course Outline Lecture 1 [Today, Sep 15] Introduction, Motivating Examples Lectures 2-4 [Sep 22,29, Oct 6] Network
More informationFundamental Properties of Graphs
Chapter three In many real-life situations we need to know how robust a graph that represents a certain network is, how edges or vertices can be removed without completely destroying the overall connectivity,
More informationBusiness Process Modeling. Version 25/10/2012
Business Process Modeling Version 25/10/2012 Maurizio Morisio, Marco Torchiano, 2012, 2013 3 BP Aspects Process flow Process modeling UML Activity Diagrams BPMN Information Conceptual modeling UML Class
More informationFormal Process Modelling
Formal Process Modelling Petri Net Behaviour Net Model Event-driven Process Chains Formalisation Håvard D. Jørgensen Materiale fra: Jon Atle Gulla, NTNU Folker den Braber, SINTEF Anders Moen, Norsk Regnesentral
More informationEmbedded Systems 7. Models of computation for embedded systems
Embedded Systems 7 - - Models of computation for embedded systems Communication/ local computations Communicating finite state machines Data flow model Computational graphs Von Neumann model Discrete event
More information4/6/2011. Model Checking. Encoding test specifications. Model Checking. Encoding test specifications. Model Checking CS 4271
Mel Checking LTL Property System Mel Mel Checking CS 4271 Mel Checking OR Abhik Roychoudhury http://www.comp.nus.edu.sg/~abhik Yes No, with Counter-example trace 2 Recap: Mel Checking for mel-based testing
More informationPart II Workflow discovery algorithms
Process Mining Part II Workflow discovery algorithms Induction of Control-Flow Graphs α-algorithm Heuristic Miner Fuzzy Miner Outline Part I Introduction to Process Mining Context, motivation and goal
More informationBidimensional Process Discovery for Mining BPMN Models
Bidimensional Process Discovery for Mining BPMN Models DeMiMoP 2014, Haifa Eindhoven Jochen De Weerdt, KU Leuven (@jochendw) Seppe vanden Broucke, KU Leuven (@macuyiko) (presenter) Filip Caron, KU Leuven
More informationDetecting, Understanding, and Fixing Control-Flow Errors in Business Process Models
Research Collection Doctoral Thesis Detecting, Understanding, and Fixing Control-Flow Errors in Business Process Models Author(s): Favre, Cédric Publication Date: 2014 Permanent Link: https://doi.org/10.3929/ethz-a-010421900
More informationJoint Entity Resolution
Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute
More informationFinding Strongly Connected Components
Yufei Tao ITEE University of Queensland We just can t get enough of the beautiful algorithm of DFS! In this lecture, we will use it to solve a problem finding strongly connected components that seems to
More informationCSE 417 Branch & Bound (pt 4) Branch & Bound
CSE 417 Branch & Bound (pt 4) Branch & Bound Reminders > HW8 due today > HW9 will be posted tomorrow start early program will be slow, so debugging will be slow... Review of previous lectures > Complexity
More informationStrongly connected: A directed graph is strongly connected if every pair of vertices are reachable from each other.
