Logo PTI
Polish Information Processing Society
Logo FedCSIS

Annals of Computer Science and Information Systems, Volume 15

Proceedings of the 2018 Federated Conference on Computer Science and Information Systems

Generation of Synthetic Business Process Traces using Constraint Programming

, , ,

DOI: http://dx.doi.org/10.15439/2018F131

Citation: Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, M. Ganzha, L. Maciaszek, M. Paprzycki (eds). ACSIS, Vol. 15, pages 445453 ()

Full text

Abstract. Juxtapositioning manually created business process models with diagrams generated using process discovery algorithms exposes high complexity of the latter. As a consequence, their formal verification requires significant computational resources due to a large state space. Nevertheless, an analysis of the generated model is needed to assure its correctness and the ability to represent source data. As a solution to this problem, we present an approach for constraint-based generation of a~complete workflow log for a given BPMN model. We propose a method to extract directed subgraphs representing token flows in the process, together with a set of predefined constraints which ensure the correctness of the generated traces. The obtained results can be then compared to the original workflow log used for process discovery in order to verify the obtained model.

References

  1. J. R. Nawrocki, T. Nedza, M. Ochodek, and L. Olek, “Describing business processes with use cases,” in BIS, 2006, pp. 13–27.
  2. K. Kluza and K. Honkisz, “From SBVR to BPMN and DMN models. proposal of translation from rules to process and decision models,” in Artificial Intelligence and Soft Computing: 15th International Conference, ICAISC 2016, Zakopane, Poland, June 12-16, 2016, Proceedings, Part II, ser. Lecture Notes in Computer Science, L. Rutkowski, M. Korytkowski, R. Scherer, R. Tadeusiewicz, L. A. Zadeh, and J. M. Zurada, Eds. Springer International Publishing, 2016, vol. 9693, pp. 453–462.
  3. F. Friedrich, J. Mendling, and F. Puhlmann, “Process model generation from natural language text,” in Advanced Information Systems Engineering. Springer, 2011, pp. 482–496.
  4. K. Kluza and P. Wiśniewski, “Spreadsheet-based business process modeling,” in Computer Science and Information Systems (FedCSIS), 2016 Federated Conference on. IEEE, 2016, pp. 1355–1358.
  5. A. A. Kalenkova, W. M. van der Aalst, I. A. Lomazova, and V. A. Rubin, “Process mining using BPMN: relating event logs and process models,” Software & Systems Modeling, vol. 16, no. 4, pp. 1019–1048, 2017.
  6. W. M. Van Der Aalst, “A general divide and conquer approach for process mining,” in Computer Science and Information Systems (FedCSIS), 2013 Federated Conference on. IEEE, 2013, pp. 1–10.
  7. A. Rozinat, A. K. A. de Medeiros, C. W. Günther, A. Weijters, and W. M. van der Aalst, “The need for a process mining evaluation framework in research and practice,” in International Conference on Business Process Management. Springer, 2007, pp. 84–89.
  8. S. Suriadi, R. Andrews, A. H. ter Hofstede, and M. T. Wynn, “Event log imperfection patterns for process mining: Towards a systematic approach to cleaning event logs,” Information Systems, vol. 64, pp. 132–150, 2017.
  9. A. Rozinat and R. Mans, “Mining cpn models: discovering process models with data from event logs,” in In Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN. Citeseer, 2006.
  10. A. Rozinat, A. A. De Medeiros, C. W. Günther, A. Weijters, and W. M. Van der Aalst, “Towards an evaluation framework for process mining algorithms,” BPM Center Report BPM-07-06, BPMcenter. org, vol. 123, p. 142, 2007.
