Business process modeling using Petri nets

K.M. Hee, van, N. Sidorova, J.M.E.M. Werf, van der

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureHoofdstukAcademic

12 Citaten (Scopus)
11 Downloads (Pure)

Samenvatting

Business process modeling has become a standard activity in many organizations. We start with going back into the history and explain why this activity appeared and became of such importance for organizations to achieve their business targets. We discuss the context in which business process modeling takes place and give a comprehensive overview of the techniques used in modeling. We consider bottom up and top down approaches to modeling, also in the context of developing correct-by-construction models of business processes. The correctness property we focus on is soundness, or weak termination, basically meaning that at every moment of its execution, a process has an option to continue along an execution path leading to termination, which is an important sanity check for business processes. Finally, we discuss analogies between business processes and software services and their orchestrations and argue the applicability of the described modeling techniques to the world of services.
Originele taal-2Engels
TitelTransactions on Petri Nets and Other Models of Concurrency VII
RedacteurenK. Jensen, W.M.P. Aalst, van der, G. Balbo, M. Koutny, K. Wolf
Plaats van productieBerlin
UitgeverijSpringer
Pagina's116-161
ISBN van geprinte versie978-3-642-38142-3
DOI's
StatusGepubliceerd - 2013

Publicatie series

NaamLecture Notes in Computer Science
Volume7480
ISSN van geprinte versie0302-9743

Vingerafdruk Duik in de onderzoeksthema's van 'Business process modeling using Petri nets'. Samen vormen ze een unieke vingerafdruk.

  • Citeer dit

    Hee, van, K. M., Sidorova, N., & Werf, van der, J. M. E. M. (2013). Business process modeling using Petri nets. In K. Jensen, W. M. P. Aalst, van der, G. Balbo, M. Koutny, & K. Wolf (editors), Transactions on Petri Nets and Other Models of Concurrency VII (blz. 116-161). (Lecture Notes in Computer Science; Vol. 7480). Springer. https://doi.org/10.1007/978-3-642-38143-0_4