Workflow Nets and Soundness

Total Page:16

File Type:pdf, Size:1020Kb

Workflow Nets and Soundness Process Mining: Data Science in Action Workflow Nets and Soundness prof.dr.ir. Wil van der Aalst www.processmining.org ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Motivation • For process mining we often use (or aim at) Workflow Nets (WF-nets). • WF-nets: start end − have a well-defined start and end − should be free of obvious anomalies (soundness) • WF-nets are a subclass of Petri nets often used in the context of workflow management and business process management (systems). ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) "Business Process Management (BPM) is the discipline that combines knowledge from information technology and knowledge from management sciences and applies this to operational business processes" Wil M. P. van der Aalst, “Business Process Management: A Comprehensive Survey,” ISRN Software Engineering, vol. 2013, Article ID 507984, 37 pages, 2013. doi:10.1155/2013/507984 Adam Smith (1723-1790) showedFrederick the advantages Taylor (1856 of- the1915) divisionHenry introduced of Fordlabor. (1863 the initial-1947) principlesintroducedSince of scientific 1950 the computersproduction and management.linedigital for the communication mass production of “blackinfrastructures T-Fords”. are the most dominant factor influencing business processes and their management. BPM lifecycle data analysis- -based based modelanalysis run & adjust )design (re implement/configure ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) What is the role of (process) models? • Role of models in BPM/WFM: − reason about processes (redesign) and − make decisions inside processes (planning and control). • Process models may be used to: − discuss responsibilities, − analyze compliance, − predict performance using simulation, and − configure a WFM/BPM system. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Business Process Model Many notations and Notation (BPMN) select add extra car insurance register initiate check driver’s provide car request check-in licence start end charge credit Event-Driven Process card Chains (EPCs) Petri nets ready to select (often theadd extra be needed added selected car subclassinsurance of ready to check register initiate ready for start XOR no need XOR AND be driver’s AND provide car done request check-in check-in workflow nets) checked licence ready to charge be charged credit card Event log (example/observed add extra d behavior) insurance b select car abcdefg a c e g acedfg acfedg register check driver’s out in initiate provide abcdfeg request check-in license car abcfdeg acdef f ... charge credit card ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Petri nets (as seen before) XOR-split XOR-join XOR-split t transition b AND-split examine AND-join p place thoroughly g token c1 c3 pay c compensation a e examine start register casually decide c5 end request h d c2 c4 reject check ticket request f reinitiate request XOR-join AND-split ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Example run of the model examine thoroughly c1 c3 pay compensation examine start register casually decide c5 end request c2 c4 reject check ticket request reinitiate request Only[start] one of[c1,c2] infinitely many[c2,c3] possible [c3,c4] firing sequences! [c5] [end] ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Reachability graph examine thoroughly c1 c3 pay compensation examine start register casually decide c5 end request c2 c4 reject check ticket request reinitiate request pay examine reinitiate compensation thoroughly request register examine check reject request casually ticket request [start] [c1,c2] [c2,c3] [c5] [end] check decide ticket examine casually [c1,c4] [c3,c4] examine ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) thoroughly Good model? examine thoroughly c1 c3 pay compensation examine start register casually decide c5 end request c2 c4 reject check ticket request reinitiate request No, deadlock possible: [c3]. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Good model? examine thoroughly c1 pay compensation examine start register casually c3 decide c5 end request c2 reject check ticket request reinitiate request No, AND-split does not have corresponding join! ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Good model? examine thoroughly c1 c3 pay compensation examine start register casually decide c5 end request c2 c4 reject check ticket request reinitiate request No, "pay compensation" is dead! ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Good model? examine thoroughly c1 c3 pay compensation examine start register casually decide c5 end request c2 c4 reject check ticket request reinitiate request Yes, but why? ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) WF-nets A WorkFlow net (WF-net) has one source place (typically called start or i) and one sink place (typically called end or o) and all other nodes are on a path from source to sink. start end ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Soundness start end A WF-net is sound if and only if the following properties hold: • safeness: places cannot hold multiple tokens at the same time, • proper completion: if the sink place is marked, all other places are empty, • option to complete: it is always possible to reach the marking that marks just the sink place, and • absence of dead parts: for any transition there is a firing sequence enabling it. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Sound? t1 p2 t3 p4 t5 p1 p6 t2 p3 t4 p5 t6 • safeness: places cannot hold multiple tokens at the same time • proper completion: if the sink place is marked, all other places are empty • option to complete: it is always possible to reach the final target marking • absence of dead parts: for any transition there is a firing sequence enabling it ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Sound? p4 p3 t3 p1 t1 p2 t2 p5 • safeness: places cannot hold multiple tokens at the same time • proper completion: if the sink place is marked, all other places are empty • option to complete: it is always possible to reach the final target marking • absence of dead parts: for any transition there is a firing sequence enabling it ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Sound? t3 p1 t1 p2 t2 p3 • safeness: places cannot hold multiple tokens at the same time • proper completion: if the sink place is marked, all other places are empty • option to complete: it is always possible to reach the final target marking • absence of dead parts: for any transition there is a firing sequence enabling it ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Sound? examine thoroughly c1 c3 pay compensation examine start register casually decide c5 end request c2 c4 reject check ticket request reinitiate request • safeness: places cannot hold multiple tokens at the same time • proper completion: if the sink place is marked, all other places are empty • option to complete: it is always possible to reach the final target marking • absence of dead parts: for any transition there is a firing sequence enabling it ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Checking soundness may be far from trivial for larger examples. Not sound: Unsafe Examples of reachable markings: • [c52] • [c1,c2,c3,c4] 2 2 • [c1 ,c2 ] examine thoroughly • etc. c1 c3 pay compensation examine start register casually decide c5 end request c2 c4 reject check ticket request reinitiate request ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Not sound: No option to complete in [c3] examine thoroughly c1 c3 pay compensation examine start register casually decide c5 end request c2 c4 reject check ticket request reinitiate request ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) No need to check proper completion: It is implied by other properties start end option to complete (it is always possible to reach the marking that marks just the sink place) implies proper completion (if the sink place is marked all other places are empty) ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Link between soundness and classical Petri net properties examine examine thoroughly thoroughly c1 c3 pay c1 c3 pay compensation compensation examine examine start register casually decide c5 end start register casually decide c5 end request request c2 c4 reject c2 c4 reject check ticket request check ticket request reinitiate reinitiate request request t* A WF-net is sound if and only if the corresponding "short-circuited" Petri net is live and bounded! ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Main types of model-based analysis verification (like soundness checking) performance analysis (simulation) data analysis- -based based modelanalysis run & adjust )design (re ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) implement/configure Limitations of model-based analysis • Verification and performance analysis heavily rely on the availability of high quality models. • When the models and reality have little in common, model-based analysis does not make much sense! • There is often a poor alignment between hand-made models and reality. • Process mining aims to address these problems by establishing a direct
Recommended publications
  • Service Interaction: Patterns, Formalization, and Analysis