Directed Graph In a directed graph, each edge (u, v) has a direction u v. Thus (u, v) (v, u). Directed graph is useful to model many practical problems (such as one-way road in traffic network, and asymmetric
More informationSimplified Computa/on and Generaliza/on of the Refined Process Structure Tree
The 7 th Interna/onal Workshop on Web Services and Formal Methods (WS- FM 2010) Simplified Computa/on and Generaliza/on of the Refined Process Structure Tree Artem Polyvyanyy, Jussi Vanhatalo, and Hagen
More informationApplication of an Exact Transversal Hypergraph in Selection of SM-Components
Application of an Exact Transversal Hypergraph in Selection of SM-Components Łukasz Stefanowicz, Marian Adamski, and Remigiusz Wisniewski University of Zielona Góra, Institute of Computer Engineering and
More informationState Machine Diagrams
State Machine Diagrams Introduction A state machine diagram, models the dynamic aspects of the system by showing the flow of control from state to state for a particular class. 2 Introduction Whereas an
More informationEECS 144/244: Fundamental Algorithms for System Modeling, Analysis, and Optimization
EECS 144/244: Fundamental Algorithms for System Modeling, Analysis, and Optimization Dataflow Lecture: SDF, Kahn Process Networks Stavros Tripakis University of California, Berkeley Stavros Tripakis: EECS
More informationCSE 417 Network Flows (pt 2) Modeling with Max Flow
CSE 47 Network Flows (pt 2) Modeling with Max Flow Reminders > HW6 is due on Friday start early may take time to figure out the sub-structure Review of last lecture > Defined the maximum flow problem find
More informationGraph Algorithms. Tours in Graphs. Graph Algorithms
Graph Algorithms Tours in Graphs Graph Algorithms Special Paths and Cycles in Graphs Euler Path: A path that traverses all the edges of the graph exactly once. Euler Cycle: A cycle that traverses all the
More informationJENAER SCHRIFTEN MATHEMATIK UND INFORMATIK
FRIEDRICH-SCHILLER- UNIVERSITÄT JENA JENAER SCHRIFTEN ZUR MATHEMATIK UND INFORMATIK Eingang: 10.04.2014 Math/Inf/02/2014 Als Manuskript gedruckt Determination of a Correct Execution Semantics for Inclusive
More informationAutomata-Theoretic LTL Model Checking. Emptiness of Büchi Automata
Automata-Theoretic LTL Model Checking Graph Algorithms for Software Model Checking (based on Arie Gurfinkel s csc2108 project) Automata-Theoretic LTL Model Checking p.1 Emptiness of Büchi Automata An automation
More informationCSE 417 Network Flows (pt 3) Modeling with Min Cuts
CSE 417 Network Flows (pt 3) Modeling with Min Cuts Reminders > HW6 is due on Friday start early bug fixed on line 33 of OptimalLineup.java: > change true to false Review of last two lectures > Defined
More informationSemantics of ARIS Model
Semantics of ARIS Model Why is Semantics Important? Jon Atle Gulla An analysis of the ARIS ing language with respect to - conceptual foundation and - formal properties Green, P. and M. Rosemann: An Ontological
More informationBusiness Process Modeling. Version /10/2017
Business Process Modeling Version 1.2.1-16/10/2017 Maurizio Morisio, Marco Torchiano, 2012-2017 3 BP Aspects Process flow Process modeling UML Activity Diagrams BPMN Information Conceptual modeling UML
More informationTimed Automata: Semantics, Algorithms and Tools
Timed Automata: Semantics, Algorithms and Tools Johan Bengtsson and Wang Yi Uppsala University Email: {johanb,yi}@it.uu.se Abstract. This chapter is to provide a tutorial and pointers to results and related
More informationSound Recoveries of Structural Workflows with Synchronization
Sound Recoveries of Structural Workflows with Synchronization Piotr Chrz astowski-wachtel, Pawe l Go l ab, and Bartosz Lewiński Institute of Informatics, Warsaw University, Banacha 2, PL 02-097 Warszawa,
More informationPetri Nets ~------~ R-ES-O---N-A-N-C-E-I--se-p-te-m--be-r Applications.
