A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation
Volume 5 Issue 1
Jan.  2018

IEEE/CAA Journal of Automatica Sinica

  • JCR Impact Factor: 6.171, Top 11% (SCI Q1)
    CiteScore: 11.2, Top 5% (Q1)
    Google Scholar h5-index: 51, TOP 8
Turn off MathJax
Article Contents
Mimi Wang, Guanjun Liu, Peihai Zhao, Chungang Yan and Changjun Jiang, "Behavior Consistency Computation for Workflow Nets With Unknown Correspondence," IEEE/CAA J. Autom. Sinica, vol. 5, no. 1, pp. 281-291, Jan. 2018. doi: 10.1109/JAS.2017.7510775
Citation: Mimi Wang, Guanjun Liu, Peihai Zhao, Chungang Yan and Changjun Jiang, "Behavior Consistency Computation for Workflow Nets With Unknown Correspondence," IEEE/CAA J. Autom. Sinica, vol. 5, no. 1, pp. 281-291, Jan. 2018. doi: 10.1109/JAS.2017.7510775

Behavior Consistency Computation for Workflow Nets With Unknown Correspondence

doi: 10.1109/JAS.2017.7510775
Funds:

the National Key R & D Program of China 2017YFB1001804

Shanghai Science and Technology Innovation Action Plan Project 16511100900

the National Natural Science Foundation of China 61572360

More Information
  • Consistency degree calculation is established on the basis of known correspondence, but in real life, the correspondence is generally unknown, so how to calculate consistency of two models under unknown correspondence has become a problem. For this condition, we should analyze unknown correspondence due to the influence of different correspondences. In this paper we obtain the relations of transitions based on event relations using branching processes, and build a behavioral matrix of relations. Based on the permutation of behavioral matrix, we express different correspondences, and define a new formula to compute the maximal consistency degree of two workflow nets. Additionally, this paper utilizes an example to show these definitions, computation as well as the advantages.

     

