PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Compliance in Business Processes with Incomplete Information and Time Constraints : a General Framework based on Abductive Reasoning

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Konferencja
Italian Conference on Computational Logic (Convegno Italiano di Logica Computazionale, CILC 2016) (31; 20-22.07.2016; Università degli Studi di Milano-Bicocca, Italy)
Języki publikacji
EN
Abstrakty
EN
The capability to store data about Business Process (BP) executions in so-called Event Logs has brought to the identification of a range of key reasoning services (consistency, compliance, runtime monitoring, prediction) for the analysis of process executions and process models. Tools for the provision of these services typically focus on one form of reasoning alone. Moreover, they are often very rigid in dealing with forms of incomplete information about the process execution. While this enables the development of ad hoc solutions, it also poses an obstacle for the adoption of reasoning-based solutions in the BP community. In this paper, we introduce the notion of Structured Processes with Observability and Time (SPOT models), able to support incompleteness (of traces and logs), and temporal constraints on the activity duration and between activities. Then, we exploit the power of abduction to provide a flexible, yet computationally effective framework able to reinterpret key reasoning services in terms of incompleteness and observability in a uniform way.
Wydawca
Rocznik
Strony
75--111
Opis fizyczny
Bibliogr. 67 poz., rys., tab.
Twórcy
autor
  • University of Bologna, viale Risorgimento 2, 40136–Bologna, Italy
autor
  • University of Bologna, viale Risorgimento 2, 40136–Bologna, Italy
autor
  • Free University of Bozen–Bolzano, piazza Università, 1, 39100 Bozen-Bolzano, Italy
autor
  • Free University of Bozen–Bolzano, piazza Università, 1, 39100 Bozen-Bolzano, Italy
  • FBK-IRST, Via Sommarive 18, 38050 Trento, Italy
  • FBK-IRST, Via Sommarive 18, 38050 Trento, Italy
autor
  • FBK-IRST, Via Sommarive 18, 38050 Trento, Italy
Bibliografia
  • [1] Di Francescomarino C, Ghidini C, Tessaris S, Sandoval IV. Completing Workflow Traces using Action Languages. In: Proceedings of the 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015), volume 9097 of Lecture Notes in Computer Science. Springer, 2015 pp. 314-330.
  • [2] Mannhardt F, de Leoni M, Reijers HA. Extending Process Logs with Events from Supplementary Sources, pp. 235-247. Springer International Publishing, Cham. ISBN 978-3-319-15895-2, 2015. doi:10.1007/978-3-319-15895-2_21. URL https://doi.org/10.1007/978-3-319-15895-2_21.
  • [3] Rogge-Solti A, Mans R, van der Aalst W, Weske M. Improving Documentation by Repairing Event Logs. In: The Practice of Enterprise Modeling, volume 165 of LNBIP, pp. 129-144. Springer. ISBN 978-3-642-41640-8, 2013. doi:10.1007/978-3-642-41641-5_10. URL http://dx.doi.org/10.1007/978-3-642-41641-5_10.
  • [4] Lanz A, Reichert M. Dealing with Changes of Time-Aware Processes. In: Sadiq et al. [5], 2014 pp. 217-233. doi:10.1007/978-3-319-10172-9_14. URL https://doi.org/10.1007/978-3-319-10172-9_14.
  • [5] Sadiq SW, Soffer P, Völzer H (eds.). Business Process Management - 12th International Conference, BPM 2014, Haifa, Israel, September 7-11, 2014. Proceedings, volume 8659 of Lecture Notes in Computer Science. Springer, 2014. ISBN 978-3-319-10171-2. doi:10.1007/978-3-319-10172-9. URL https://doi.org/10.1007/978-3-319-10172-9.
  • [6] Combi C, Oliboni B, Zerbato F. Modeling and handling duration constraints in BPMN 2.0. In: Seffah et al. [7], 2017 pp. 727-734. doi:10.1145/3019612.3019618. URL http://doi.acm.org/10.1145/3019612.3019618.
  • [7] Seffah A, Penzenstadler B, Alves C, Peng X (eds.). Proceedings of the Symposium on Applied Computing, SAC 2017, Marrakech, Morocco, April 3-7, 2017. ACM, 2017. ISBN 978-1-4503-4486-9. doi:10.1145/3019612. URL http://doi.acm.org/10.1145/3019612.
  • [8] Zavatteri M, Combi C, Posenato R, Viganò L. Weak, Strong and Dynamic Controllability of Access-Controlled Workflows Under Conditional Uncertainty. In: Carmona et al. [9], 2017 pp. 235-251. doi:10.1007/978-3-319-65000-5_14. URL https://doi.org/10.1007/978-3-319-65000-5_14.