    Service Interaction: Patterns, Formalization, and Analysis 9th International School on Formal Methods for the Design of Computer, Communication and Software Systems: Web Services (SFM-09:WS), Bertinoro, Italy, June 1-6, 2009. prof.dr.ir. Wil van der Aalst www.vdaalst.org Joint work with Arjan Mooij, Christian Stahl, and Karsten Wolf BEST: Berlin - Rostock- Eindhoven Service Technology Program http://www2.informatik.hu-berlin.de/top/best/ PAGE 1 Outline • Introduction to Service Interaction • Workflow and Service Interaction Patterns • Challenging Analysis Questions • A "Crash Course" in Petri Nets • Exposing Services • Replacing and Refining Services • Integrating Services Using Adapters • Service Mining • Conclusion PAGE 2 Introduction to Service Interaction Service-Orientation: Basic Idea invoke receive reply PAGE 4 Service Networks PAGE 5 Choreography PAGE 6 Orchestration orchestration service B service service C A service D PAGE 7 Workflow? PAGE 8 Some Terminology service choreography service definition activity channel activity port channel message port service definition service definition interface interface Important assumption: asynchronous communication. PAGE 9 Interaction is a source of errors! PAGE 10 PAGE 11 deadlock PAGE 12 restaurant is "uncontrollable"* customer is *by any service with only dead "controllable" but will final markings never get any food PAGE 13 PAGE 14 Workflow and Service Interaction Patterns MS Workflow Foundation Global 360 BPM Suite YAWL FileNet InConcert Fujitsu Interstage Axxerion BWise Software AG/webMethods
    [Show full text]
  • Application of Clustering Filters in Order to Exclude Irrelevant
    Turkish Journal of Computer and Mathematics Education Vol.12 No.6 (2021), 1815-1827 Research Article Application of Clustering Filters in Order to Exclude Irrelevant Instances of the Process Before Using Reinforcement Learning to Optimize Business Processes in the Bank Andrey A. Bugaenko* Data Science Director, Sberbank PJSC, Moscow, Russia *Corresponding author: Email: [email protected], [email protected] ORCID 0000-0002-3372-5652 Article History: Received: 10 November 2020; Revised 12 January 2021 Accepted: 27 January 2021; Published online: 5 April 2021 ___________________________________________________________________________ Abstract The research offers and describes the use of clustering filters in order to exclude preliminarily the instances of the process, which contain errors, and which are not related directly with the business process, and, accordingly, are irrelevant for the analysis. Comparison of 15 types of filters was performed using mapped-out data. It was shown that successful preliminary filtering is possible before the application of reinforcement learning for business process analysis, which reduces the data processing amount. Key words Machine learning, process mining, clustering filters, DBSCAN, SVM, robust covariance, isolation forest, local outlier factor, banking. ___________________________________________________________________________ Introduction Currently, when applying reinforcement learning in order to analyze business processes in the bank divisions[14]-[15], we quite often see the situation, when the erroneous actions of managers performing the process, which are not related to the business process directly, are logged in the system and drawn in the network graph of the process as additional nodes, thus distorting the actual time of the completion of the process nodes. This not only distorts the vision of the process, but makes the network graph more complicated, and most importantly, slows down data processing materially.
    [Show full text]
  • Stochastic-Petri Net Modeling and Optimization for Outdoor Patients in Building Sustainable Healthcare System Considering Staff Absenteeism
    Article Stochastic-Petri Net Modeling and Optimization for Outdoor Patients in Building Sustainable Healthcare System Considering Staff Absenteeism Chang Wook Kang 1, Muhammad Imran 2, Muhammad Omair 3, Waqas Ahmed 2, Misbah Ullah 4 and Biswajit Sarkar 1,* 1 Department of Industrial & Management Engineering, Hanyang University, Ansan, Gyeonggido 155 88, Korea; [email protected] 2 Department of Management & HR’, NUST Business School, National University of Sciences & Technology, Islamabad 44000, Pakistan; [email protected] (M.I.); [email protected] (W.A.) 3 Department of Industrial Engineering, Jalozai Campus, University of Engineering & Technology, Peshawar 25000, Pakistan; [email protected] 4 Department of Industrial Engineering, University of Engineering & Technology, Peshawar 25000, Pakistan; [email protected] * Correspondence: [email protected]; Tel.: +82-31-400-5259; Fax: +82-31-436-8146 Received: 13 April 2019; Accepted: 29 May 2019; Published: 1 June 2019 Abstract: Sustainable healthcare systems are gaining more importance in the era of globalization. The efficient planning with sustainable resources in healthcare systems is necessary for the patient’s satisfaction. The proposed research considers performance improvement along with future sustainability. The main objective of this study is to minimize the queue of patients and required resources in a healthcare unit with the consideration of staff absenteeism. It is a resource-planning model with staff absenteeism and operational utilization. Petri nets have been integrated with a mixed integer nonlinear programming model (MINLP) to form a new approach that is used as a solution method to the problem. The Petri net is the combination of graphical, mathematical technique, and simulation for visualizing and optimization of a system having both continuous and discrete characteristics.