  • loading
  • [1]
    W. M. P. Van der Aalst, "The application of petri nets to workflow management, " J. Circuits Syst. Comput., vol. 8, no. 1, pp. 21-66, Feb. 1998. doi: 10.1142/S0218126698000043
    [2]
    M. Weidlich, J. Mendling, and M. Weske, "Efficient consistency measurement based on behavioral profiles of process models, " IEEE Trans. Softw. Eng., vol. 37, no. 3, pp. 410-429, May-Jun. 2011. http://dl.acm.org/citation.cfm?id=1991013
    [3]
    M. Dumas, L. Garcéa-Bañuelos, and R. M. Dijkman, "Similarity search of business process models, " Bull. IEEE Comput. Soc. Tech. Comm. Data Eng., vol. 32, no. 3, pp. 23-28, Jan. 2009. https://www.mendeley.com/research-papers/similarity-search-business-process-models/
    [4]
    R. Dijkman, M. Dumas, B. Van Dongen, R. Käärik, and J. Mendling, "Similarity of business process models: Metrics and evaluation, " Inf. Syst., vol. 36, no. 2, pp. 498-516, Apr. 2011. http://www.sciencedirect.com/science/article/pii/S0306437910001006
    [5]
    T. Bauer and P. Dadam, "Efficient distributed workflow management based on variable server assignments, " in Proc. 2000 Int. Conf. Advanced Information Systems Engineering. Berlin, Heidelberg, Germany, 2000, pp. 94-109. doi: 10.1007/3-540-45140-4_8
    [6]
    G. Alonso, C. Mohan, R. Gunthör, D. Agrawal, A. El Abbadi, and M. Kamath, "Exotica/FMQM: a persistent message-based architecture for distributed workflow management, " in Proc. IFIP working Conf. Information Systems Development for Decentralized Organizations. Berlin, Heidelberg, Germany, 1995, pp. 1-18. doi: 10.1007/978-0-387-34871-1_1
    [7]
    P. Muth, D. Wodtke, J. Weissenfels, A. K. Dittrich, and G. Weikum, "From centralized workflow specification to distributed workflow execution, " J. Intell. Manuf. Inf. Syst., vol. 10, no. 2, pp. 159-184, Mar. 1998. doi: 10.1023/A%3A1008608810770
    [8]
    B. Finkbeiner, M. Gieseking, and E. R. Olderog, "Adam:causalitybased synthesis of distributed systems," in Computer Aided Verification, D. Kroening and S. Păsăreanu, Eds. Cham, Germany:Springer, 2015, pp. 433-439. doi: 10.1007/978-3-319-21690-4_25
    [9]
    G. Rull, C. Farré, E. Teniente, and T. Urpí, "Validation of mappings between schemas, " Data Knowl. Eng., vol. 66, no. 3, pp. 414-437, Sep. 2008. http://www.sciencedirect.com/science/article/pii/S0169023X08000578
    [10]
    W. M. P. van der Aalst, Process Mining: Discovery, Conformance and Enhancement of Business Processes. Heidelberg, Germany, Dordrecht, Japan, London, Britain: Springer, 2011. http://www.sciencedirect.com/science/article/pii/S1532046412000974/pdfft?md5=948c4cc8a6d8e8bf4cb8d95555c566cc&pid=1-s2.0-S1532046412000974-main.pdf
    [11]
    M. Weidlich, "Behavioural profiles: a relational approach to behaviour consistency, " Ph. D. dissertation, Potsdam, Univ. Potsdam, Diss., Germany, 2011.
    [12]
    X. W. Fang, M. M. Wang, and S. B. Wu, "A method for security evaluation in cloud computing based on petri behavioral profiles, " in Advances in Intelligent Systems and Computing, Z. Yin, L. Pan, and X. Fang, Eds. Berlin, Heidelberg, Germany: Springer, vol. 212, pp. 587-593, 2013. doi: 10.1007/978-3-642-37502-6_71
    [13]
    X. W. Liu, X. W. Fang, M. M. Wang, and Z. X. Yin, "The behavior trustworthiness analysis methods of composite web services based on process mining, " Appl. Math. Inf. Sci., vol. 7, no. 5, pp. 1985-1992, Sep. 2013. https://www.mendeley.com/research-papers/behavior-trustworthiness-analysis-methods-composite-web-services-based-process-mining/
    [14]
    V. Cheval, V. Cortier, and S. Delaune, "Deciding equivalence-based properties using constraint solving, " Theor. Comput. Sci., vol. 492, pp. 1-39, Jun. 2013. http://www.sciencedirect.com/science/article/pii/S0304397513003009
    [15]
    P. Buchholz, J. Kriege, and D. Scheftelowitsch, "Equivalence and minimization for model checking labeled Markov chains, " in Proc. 9th EAI Int. Conf. Performance Evaluation Methodologies and Tools, Berlin, Germany, 2016, pp. 119-126. http://dl.acm.org/citation.cfm?id=2897421
    [16]
    L. M. F. Fioriti, V. Hashemi, H. Hermanns, and A. Turrini, "Deciding probabilistic automata weak bisimulation: Theory and practice, " Form. Asp. Comput., vol. 28, no. 1, pp. 109-143, Mar. 2016. doi: 10.1007/s00165-016-0356-4
    [17]
    A. Polyvyanyy, A. Armas-Cervantes, M. Dumas, and L. GarcíaBañuelos, "On the expressive power of behavioral profiles, " Form. Asp. Comput., vol. 28, no. 4, pp. 597-613, Jul. 2016. doi: 10.1007/s00165-016-0372-4