Petri Nets 2. Applications Y Narahari Y Narahari is currently an Associate Professor of Computer Science and Automation at the Indian Institute of Science, Bangalore. His research interests are broadly
More informationJOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at http://www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2003 Vol. 2, No. 6, November-December 2003 UML 2 Activity and Action Models Part 3:
More informationEfficient test case generation for validation of UML activity diagrams
Des Autom Embed Syst (2010) 14: 105 130 DOI 10.1007/s10617-010-9052-4 Efficient test case generation for validation of UML activity diagrams Mingsong Chen Prabhat Mishra Dhrubajyoti Kalita Received: 20
More informationBusiness Process Management Seminar 2007/ Oktober 2007
Business Process Management Seminar 2007/2008 22. Oktober 2007 Process 2 Today Presentation of topics Deadline 29.10.2007 9:00 Rank up to 3 topics - send to hagen.overdick@hpi.uni-potsdam.de 3.12.2007
More informationStrongly Connected Components. Andreas Klappenecker
Strongly Connected Components Andreas Klappenecker Undirected Graphs An undirected graph that is not connected decomposes into several connected components. Finding the connected components is easily solved
More informationNetwork monitoring: detecting node failures
Network monitoring: detecting node failures 1 Monitoring failures in (communication) DS A major activity in DS consists of monitoring whether all the system components work properly To our scopes, we will
More informationsflow: Towards Resource-Efficient and Agile Service Federation in Service Overlay Networks
sflow: Towards Resource-Efficient and Agile Service Federation in Service Overlay Networks Mea Wang, Baochun Li, Zongpeng Li Department of Electrical and Computer Engineering University of Toronto {mea,
More informationRuntime Atomicity Analysis of Multi-threaded Programs
Runtime Atomicity Analysis of Multi-threaded Programs Focus is on the paper: Atomizer: A Dynamic Atomicity Checker for Multithreaded Programs by C. Flanagan and S. Freund presented by Sebastian Burckhardt
More informationBusiness Process Modelling with Continuous Validation
Business Process Modelling with Continuous Validation Stefan Kühne 1, Heiko Kern 1, Volker Gruhn 2, and Ralf Laue 2 1 Business Information Systems, University of Leipzig Johannisgasse 26, 04103 Leipzig,
More informationThe UPPAAL Model Checker. Julián Proenza Systems, Robotics and Vision Group. UIB. SPAIN
The UPPAAL Model Checker Julián Proenza Systems, Robotics and Vision Group. UIB. SPAIN The aim of this presentation Introduce the basic concepts of model checking from a practical perspective Describe
More informationGeneration of Interactive Questionnaires Using YAWL-based Workflow Models
Management Studies, December 2015, Vol. 3, No. 11-12, 273-280 doi: 10.17265/2328-2185/2015.1112.002 D DAVID PUBLISHING Generation of Interactive Questionnaires Using YAWL-based Workflow Models Raimond
More informationParallel Discrete Event Simulation
Parallel Discrete Event Simulation Dr.N.Sairam & Dr.R.Seethalakshmi School of Computing, SASTRA Univeristy, Thanjavur-613401. Joint Initiative of IITs and IISc Funded by MHRD Page 1 of 8 Contents 1. Parallel
More informationProcess Mining Discovering Workflow Models from Event-Based Data
Process Mining Discovering Workflow Models from Event-Based Data A.J.M.M. Weijters W.M.P van der Aalst Eindhoven University of Technology, P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands, +31 40 2473857/2290
More informationBPMN2BPEL transformation with Fujaba - a Case Study
BPMN2BPEL transformation with Fujaba - a Case Study Ruben Jubeh SE, Kassel University Wilhelmshöher Allee 73 34121 Kassel ruben.jubeh@uni-kassel.de ABSTRACT We have modeled a BPMN to BPEL synthesis transformation
More informationTranslating Unstructured Workflow Processes to Readable BPEL: Theory and Implementation
Translating Unstructured Workflow Processes to Readable BPEL: Theory and Implementation Wil M.P. van der Aalst 1,2 and Kristian Bisgaard Lassen 2 1 Department of Computer Science, Eindhoven University
More informationTreewidth and graph minors
Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under