    [Show full text]
  • Curriculum Vitae Michael Zur Muehlen 939 Bloomfield Street Hoboken, NJ 07030, USA Home Phone: +1 (551) 208‐1071
    Curriculum Vitae Michael zur Muehlen 939 Bloomfield Street Hoboken, NJ 07030, USA Home Phone: +1 (551) 208‐1071 Management Summary . Internationally respected authority on Business Process Innovation and Operational Risk Management . Assistant Professor, School of Technology Management, Stevens Institute of Technology . Independent Business Process Management & Transformation Consultant . FelloW, WorkfloW Management Coalition . Author of dozens of peer‐revieWed research studies and published articles Synopsis Dr. Michael zur Muehlen directs the SAP/IDS Scheer Center of Excellence in Business Process Innovation at Stevens Institute of Technology, in Hoboken, NJ, and is responsible for Stevens’ graduate and executive education programs in Business Process Management and Service Innovation. He has over 15 years of experience in the field of process automation and WorkfloW management, and has led numerous process improvement and design projects in the utility, financial services, industrial, and telecommunications sector both in Germany and the US. Prior to his appointment at Stevens, Michael Was a senior lecturer at the Department of Information Systems, University of Muenster, Germany, and a visiting lecturer at the University of Tartu, Estonia. An active contributor to standards in the BPM area, Michael Was named a felloW of the WorkfloW Management Coalition in 2004 and chairs the WfMC Working group “Management and Audit”. He studies the practical use of process modeling standards, techniques to manage operational risks in business processes, and the integration of business processes and business rules. SAP Research, the US Army, the Australian Research Council, and private sponsors have funded his research. Michael has presented his research in more than 20 countries. He is the author of a book on WorkfloW‐based process controlling, numerous journal articles, conference papers, book chapters and Working papers on process management and WorkfloW automation.
    [Show full text]
  • Modeling Games with Petri Nets
    Modeling Games with Petri Nets Manuel Araújo Licínio Roque Departamento de Engenharia Informática Departamento de Engenharia Informática Faculdade de Ciências e Tecnologia Faculdade de Ciências e Tecnologia Universidade de Coimbra Universidade de Coimbra Coimbra, Portugal Coimbra, Portugal [email protected] [email protected] ABSTRACT game systems. We will then discuss some of their This paper describes an alternate approach to the modeling advantages and disadvantages when compared to the other of game systems and game flow with Petri nets. Modeling modeling languages. languages usually used in this area are of limited efficiency MODELING IN GAME DESIGN when it comes to validating the underlying game systems. Natural language is easy to read, but it is not easy to review We provide a case study to show that Petri Nets can be used a large natural language specification [15]. For that reason with advantages over other modeling languages. Their we use charts and diagrams to explain things visually and graphical notation is simple, yet it can be used to model synthetically. This kind of communication can be as complex game systems. Their mathematically defined expressive as and easier to understand than the verbal structure enables the modeled system to be formally descriptions used for the same information [15]. People analyzed and its behavior’s simulation offers the possibility doing game design make intensive use of visual of detecting unwanted behaviors, loop-holes or balancing communication [9, 10, 12, 13, 19]. The flow of the game is issues while still in the game design stage. usually depicted visually instead of a pure textual approach Keywords [10, 13, 19].
    [Show full text]
  • Petri Nets for Dynamic Event-Driven System Modeling
    24 Petri Nets for Dynamic Event-Driven System Modeling Jiacun Wang 24.1 Introduction .................................................................24-1 Monmouth University 24.2 Petri Net Definition .....................................................24-1 24.3 Transition Firing ..........................................................24-3 24.4 Modeling Power ...........................................................24-4 24.5 Petri Net Properties ......................................................24-5 Reachability • Safeness • Liveness 24.6 Analysis of Petri Nets ...................................................24-7 Reachability Analysis • Incidence Matrix and State Equation • Invariant Analysis • Simulation 24.7 Colored Petri Nets ........................................................24-10 24.8 Timed Petri Nets ..........................................................24-12 Deterministic Timed Petri Nets • Stochastic Timed Petri Nets 24.9 Concluding Remark .....................................................24-16 24.1 Introduction Petri nets were introduced in 1962 by Dr. Carl Adam Petri (Petri, 1962). Petri nets are a powerful modeling formalism in computer science, system engineering, and many other disciplines. Petri nets combine a well-defined mathematical theory with a graphical representation of the dynamic behavior of systems. The theoretical aspect of Petri nets allows precise modeling and analysis of system behavior, while the graphical representation of Petri nets enables visualization of the modeled system state
    [Show full text]
  • Business Process Trends Spotlight
    Spotlight Volume 5, Number 1 January 17, 2012 January Sponsor Academic BPM INTRODUCTION In this Spotlight, we offer some thoughts on what is happening in the BPM academic world, include several of the publications authored by BPM academics and researchers that we have published on BPTrends, and provide some resources for people interested in academic BPM. I imagine that there are many Business Process Practitioners out there who are like me – they switch back and forth between fearing that we are simply involved in a consulting activity that will have a new name in 3-4 years, and feeling confident that we are well on the way to being a profession with a recognized core body of knowledge and best practices. I have been around long enough to watch Performance Improvement, Six Sigma, Business Process Reengineering, Lean and Business Process Management enjoy their moment in the sun. I continue to hope that Business Process Management (BPM) will evolve as a sustainable concept that embraces all of the earlier practices, that is supported by am established body of knowledge and best practices that is recognized and embraced by organizations world-wide. It’s difficult for consultants to market and sell a comprehensive BPM solution because we are often dealing with organizations that seek to play one approach against another. “So,” a company manager might say, “just how is your BPM approach different from Six Sigma or Lean, and why should we use BPM for this project?.” In this context, it is often difficult to explain that BPM is a more comprehensive approach to process improvement that is focused on aligning, integrating, measuring and managing all of an organization’s business processes and that BPM includes the application of all the other available techniques, where and when they are appropriate.