    [18]
    M. Weidlich, M. Weske, and J. Mendling, "Change propagation in process models using behavioural profiles, " in Proc. IEEE Int. Conf. Services Computing, 2009. SCC'09., Bangalore, India, 2009, pp. 33-40. http://dl.acm.org/citation.cfm?id=1638092
    [19]
    M. Weidlich, A. Polyvyanyy, N. Desai, J. Mendling, and M. Weske, "Process compliance analysis based on behavioural profiles, " Inf. Syst., vol. 36, no. 7, pp. 1009-1025, Nov. 2011. http://www.sciencedirect.com/science/article/pii/S0306437911000536
    [20]
    S. Smirnov, M. Weidlich, and J. Mendling, "Business process model abstraction based on synthesis from well-structured behavioral profiles, " Int. J. Coop. Inf. Syst., vol. 21, no. 1, pp. 55-83, Mar. 2012. doi: 10.1142/S0218843012400035
    [21]
    M. Weidlich, A. Polyvyanyy, J. Mendling, and M. Weske, "Causal behavioural profiles-efficient computation, applications, and evaluation, " Fund. Inform., vol. 113, no. 3-4, pp. 399-435, Aug. 2011. http://dl.acm.org/citation.cfm?id=2362145
    [22]
    J. L. Peterson, "Petri nets, " ACM Comput. Surv. (CSUR), vol. 9, no. 3, pp. 223-252, Sep. 1977. http://dl.acm.org/citation.cfm?id=356702
    [23]
    T. Murata, "Petri nets: properties, analysis and applications, " Proc. IEEE, vol. 77, no. 4, pp. 541-580, Apr. 1989. http://ieeexplore.ieee.org/document/24143/
    [24]
    W. M. P. Van Der Aalst, "Woflan:a petri-net-based workflow analyzer," Syst. Anal. Modell. Simul., vol. 35, no. 3, pp. 345-357, 1999. http://www.narcis.nl/publication/RecordID/oai:library.tue.nl:504357
    [25]
    M. M. Wang, G. J. Liu, C. J. Jiang, and C. G. Yan, "Computation of secure consistency for real systems, " in Proc. 9th Int. Conf. Security, Privacy and Anonymity in Computation, Communication and Storage, Cham, Germany, 2016, pp. 84-97. doi: 10.1007/978-3-319-49148-6_8
    [26]
    M. W. P. van der Aalst, "Verification of workflow nets, " in Application and Theory of Petri Nets 1997, P. Azëma and G. Balbo, Eds. Berlin, Heidelberg, Germany: Springer, 1997, pp. 407-426. doi: 10.1007/3-540-63139-9_48
    [27]
    J. M. Couvreur, D. Poitrenaud, and P. Weil, "Branching processes of general petri nets, " in Applications and Theory of Petri Nets, L. M. Kristensen and L. Petrucci, Eds. Berlin, Heidelberg, Germany: Springer, 2011. http://www.springerlink.com/content/86j44652871j2701
    [28]
    J. Engelfriet, "Branching processes of petri nets, " Acta Inform., vol. 28, no. 6, pp. 575-591, Jun. 1991. doi: 10.1007/BF01463946
    [29]
    M. Weidlich, R. Dijkman, and M. Weske, "Behaviour equivalence and compatibility of business process models with complex correspondences, " Comput. J., vol. 55, no. 11, pp. 1398-1418, Feb. 2012. http://dl.acm.org/citation.cfm?id=2400041
    [30]
    E. W. Dijkstra, "Hierarchical ordering of sequential processes, " Acta Inform., vol. 1, no. 2, pp. 115-138, Jun. 1971. doi: 10.1007/BF00289519
    [31]
    T. Murata and Z. H. Wu, "Fair relation and modified synchronic distances in a petri net, " J. Franklin Inst., vol. 320, no. 2, pp. 63-82, Aug. 1985. http://www.sciencedirect.com/science/article/pii/0016003285900286
    [32]
    W. Khlif and H. Ben-Abdallah, "Integrating semantics and structural information for BPMN model refactoring, " in Proc. IEEE/ACIS 14th Int. Conf. Computer and Information Science (ICIS), Las Vegas, NV, USA, 2015, pp. 656-660. http://ieeexplore.ieee.org/document/7166674/
    [33]
    M. Ehrig, A. Koschmider, and A. Oberweis, "Measuring similarity between semantic business process models, " in Proc. Fourth Asia-Pacific Conf. Comceptual Modelling, Ballarat, Australia, vol. 67, pp. 71-80, 2007. http://dl.acm.org/citation.cfm?id=1274465
    [34]
    D. Sangiorgi and V. Vignudelli, "Environmental bisimulations for probabilistic higher-order languages, " in Proc. 43rd Annu. ACM SIGPLANSIGACT Symp. Principles of Programming Languages, St. Petersburg, FL, USA, 2016, pp. 595-607. http://dl.acm.org/citation.cfm?id=2837651
    [35]
    B. Luttik, "Unique parallel decomposition in branching and weak bisimulation semantics, " Theor. Comput. Sci., vol. 612, pp. 29-44, Jan. 2016. http://dl.acm.org/citation.cfm?id=2414015
    [36]
    M. Taheriyan, C. A. Knoblock, P. Szekely, and J. L. Ambite, "A scalable approach to learn semantic models of structured sources, " in Proc. 2014 IEEE Int. Conf. Semantic Computing (ICSC), Newport Beach, CA, USA, 2014, pp. 183-190. http://ieeexplore.ieee.org/xpls/icp.jsp?arnumber=6882021