  • [9] Carmona J, Engels G, Kumar A (eds.). Business Process Management - 15th International Conference, BPM 2017, Barcelona, Spain, September 10-15, 2017, Proceedings, volume 10445 of Lecture Notes in Computer Science. Springer, 2017. ISBN 978-3-319-64999-3. doi:10.1007/978-3-319-65000-5. URL https://doi.org/10.1007/978-3-319-65000-5.
  • [10] Chesani F, De Masellis R, Di Francescomarino C, Ghidini C, Mello P, Montali M, Tessaris S. Abducing Compliance of Incomplete Event Logs. Technical Report submit/1584687, arXiv, 2016.
  • [11] van der Aalst WMP. Business Process Management: A Comprehensive Survey. ISRN Software Engineering, 2013. doi:10.1155/2013/507984. Vol. 2013, Article ID 507984, 37 pages, 2013. doi:10.1155/2013/507984.
  • [12] Kumar A, Sabbella SR, Barton RR. Business Process Management: 13th International Conference, BPM 2015, Innsbruck, Austria, August 31 - September 3, 2015, Proceedings, chapter Managing Controlled Violation of Temporal Process Constraints, pp. 280-296. Springer International Publishing, Cham. ISBN 978-3-319-23063-4, 2015. doi:10.1007/978-3-319-23063-4\_ 20. URL http://dx.doi.org/10.1007/978-3-319-23063-4\_20.
  • [13] Chesani F, De Masellis R, Di Francescomarino C, Ghidini P Chiara Mello, Montali M, Tessaris S. Dealing with Incomplete Event Logs: an Abductive Approach. Submitted for publication, 2015.
  • [14] on Process Mining ITF. XES Standard Definition. http://www.xes-standard.org/, 2015.
  • [15] Lloyd JW. Foundations of Logic Programming, 2nd Edition. Springer, 1987. ISBN 3-540-18199-7.
  • [16] Grossmann W, Rinderle-Ma S. Fundamentals of Business Intelligence. Springer, 2015. doi:10.1007/978-3-662-46531-8.
  • [17] De Masellis R, Maggi FM, Montali M. Monitoring data-aware business constraints with finite state automata. In: Proc. of ICSSP. ACM Press, 2014 doi:10.1145/2600821.2600835.
  • [18] van den Broucke S. Advances in Process Mining: Artificial negative events and other techniques. Ph.D.thesis, KU Leuven, 2014.
  • [19] Pesic M, Schonenberg H, van der Aalst W. DECLARE: Full Support for Loosely-Structured Processes. In: Proc. of EDOC. IEEE Computer Society, Washington, DC, USA.
  • [20] Dumas M, García-Bañuelos L. Process Mining Reloaded: Event Structures as a Unified Representation of Process Models and Event Logs. In: Proc. of PETRI NETS, 9115. Springer, 2015.
  • [21] van der Aalst WMP, De Beer HT, van Dongen BF. Process mining and verification of properties: An approach based on temporal logic. Springer, 2005.
  • [22] Cayoglu U, et al. The Process Model Matching Contest 2013, 2013.
  • [23] van der Aalst WMP, et al. Process Mining Manifesto. In: BPM Workshops. Springer, 2012.
  • [24] Adriansyah A, van Dongen BF, van der Aalst WMP. Conformance Checking Using Cost-Based Fitness Analysis. In: Proc. of EDOC. IEEE Computer Society, 2011.
  • [25] De Leoni M, Maggi FM, van der Aalst WMP. Aligning event logs and declarative process models for conformance checking. In: Proc. of BPM. Springer, 2012.
  • [26] de Leoni M, van der Aalst W, van Dongen BF. Data- and Resource-Aware Conformance Checking of Business Processes. In: Proc. of BIS. Springer, 2012. doi:10.1007/978-3-642-30359-3\_5.
  • [27] Bertoli P, Di Francescomarino C, Dragoni M, Ghidini C. Reasoning-Based Techniques for Dealing with Incomplete Business Process Execution Traces. In: Proc. of AI*IA. Springer, 2013.
  • [28] Di Francescomarino C, Ghidini C, Tessaris S, Sandoval IV. Completing Workflow Traces Using Action Languages. In: Proc. of CAiSE. Springer, 2015.
  • [29] Kiepuszewski B, ter Hofstede AHM, Bussler CJ. On Structured Workflow Modelling. In: Seminal Contributions to Information Systems Engineering. Springer, 2013.