    [Show full text]
  • Process Mining of Enterprise Applications Based on Outsystems Agile Platform
    Process Mining of Enterprise Applications based on OutSystems Agile Platform Alexandre L. Gouveia IST – Instituto Superior Técnico Avenida Prof. Dr. Cavaco Silva 2744-016 Porto Salvo, Portugal E-mail: [email protected] Abstract. Process Mining allows the analysis of business processes based on event logs. When a certain application is running, data referring to its events are recorded to these event logs. Using the details of the recorded events, such as their identification, their status, the date and time they were executed and the connection they have to other events, the business processes embedded in this application can be discovered. By an analysis of a considerable amount of events through process mining algorithms, it is possible to reveal behavioral patterns as well as the process model that drives the application execution. Through the study and comparison of these patterns and models with the ones that modeled the application, an overall improvement to the application may be achieved through successive refinements. The purpose of this paper is to illustrate how process mining can be applied in a specific application development platform, namely the Agile Platform of OutSystems. Keywords: Process Mining, OutSystems Platform, Agile Development, Event Log, Process Models 1 Introduction The term of Process Mining was introduced by [6] for the method of extracting the description of a structured process from a set of events, where each event refers to a task (i.e., a real execution). In their work they referred to process discovery concepts [12] and the idea of applying this method on the context of workflow management [8].
    [Show full text]
  • Hybrid Intelligence to Automate Or Not to There Used to Be a Clear Separation Between Automate, That Is the Question Tasks Done by Machines and Tasks Done by People
    prof.dr.ir Wil van der Aalst Hybrid RWTH Aachen University Intelligence Hybrid Intelligence To Automate or Not to There used to be a clear separation between Automate, That is the question tasks done by machines and tasks done by people. Applications of Machine Learning (ML) and Robotic Process Automation (RPA) have machine learning in lowered the threshold to automate tasks previously done by humans. speech recognition (e.g., Yet organizations are struggling to apply ML and RPA, effectively causing many digital transformation initiatives to fail. Process Mining (PM) Alexa and Siri), image techniques help to decide what should be automated and what not. recognition, automated Interestingly, most processes work best using a combination of human translation, autonomous and machine intelligence. Therefore, we relate Hybrid Intelligence (HI) driving, and medical to process management and process automation using RPA and PM. diagnosis, have blurred the classical divide between human tasks and machine tasks. Although current AI technology outperforms humans in many areas, tasks requiring common sense, contextual knowledge, creativity, adaptivity, and empathy As Niels Bohr once said "It is difficult to make predictions, especially about the future" and, of course, this also applies to process are still best performed management and automation. In 1964, the RAND Corporation published by humans. Hybrid a report with predictions about technological development based on the Intelligence (HI) blends expectations of 82 experts across various fields. For 1980, the report human intelligence and predicted that there would be a manned landing on Mars and families machine intelligence to would have robots as household servants. We are still not any way close combine the best of both to visiting Mars and, 40 years later, we only have robot vacuum cleaners.