    [37]
    S. de Cesare, D. Juric, and M. Lycett, "Automated taxonomy extraction from semantic business process models, " in Proc. 2016 49th Hawaii Int. Conf. System Sciences (HICSS), Koloa, HI, USA, 2016, pp. 4394-4403. https://www.computer.org/csdl/proceedings/hicss/2016/5670/00/5670e394.pdf
    [38]
    D. Ritze, J. Völker, C. Meilicke, and O. Sväb-Zamazal, "Linguistic analysis for complex ontology matching, " in Proc. 5th Int. Workshop on Ontology Matching. Shanghai, China, vol. 689, pp. 1-12, 2010. https://ub-madoc.bib.uni-mannheim.de/32129/
    [39]
    X. W. Fang, C. J. Jiang, Z. X. Yin, and X. Q. Fan, "The trustworthiness analyzing of interacting business process based on the induction information, " Comput. Sci. Inf. Syst., vol. 8, no. 3, pp. 843-867, Jun. 2011. http://connection.ebscohost.com/c/articles/74093381/trustworthiness-analyzing-interacting-business-process-based-induction-information
    [40]
    W. M. P. van der Aalst, N. Lohmann, P. Massuthe, C. Stahl, and K. Wolf, "Multiparty contracts: Agreeing and implementing interorganizational processes, " Comput. J., vol. 53, no. 1, pp. 90-106, Jan. 2010. https://academic.oup.com/comjnl/article-abstract/53/1/90/461248
    [41]
    J. M. Zaha, M. Dumas, A. H. M. Ter Hofstede, A. Barros, and G. Decker, "Bridging global and local models of service-oriented systems, " IEEE Trans. Syst., Man, Cybern., C, vol. 38, no. 3, pp. 302-318, May 2008. http://dl.acm.org/citation.cfm?id=2221122
    [42]
    C. Girault and R. Valk, Petri Nets for Systems Engineering: A Guide to Modeling, Verification, and Applications. Berlin Heidelberg: Springer, 2003.
    [43]
    R. E. Lopez-Herrejon, L. Linsbauer, and A. Egyed, "A systematic mapping study of search-based software engineering for software product lines, " Inf. Softw. Technol., vol. 61, pp. 33-51, May 2015. https://www.mendeley.com/research-papers/systematic-mapping-study-searchbased-software-engineering-software-product-lines-3/
    [44]
    H. A. Duran-Limon, C. A. Garcia-Rios, F. E. Castillo-Barrera, and R. Capilla, "An ontology-based product architecture derivation approach, " IEEE Trans. Softw. Eng., vol. 41, no. 12, pp. 1153-1168, Dec. 2015. http://ieeexplore.ieee.org/document/7134799/
    [45]
    J. Becker, D. Pfeiffer, M. Räkers, T. Falk, and M. Czerwonka, Semantic Business Process Modelling and Analysis, J. vom Brocke and M. Rosemann, Eds. Berlin Heidelberg, Germany: Springer, 2015.
    [46]
    Z. Béllahsene and M. Lëonard, "Advanced information systems engineering, " in Proc. 20th Int. Conf. CAiSE, Montpellier, France, 2008, pp. 16-20. http://www.springerlink.com/content/89nudd22n6gt/
    [47]
    S. H. Yeganeh, J. Habibi, H. Rostami, and H. Abolhassani, "Semantic web service composition testbed, " Comput. Electr. Eng., vol. 36, no. 5, pp. 805-817, Sep. 2010. http://www.sciencedirect.com/science/article/pii/S0045790608000402
    [48]
    J. Puttonen, A. Lobov, and J. L. M. Lastra, "Semantics-based composition of factory automation processes encapsulated by web services, " IEEE Trans. Industr. Inform., vol. 9, no. 4, pp. 2349-2359, Nov. 2013. http://ieeexplore.ieee.org/document/6311467/
    [49]
    K. Yongsiriwit, M. Sellami, and W. Gaaloul, "A semantic framework supporting business process variability using event logs, " in Proc. 2016 IEEE Int. Conf. Services Computing (SCC), San Francisco, CA, USA, 2016, pp. 163-170. http://ieeexplore.ieee.org/document/7557449/
    [50]
    M. Schrefl and M. Stumptner, "Behavior-consistent specialization of object life cycles, " ACM Trans. Softw. Eng. Methodol., vol. 11, no. 1, pp. 92-148, Jan. 2002. http://dl.acm.org/citation.cfm?id=504091
    [51]
    S. Boubaker, A. Mammar, M. Graiet, and W. Gaaloul, "A formal guidance approach for correct process configuration, " in Proc. 2016 Int. Conf. Service-Oriented Computing, Cham, Germany, 2016, pp. 483-498. doi: 10.1007%2F978-3-319-46295-0_30
    [52]
    A. Polyvyanyy, M. Weidlich, R. Conforti, M. La Rosa, and A. H. M. Ter Hofstede, "The 4C spectrum of fundamental behavioral relations for concurrent systems," in Application and Theory of Petri Nets and Concurrency, G. Ciardo and E. Kindler, Eds. Cham, Germany:Springer, 2014, pp. 210-232. doi: 10.1007/978-3-319-07734-5_12

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(6)  / Tables(4)

    Article Metrics

    Article views (635) PDF downloads(60) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return