  • [30] van der Aalst WMP. Process Mining - Discovery, Conformance and Enhancement of Business Processes. Springer, 2011. ISBN 978-3-642-19344-6. doi:10.1007/978-3-642-19345-3. URL http://dx.doi.org/10.1007/978-3-642-19345-3.
  • [31] Kakas AC, Kowalski RA, Toni F. Abductive Logic Programming. J. Log. Comput., 1992. 2(6).
  • [32] Alberti M, Chesani F, Gavanelli M, Lamma E, Mello P, Torroni P. Verifiable agent interaction in abductive logic programming: The SCIFF framework. ACM Trans. Comput. Log., 2008. 9(4).
  • [33] Kakas AC, Mancarella P. Abduction and Abductive Logic Programming. In: Proc. of ICLP. 1994.
  • [34] Fung TH, Kowalski RA. The Iff Proof Procedure for Abductive Logic Programming. J. Log. Program., 1997. 33(2).
  • [35] Chesani F, Mello P, Montali M, Storari S. Testing Careflow Process Execution Conformance by Translating a Graphical Language to Computational Logic. In: Proc. of AIME. 2007.
  • [36] Kunen K. Negation in Logic Programming. J. Log. Program., 1987. 4(4).
  • [37] Clark KL. Negation as Failure. In: Logic and Data Bases. Plenum Press, 1978.
  • [38] Jaffar J, Maher MJ, Marriott K, Stuckey PJ. The Semantics of Constraint Logic Programs. J. Log. Program., 1998. 37(1-3).
  • [39] Mian US, den Hartog J, S Etalle NZ. Auditing with incomplete logs. In: Proc. of HotSpot. 2015.
  • [40] Mancarella P, Terreni G, Sadri F, Toni F, Endriss U. The CIFF proof procedure for abductive logic programming with constraints: Theory, implementation and experiments. TPLP, 2009. 9(6).
  • [41] Montali M, Pesic M, van der Aalst WMP, Chesani F, Mello P, Storari S. Declarative specification and verification of service choreographiess. TWEB, 2010. 4(1).
  • [42] Bettini C, Wang XS, Jajodia S. Temporal Reasoning in Workflow Systems. Distributed and Parallel Databases, 2002. 11(3):269-306.
  • [43] Combi C, Gozzi M, Posenato R, Pozzi G. Conceptual modeling of flexible temporal workflows. TAAS, 2012. 7(2):19.
  • [44] Eder J, Gruber W, Panagos E. Temporal modeling of workflows with conditional execution paths. In: Database and Expert Systems Applications. Springer, 2000 pp. 243-253.
  • [45] Combi C, Hunsberger L, Posenato R. An Algorithm for Checking the Dynamic Controllability of a Conditional Simple Temporal Network with Uncertainty - Revisited. In: Agents and Artificial Intelligence - 5th International Conference, ICAART 2013, Barcelona, Spain, February 15-18, 2013. Revised Selected Papers. 2013 pp. 314-331. doi:10.1007/978-3-662-44440-5\_19. URL http://dx.doi.org/10.1007/978-3-662-44440-5\_19.
  • [46] Governatori G, Milosevic Z, Sadiq S. Compliance Checking Between Business Processes and Business Contracts. In: Proc. of EDOC. IEEE Computing Society, 2006 pp. 221-232.
  • [47] Maggi FM, Montali M, van der Aalst WMP. An Operational Decision Support Framework for Monitoring Business Constraints. In: FASE, volume 7212 of LNCS. Springer, 2012 pp. 146-162.
  • [48] Vidal T, Fargier H. Handling contingency in temporal constraint networks: from consistency to controllabilities. Journal of Experimental and Theoretical Artificial Intelligence, 1999. 11:23-45.
  • [49] Dechter R, Meiri I, Pearl J. Temporal constraint networks. Artificial Intelligence, 1991. 49(1):61-95.
  • [50] Lombardi M, Milano M, Benini L. Robust Scheduling of Task Graphs under Execution Time Uncertainty. IEEE Trans. Computers, 2013. 62(1):98-111.
  • [51] Cimatti A, Micheli A, Roveri M. Strong Temporal Planning with Uncontrollable Durations: A State-Space Approach. In: Proc. of AAAI. 2015 pp. 3254-3260.
  • [52] Taghiabadi ER, Fahland D, van Dongen BF, van der Aalst WMP. Diagnostic Information for Compliance Checking of Temporal Compliance Requirements. In: CAiSE, volume 7908 of LNCS. Springer. ISBN 978-3-642-38708-1, 2013 pp. 304-320.
  • [53] Rozinat A, van der Aalst WMP. Conformance Checking of Processes Based on Monitoring Real Behavior. Inf. Syst., 2008. 33(1):64-95.