More informationPropagate the Right Thing: How Preferences Can Speed-Up Constraint Solving
Propagate the Right Thing: How Preferences Can Speed-Up Constraint Solving Christian Bessiere Anais Fabre* LIRMM-CNRS (UMR 5506) 161, rue Ada F-34392 Montpellier Cedex 5 (bessiere,fabre}@lirmm.fr Ulrich
More informationThe ComFoRT Reasoning Framework
Pittsburgh, PA 15213-3890 The ComFoRT Reasoning Framework Sagar Chaki James Ivers Natasha Sharygina Kurt Wallnau Predictable Assembly from Certifiable Components Enable the development of software systems
More informationUsing Petri Nets To Test Concurrent Behavior Of Web Applications
Using Petri Nets To Test Concurrent Behavior Of Web Applications Sunitha Thummala & Jeff Offutt Presented by Omar Al-Debagy Outline Introduction Scope of the Research Paper Petri Nets Modelling Web Applications
More informationByzantine Consensus in Directed Graphs
Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory
More informationProcess Model Consistency Measurement
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 7, Issue 6 (Nov. - Dec. 2012), PP 40-44 Process Model Consistency Measurement Sukanth Sistla CSE Department, JNTUniversity,
More informationLecture 4: Walks, Trails, Paths and Connectivity
Lecture 4: Walks, Trails, Paths and Connectivity Rosa Orellana Math 38 April 6, 2015 Graph Decompositions Def: A decomposition of a graph is a list of subgraphs such that each edge appears in exactly one
More informationAn Introduction to Modular Process Nets
An Introduction to Modular Process Nets Dietmar Wikarski 1 TR-96-019 April 1996 1. On leave from Fraunhofer Institute for Software Engineering and Systems Engineering (ISST) Berlin, Germany An Introduction
More informationOn the transformation of Petri nets into BPMN models
UNIVERSITY OF TARTU Institute of Computer Science Computer Science Curriculum Vostan Azatyan On the transformation of Petri nets into BPMN models Master s Thesis (30 ECTS) Supervisor: Luciano García-Bañuelos,
More informationNP-Completeness. Algorithms
NP-Completeness Algorithms The NP-Completeness Theory Objective: Identify a class of problems that are hard to solve. Exponential time is hard. Polynomial time is easy. Why: Do not try to find efficient
More informationOpleiding Informatica & Economie
Opleiding Informatica & Economie Analysis of BPMN collaboration diagrams using Petri nets Vijanti Ramautar - 1559060 Supervisors: Dr. H.C.M. Kleijn & Drs. P.M. Kwantes BACHELOR THESIS Leiden Institute
More informationEuler s formula n e + f = 2 and Platonic solids
Euler s formula n e + f = and Platonic solids Euler s formula n e + f = and Platonic solids spherical projection makes these planar graphs Euler s formula n e + f = and Platonic solids spherical projection
More informationLecture 3: Graphs and flows
Chapter 3 Lecture 3: Graphs and flows Graphs: a useful combinatorial structure. Definitions: graph, directed and undirected graph, edge as ordered pair, path, cycle, connected graph, strongly connected
More informationEXTENDED DISTRIBUTED UML-BASED PROTOCOL SYNTHESIS METHOD
EXTENDED DISTRIBUTED UML-BASED PROTOCOL SYNTHESIS METHOD Jehad Al Dallal Department of Information Science, Kuwait University, Kuwait ABSTRACT Synthesizing specifications for real time applications that
More informationEindhoven University of Technology MASTER. Translation of process modeling languages. Vijverberg, W.M. Award date: Link to publication
Eindhoven University of Technology MASTER Translation of process modeling languages Vijverberg, W.M. Award date: 2006 Link to publication Disclaimer This document contains a student thesis (bachelor's
More information20b -Advanced-DFA. J. L. Peterson, "Petri Nets," Computing Surveys, 9 (3), September 1977, pp
State Propagation Reading assignment J. L. Peterson, "Petri Nets," Computing Surveys, 9 (3), September 1977, pp. 223-252. Sections 1-4 For reference only M. Pezzè, R. N. Taylor and M. Young, Graph Models
More informationPreserving correctness during business process model configuration
DOI 10.1007/s00165-009-0112-0 The Author(s) 2009. This article is published with open access at Springerlink.com Formal Aspects of Computing (2010) 22: 459 482 Formal Aspects of Computing Preserving correctness