  11. W. M. van der Aalst, H. De Beer, and B. F. van Dongen, “Process mining and verification of properties: An approach based on temporal logic,” in OTM Confederated International Conferences" On the Move to Meaningful Internet Systems". Springer, 2005, pp. 130–147.
  12. D. Loreti, F. Chesani, A. Ciampolini, and P. Mello, “A distributed approach to compliance monitoring of business process event streams,” Future Generation Computer Systems, 2018.
  13. F. Chesani, A. Ciampolini, D. Loreti, and P. Mello, “Abduction for generating synthetic traces,” in International Conference on Business Process Management. Springer, 2017, pp. 151–159.
  14. M. Weske, Business Process Management: Concepts, Languages, Architectures 2nd Edition. Springer, 2012.
  15. T. H. Davenport, Process Innovation: Reengineering Work Through Information Technology. Boston, MA, USA: Harvard Business School Press, 1993.
  16. M. Hammer and J. Champy, Reengineering the Corporation: A Manifesto for Business Revolution. New York, NY, USA: Harper Business, 1993.
  17. S. A. White and D. Miers, BPMN Modeling and Reference Guide: Understanding and Using BPMN. Lighthouse Point, Florida, USA: Future Strategies Inc., 2008.
  18. A. Lindsay, A. Dawns, and K. Lunn, “Business processes - attempts to find a definition,” Information and Software Technology, vol. 45, no. 15, pp. 1015–1019, December 2003, elsevier.
  19. H.-E. Eriksson and M. Penker, Business Modeling with UML: Business Patterns at Work. Wiley, 2000.
  20. I. Jacobson, M. Ericsson, and A. Jacobson, The object advantage: business process reengineering with object technology. New York, NY, USA: ACM Press/Addison-Wesley Publishing Co., 1994.
  21. N. Melao and M. Pidd, “A conceptual framework for understanding business processes and business process modelling,” Information Systems Journal, vol. 10, no. 2, pp. 105–129, 2000.
  22. M. Owen and J. Raj, “BPMN and Business Process Management. Introduction to the new business process modeling standard.” OMG, Tech. Rep., 2006, www.bpmn.org.
  23. W. van der Aalst, “Business process management: a personal view,” Business Process Management Journal, vol. 10, no. 2, 2004.
  24. WfMC, “Workfow Management Coalition,” http://www.wfmc.org/.
  25. P. Lawrence, Ed., Workflow Handbook. New York, NY, USA: John Wiley & Sons, Inc., 1997.
  26. M. zur Muehlen and D. T.-Y. Ho, “Risk management in the BPM lifecycle,” in Business Process Management Workshops, 2005, pp. 454–466.
  27. W. Van der Aalst, T. Weijters, and L. Maruster, “Workflow mining: Discovering process models from event logs,” IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 9, pp. 1128–1142, 2004.
  28. P. Wiśniewski, “Decomposition of business process models into reusable sub-diagrams,” in ITM Web of Conferences, vol. 15. EDP Sciences, 2017, p. 01002.
  29. W. Van Der Aalst, A. Adriansyah, A. K. A. De Medeiros, F. Arcieri, T. Baier, T. Blickle, J. C. Bose, P. van den Brand, R. Brandtjen, J. Buijs et al., “Process mining manifesto,” in International Conference on Business Process Management. Springer, 2011, pp. 169–194.
  30. W. M. P. van der Aalst, Process Mining: Discovery, Conformance and Enhancement of Business Processes, 1st ed. Springer Publishing Company, Incorporated, 2011.
  31. A. A. Kalenkova, M. de Leoni, and W. M. van der Aalst, “Discovering, analyzing and enhancing BPMN models using ProM?” in Business Process Management-12th International Conference, BPM, 2014, pp. 7–11.
  32. A. Rozinat and W. M. van der Aalst, “Decision mining in prom,” in Business Process Management, ser. Lecture Notes in Computer Science. Springer, 2006, vol. 4102, pp. 420–425.