  • [54] Lanz A, Posenato R, Combi C, Reichert M. Controllability of Time-Aware Processes at Run Time. In: OTM Conferences, volume 8185 of Lecture Notes in Computer Science. Springer. ISBN 978-3-642-41029-1, 2013 pp. 39-56. URL http://dblp.uni-trier.de/db/conf/otm/otm2013.html#LanzPCR13.
  • [55] Barba I, Weber B, Del Valle C. Supporting the Optimized Execution of Business Processes through Recommendations. In: Business Process Management Workshops (1), volume 99 of LNBIP. Springer, 2011 pp. 135-140.
  • [56] Schonenberg H, Weber B, Dongen B, Aalst W. Supporting Flexible Processes Through Recommendations Based on History. In: Dumas M, Reichert M, Shan M(eds.), International Conference on Business Process Management (BPM 2008), volume 5240 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2008 pp. 51-66.
  • [57] van der Aalst WMP, Schonenberg MH, Song M. Time Prediction Based on Process Mining. Inf. Syst., 2011. 36(2):450-475. doi:10.1016/j.is.2010.09.001.
  • [58] Montali M. Specification and Verification of Declarative Open Interaction Models: a Logic-Based Approach, volume 56 of LNBIP. Springer, 2010.
  • [59] Denecker M, Kakas AC. Abduction in Logic Programming. In: Kakas and Sadri [60], 2002 pp. 402-436. doi:10.1007/3-540-45628-7\_16.
  • [60] Kakas AC, Sadri F (eds.). Computational Logic: Logic Programming and Beyond, Essays in Honour of Robert A. Kowalski, Part I, volume 2407 of Lecture Notes in Computer Science. Springer, 2002. ISBN 3-540-43959-5.
  • [61] Rogge-Solti A, Kasneci G. Temporal Anomaly Detection in Business Processes. In: Business Process Management - 12th International Conference, BPM 2014, Haifa, Israel, September 7-11, 2014. Proceedings. 2014 pp. 234-249. doi:10.1007/978-3-319-10172-9\_15.
  • [62] Chesani F, De Masellis R, Francescomarino CD, Ghidini C, Mello P, Montali M, Tessaris S. Abducing Compliance of Incomplete Event Logs. In: Adorni et al. [63], 2016 pp. 208-222. doi:10.1007/978-3-319-49130-1_16. URL http://dx.doi.org/10.1007/978-3-319-49130-1_16.
  • [63] Adorni G, Cagnoni S, Gori M, Maratea M (eds.). AI*IA 2016: Advances in Artificial Intelligence – XVth International Conference of the Italian Association for Artificial Intelligence, Genova, Italy, November 29 - December 1, 2016, Proceedings, volume 10037 of Lecture Notes in Computer Science. Springer, 2016. ISBN 978-3-319-49129-5. doi:10.1007/978-3-319-49130-1. URL http://dx.doi.org/10.1007/978-3-319-49130-1.
  • [64] Chesani F, De Masellis R, Francescomarino CD, Ghidini C, Mello P, Montali M, Tessaris S. Abducing Workflow Traces: A General Framework to Manage Incompleteness in Business Processes. In: Kaminka et al. [65], 2016 pp. 1734-1735. doi:10.3233/978-1-61499-672-9-1734. URL http://dx.doi.org/10.3233/978-1-61499-672-9-1734.
  • [65] Kaminka GA, Fox M, Bouquet P, Hüllermeier E, Dignum V, Dignum F, van Harmelen F (eds.). ECAI 2016 - 22nd European Conference on Artificial Intelligence, 29 August-2 September 2016, The Hague, The Netherlands - Including Prestigious Applications of Artificial Intelligence (PAIS 2016), volume 285 of Frontiers in Artificial Intelligence and Applications. IOS Press, 2016. ISBN 978-1-61499-671-2.
  • [66] Alberti M, Chesani F, Gavanelli M, Lamma E, Mello P, Torroni P. Verifiable Agent Interaction in Abductive Logic Programming: the SCIFF proof-procedure. Technical Report DEIS-LIA-06-001, University of Bologna (Italy), 2006. LIA Series no. 75.
  • [67] Baral C. Knowledge Representation, Reasoning, and Declarative Problem Solving. Cambridge University Press, New York, NY, USA, 2003. ISBN 0521818028.
Uwagi
Opracowanie rekordu w ramach umowy 509/P-DUN/2018 ze środków MNiSW przeznaczonych na działalność upowszechniającą naukę (2018).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-56e708f5-0457-495c-83c1-a27f6dd838a8
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.