More informationPage # 20b -Advanced-DFA. Reading assignment. State Propagation. GEN and KILL sets. Data Flow Analysis
b -Advanced-DFA Reading assignment J. L. Peterson, "Petri Nets," Computing Surveys, 9 (3), September 977, pp. 3-5. Sections -4 State Propagation For reference only M. Pezzè, R. N. Taylor and M. Young,
More informationCSE 101. Algorithm Design and Analysis Miles Jones and Russell Impagliazzo Miles Office 4208 CSE Building
CSE 101 Algorithm Design and Analysis Miles Jones and Russell Impagliazzo mej016@eng.ucsd.edu russell@cs.ucsd.edu Miles Office 4208 CSE Building Russell s Office: 4248 CSE Building procedure DFS(G) cc
More informationBusiness-Driven Software Engineering Lecture 5 Business Process Model and Notation
Business-Driven Software Engineering Lecture 5 Business Process Model and Notation Jochen Küster jku@zurich.ibm.com Agenda BPMN Introduction BPMN Overview BPMN Advanced Concepts Introduction to Syntax
More informationDeadlock Avoidance For Flexible Manufacturing Systems With Choices Based On Digraph Circuit Analysis
Deadlock Avoidance For Flexible Manufacturing Systems With Choices Based On Digraph Circuit Analysis Wenle Zhang and Robert P. Judd School of Electrical Engineering and Computer Science Ohio University
More informationAnalysis of BPMN Models
Analysis of BPMN Models Addis Gebremichael addisalemayehu.gebremichael@student.uantwerpen.be Abstract The Business Process Modeling Notation (BPMN) is a standard notation for capturing business processes,
More informationIntroduction to the Case- Study: A Model-Checker
Real stuff! Introduction to the Case- Study: A Model-Checker Alexandre David 1.2.05 http://www.cs.aau.dk/~adavid/teaching/mvp-08/ 1 Classification of Problems Computation is known in advance can divide
More informationFor example, in an assembly sub-floor technicians engaged in making a product,
Chapter 2 Survey This chapter surveys basic workflow modeling features, various workflow modeling techniques and verification of workflow management systems. We review some of the expected features of
More informationAlgorithmic Verification. Algorithmic Verification. Model checking. Algorithmic verification. The software crisis (and hardware as well)
Algorithmic Verification The software crisis (and hardware as well) Algorithmic Verification Comp4151 Lecture 1-B Ansgar Fehnker Computer become more powerful (Moore s law) The quality of programs cannot
More informationCS612 Algorithms for Electronic Design Automation
CS612 Algorithms for Electronic Design Automation Lecture 8 Network Flow Based Modeling 1 Flow Network Definition Given a directed graph G = (V, E): Each edge (u, v) has capacity c(u,v) 0 Each edge (u,
More informationBOOLEAN FUNCTIONS Theory, Algorithms, and Applications
BOOLEAN FUNCTIONS Theory, Algorithms, and Applications Yves CRAMA and Peter L. HAMMER with contributions by Claude Benzaken, Endre Boros, Nadia Brauner, Martin C. Golumbic, Vladimir Gurvich, Lisa Hellerstein,
More informationConstraint Programming. Global Constraints. Amira Zaki Prof. Dr. Thom Frühwirth. University of Ulm WS 2012/2013
Global Constraints Amira Zaki Prof. Dr. Thom Frühwirth University of Ulm WS 2012/2013 Amira Zaki & Thom Frühwirth University of Ulm Page 1 WS 2012/2013 Overview Classes of Constraints Global Constraints
More informationSelf Stabilization. CS553 Distributed Algorithms Prof. Ajay Kshemkalyani. by Islam Ismailov & Mohamed M. Ali
Self Stabilization CS553 Distributed Algorithms Prof. Ajay Kshemkalyani by Islam Ismailov & Mohamed M. Ali Introduction There is a possibility for a distributed system to go into an illegitimate state,
More informationFachgebiet Softwaretechnik, Heinz Nixdorf Institut, Universität Paderborn. 2.3 Timed Automata and Real-Time Statecharts
2.3 Timed Automata and Real-Time Statecharts Develop a BOOK RATING APP and win awesome prizes! The creators of the best submissions will be invited to an exclusive party in February
More informationVerifying Concurrent Programs
Verifying Concurrent Programs Daniel Kroening 8 May 1 June 01 Outline Shared-Variable Concurrency Predicate Abstraction for Concurrent Programs Boolean Programs with Bounded Replication Boolean Programs
More information