TY - GEN
T1 - Discovery, verification and conformance of workflows with cancellation
AU - Aalst, van der, W.M.P.
PY - 2008
Y1 - 2008
N2 - Petri nets are frequently used for the modeling and analysis of workflows. Their graphical nature, well-defined semantics, and analysis techniques are attractive as information systems become more "process-aware". Unfortunately, the classical Petri net has problems modeling cancellation in a succinct and direct manner. Modeling cancellation regions in a classical net is impossible or results in a "spaghetti-like" net. Cancellation regions are supported by many workflow management systems, but these systems do not support advanced analysis techniques (process mining, verification, performance analysis, etc.). This paper proposes to use reset workflow nets (RWF-nets) and discusses (1) the discovery of RWF-nets (i.e., extracting information from event logs to construct such models), (2) the verification of RWF-nets (i.e., checking whether a workflow process has deadlocks, livelocks, etc.), and (3) the conformance of an event log with respect to a RWF-net (i.e., comparing real with modeled behavior).
AB - Petri nets are frequently used for the modeling and analysis of workflows. Their graphical nature, well-defined semantics, and analysis techniques are attractive as information systems become more "process-aware". Unfortunately, the classical Petri net has problems modeling cancellation in a succinct and direct manner. Modeling cancellation regions in a classical net is impossible or results in a "spaghetti-like" net. Cancellation regions are supported by many workflow management systems, but these systems do not support advanced analysis techniques (process mining, verification, performance analysis, etc.). This paper proposes to use reset workflow nets (RWF-nets) and discusses (1) the discovery of RWF-nets (i.e., extracting information from event logs to construct such models), (2) the verification of RWF-nets (i.e., checking whether a workflow process has deadlocks, livelocks, etc.), and (3) the conformance of an event log with respect to a RWF-net (i.e., comparing real with modeled behavior).
U2 - 10.1007/978-3-540-87405-8_2
DO - 10.1007/978-3-540-87405-8_2
M3 - Conference contribution
SN - 978-3-540-87404-1
T3 - Lecture Notes in Computer Science
SP - 18
EP - 37
BT - Graph Transformations (4th International Conference, ICGT 2008, Leicester, UK, September 7-13, 2008, Proceedings)
A2 - Ehrig, H.
A2 - Heckel, R.
A2 - Rozenberg, G.
A2 - Taentzer, G.
PB - Springer
CY - Berlin
ER -