  33. A. Suchenia (Mroczek), P. Wiśniewski, and A. Ligęza, “Overview of verification tools for business process models,” in Communication Papers of the 2017 Federated Conference on Computer Science and Information Systems, ser. Annals of Computer Science and Information Systems, M. Ganzha, L. Maciaszek, and M. Paprzycki, Eds., vol. 13. PTI, 2017, pp. 295–302. [Online]. Available: http://dx.doi.org/10.15439/2017F308
  34. J. M. E. Van der Werf, B. F. van Dongen, C. A. Hurkens, and A. Serebrenik, “Process discovery using integer linear programming,” in International conference on applications and theory of petri nets. Springer, 2008, pp. 368–387.
  35. K. Kluza and G. J. Nalepa, “Proposal of square metrics for measuring business process model complexity,” in Proceedings of the Federated Conference on Computer Science and Information Systems – FedCSIS 2012, Wroclaw, Poland, 9-12 September 2012, M. Ganzha, L. A. Maciaszek, and M. Paprzycki, Eds., 2012, pp. 919–922. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6354395
  36. J. Cardoso, J. Mendling, G. Neumann, and H. A. Reijers, “A discourse on complexity of process models,” in Proceedings of the 2006 international conference on Business Process Management Workshops, Vienna, Austria, ser. BPM’06, S. D. e. a. J. Eder, Ed. Berlin, Heidelberg: Springer-Verlag, 2006, pp. 117–128.
  37. M. Chinosi and A. Trombetta, “BPMN: An introduction to the standard,” Computer Standards & Interfaces, vol. 34, no. 1, pp. 124–134, 2012.
  38. V. S. W. Lam, “A precise execution semantics for BPMN,” IAENG International Journal of Computer Science (IJCS), vol. 39, no. 1, pp. 20–33, 2012.
  39. R. M. Dijkman, M. Dumas, and C. Ouyang, “Semantics and analysis of business process models in BPMN,” Information and Software technology, vol. 50, no. 12, pp. 1281–1294, 2008.
  40. J. Mendling, H. A. Reijers, and W. M. van der Aalst, “Seven process modeling guidelines (7pmg),” Information and Software Technology, vol. 52, no. 2, pp. 127–136, 2010.
  41. C. Favre and H. Völzer, “The difficulty of replacing an inclusive OR-join,” in International Conference on Business Process Management. Springer, 2012, pp. 156–171.
  42. R. Klimek, L. Faber, and M. Kisiel-Dorohinicki, “Verifying data integration agents with deduction-based models,” in Computer Science and Information Systems (FedCSIS), 2013 Federated Conference on. IEEE, 2013, pp. 1029–1035.
  43. P. Sitek and J. Wikarek, “A hybrid method for modeling and solving constrained search problems,” in Computer Science and Information Systems (FedCSIS), 2013 Federated Conference on. IEEE, 2013, pp. 385–392.
  44. A. Ligęza, “Models and tools for improving efficiency in constraint logic programming,” Decision Making in Manufacturing and Services, vol. 5, no. 1, pp. 69–78, 2011. [Online]. Available: https://journals.agh.edu.pl/dmms/article/view/537
  45. P. Wiśniewski, K. Kluza, M. Ślażyński, and A. Lig ̨eza, “Constraint-based composition of business process models,” in International Conference on Business Process Management. Springer, 2017, pp. 133–141.
  46. P. van Beek and X. Chen, “Cplan: A constraint programming approach to planning,” in Proceedings of the Sixteenth National Conference on Artificial Intelligence and the Eleventh Innovative Applications of Artificial Intelligence Conference Innovative Applications of Artificial Intelligence, ser. AAAI ’99/IAAI ’99. Menlo Park, CA, USA: American Association for Artificial Intelligence, 1999, pp. 585–590. [Online]. Available: http://dl.acm.org/citation.cfm?id=315149.315406
  47. J. C. Buijs, B. F. Van Dongen, and W. M. van Der Aalst, “On the role of fitness, precision, generalization and simplicity in process discovery,” in OTM Confederated International Conferences" On the Move to Meaningful Internet Systems". Springer, 2012, pp. 305–322.