    [Show full text]
  • Easychair Preprint Object-Centric Process Mining: Dealing With
    EasyChair Preprint № 2301 Object-Centric Process Mining: Dealing With Divergence and Convergence in Event Data Wil M.P. van der Aalst EasyChair preprints are intended for rapid dissemination of research results and are integrated with the rest of EasyChair. January 2, 2020 Object-Centric Process Mining: Dealing With Divergence and Convergence in Event Data Wil M.P. van der Aalst1;2[0000−0002−0955−6940] 1 Process and Data Science (PADS), RWTH Aachen University, Aachen, Germany 2 Fraunhofer Institute for Applied Information Technology, Sankt Augustin, Germany [email protected] Abstract. Process mining techniques use event data to answer a variety of process-related questions. Process discovery, conformance checking, model enhancement, and operational support are used to improve perfor- mance and compliance. Process mining starts from recorded events that are each characterized by a case identifier, an activity name, a timestamp, and optional attributes like resource or costs. In many applications, there are multiple candidate identifiers leading to different views on the same process. Moreover, one event may be related to different cases (conver- gence) and, for a given case, there may be multiple instances of the same activity within a case (divergence). To create a traditional process model, the event data need to be “flattened”. There are typically multiple choices possible, leading to different views that are disconnected. There- fore, one quickly loses the overview and event data need to be exacted multiple times (for the different views). Different approaches have been proposed to tackle the problem. This paper discusses the gap between real event data and the event logs required by traditional process min- ing techniques.
    [Show full text]
  • Petri Nets: Properties, Analysis and Applications
    Petri Nets: Properties, Analysis and Appl kations TADAO MURATA, FELLOW, IEEE Invited Paper This is an invited tutorial-review paper on Petri nets-a graphical to the faculty of Mathematics and Physics at the Technical and mathematical modeling tool. Petri nets are a promising tool University of Darmstadt, West Germany. The dissertation for describing and studying information processing systems that was prepared while C. A. Petri worked as a scientist at the are characterized as being concurrent, asynchronous, distributed, parallel, nondeterministic, and/or stochastic. Universityof Bonn. Petri’swork[l], [2]came totheattention The paper starts with a brief review of the history and the appli- of A. W. Holt, who later led the Information System Theory cation areas considered in the literature. It then proceeds with Project of Applied Data Research, Inc., in the United States. introductory modeling examples, behavioral and structural prop- The early developments and applications of Petri nets (or erties, three methods of analysis, subclasses of Petri nets and their analysis. In particular, one section is devoted to marked graphs- their predecessor)arefound in the reports [3]-[8] associated the concurrent system model most amenable to analysis. In addi- with this project, and in the Record [9] of the 1970 Project tion, the paper presents introductory discussions on stochastic nets MAC Conference on Concurrent Systems and Parallel with their application to performance modeling, and on high-level Computation. From 1970 to 1975, the Computation Struc- nets with their application to logic programming. Also included are recent results on reachability criteria. Suggestions are provided ture Group at MIT was most active in conducting Petri-net for further reading on many subject areas of Petri nets.
    [Show full text]
  • Blockchains for Business Process Management - Challenges and Opportunities
    Downloaded from orbit.dtu.dk on: Sep 26, 2021 Blockchains for Business Process Management - Challenges and Opportunities Mendling, Jan; Weber, Ingo; Van Der Aalst, Wil; Brocke, Jan vom; Cabanillas, Cristina; Daniel, Florian; Debois, Soren; Di Ciccio, Claudio; Dumas, Marlon; Dustdar, Schahram Total number of authors: 32 Published in: ACM Transactions on Management Information Systems Link to article, DOI: 10.1145/3183367 Publication date: 2018 Document Version Peer reviewed version Link back to DTU Orbit Citation (APA): Mendling, J., Weber, I., Van Der Aalst, W., Brocke, J. V., Cabanillas, C., Daniel, F., Debois, S., Di Ciccio, C., Dumas, M., Dustdar, S., Gal, A., Garcia-Banuelos, L., Governatori, G., Hull, T. R., La Rosa, M., Leopold, H., Leymann, F., Recker, J., Reichert, M., ... Zhu, L. (2018). Blockchains for Business Process Management - Challenges and Opportunities. ACM Transactions on Management Information Systems, 9(1), [4]. https://doi.org/10.1145/3183367 General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Users may download and print one copy of any publication from the public portal for the purpose of private study or research. You may not further distribute the material or use it for any profit-making activity or commercial gain You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim.
    [Show full text]