TL;DR: It is shown that some classes of history-dependent nets can be automatically converted to classical Petri nets for analysis purposes and some classes are characterized by the form of the guards and sometimes the additional requirement that the underlying Classical Petri net is either bounded or has finite synchronization distances.
Abstract: Most information systems that are driven by process models (e.g., workflow management systems) record events in event logs, also known as transaction logs or audit trails. We consider processes that not only keep track of their history in a log, but also make decisions based on this log. To model such processes we extend the basic Petri net framework with the notion of history and add guards to transitions evaluated on the process history. We show that some classes of history-dependent nets can be automatically converted to classical Petri nets for analysis purposes. These classes are characterized by the form of the guards (e.g., LTL guards) and sometimes the additional requirement that the underlying classical Petri net is either bounded or has finite synchronization distances.
Numerous state-of-the-art enterprise information systems contain a workflow engine, which keeps track of all events as a part of its basic functionality.
To ensure safety, the authors require that b can fire only if the right traffic light is red, i.e., transitions d and e have fired the same number of times.
Global history is in fact a special case of token history for transparent systems where all components are aware of the actions of other components.
By introducing history-dependent guards, the authors increase the expressive power.
Since, the authors are interested not only in modeling but also in verification, they identify a number of important classes of global history nets (e.g. nets with LTL guards) that can be transformed to bisimilar classical Petri nets and provide corresponding transformations.
2 Preliminaries
The authors identify a bag with all elements occurring only once with the set containing the elements of the bag.
The authors overload the set notation, writing ∅ for the empty bag and ∈ for the element inclusion.
For sequences of elements over a set P the authors use the following notation:.
The authors will drop N and write R(m) when no ambiguity can arise.
A marked net (N, m0) is called bounded if its reachability set is finite.
3 Event History and History Logic
In this section the authors present the general notion of event history.
In the coming sections the authors investigate two kinds of nets that use event history: token history nets and global history nets.
Information on the relative order of events registered by different components might be missing.
Sets of formulae, terms and label expressions over Σ are denoted as FΣ, QΣ and LΣ, respectively.
One can show that for closed terms and formulae, i.e., terms and formulae where all variables appear in the scope of #, the result of the evaluation does not depend on ν.
4 Token History Nets
In this section the authors introduce token history nets as a special class of colored Petri nets [11] with history as color.
Recall that the union of two histories is defined for consistent histories only.
The following lemma states that consistency of markings is an invariant property (observe that a transition firing cannot destroy consistency).
To conclude this section the authors illustrate the semantics of token history nets.
The transition labeled d can fire consuming tokens [(p, H1)] and [(q, H3)] since the tokens share event e1 in their history.
5 Global History Nets
Where history is a separate object accessible when the guards of transitions are evaluated.the authors.
One can simulate inhibitor arcs by adding the condition m0(p) − #p + #p = 0. Since inhibitor nets are known to be Turing complete (cf. [17]), global history nets with unique labels are Turing complete as well.the authors.
Observe that in general it is impossible to derive the corresponding token histories from the history of a global history net.
It is easy to show that both nets are indeed bisimilar.
6 Global History Nets with Counting Formulae Guards
I.e., formulae that do not explore the precedence of events ≺.the authors.
Note that global history nets with counting formulae guards are Turing complete since they allow zero testing on the marking of a place.
To facilitate simulation and validation of these nets, the authors show that every global history net with counting formulae guards can be transformed into a bisimilar inhibitor net.
Furthermore, the authors identify conditions on the global history net implying that the net can be translated to a bisimilar classical Petri net.
6.1 Nets with Counting Formulae as Guards vs. Inhibitor Nets
For the sake of brevity the authors call these expressions basic counting formulae (over A and B).
The process terminates when all guards are true, i.e. the authors obtained a regular inhibitor net.
Figure 5 shows the basic idea of the eliminating a transition with guard g(t).
First the authors transform their net to a net where all guards are conjunctions of basic counting formulae by applying the following construction:.
The latter observation motivates their interest in the existence of a classical Petri net bisimilar to a global history net.
6.2 Guards Depending on the Marking Only
In this subsection the authors give conditions on the guards that allow a transformation into an equivalent bounded Petri net.
So global history nets satisfying these conditions will accept regular languages.
The authors consider here guards that depend only on the marking.
6.3 Counting Formulae with Bounded Synchronization Distance
The authors use here an important concept in Petri nets introduced by Carl Adam Petri: synchronization distance [4,7,13].
The authors use a generalization of this notion, the so-called y-distance [16].
If the authors take the underlying classical Petri net, the transitions are completely independent of each other and the y-distance is ∞ for any weight vector with at least one positive component.
(Idea) Disjunctions and conjunctions are taken care of as in Theorem 19.
7 Global History Nets with LTL Guards
Now the authors consider the class of global history nets with LTL guards.
While LTL formulae over infinite traces can be translated to Büchi automata, LTL formulae over finite traces can be translated to finite automata. [5] presents a translation algorithm that modifies standard LTL to Büchi automata conversion techniques to generate finite automata that accept finite traces satisfying LTL formulae.
The main aspect of modification there is the selection of accepting conditions.
Fig. 8 shows a simplistic example for a credit card company, where a credit card can be issued, reported lost, used for a payment or cancelled.
Note that this net can perform an arbitrary sequence of steps, and the place “true” has a token when the guard on the history should be evaluated to true and “false” when the guard should be evaluated to false.
8 Related Work
Histories and related notions such as event systems [19] and pomsets [8,3] have been used in the past to provide causality-preserving semantics for Petri nets.
The authors do not make this notion of history explicit nor do they discuss additional operations that can be performed on histories.
The authors believe that the ability to express dependencies on previous firings explicitly is the principal advantage of their approach.
Operations on pomsets similar to their union and intersection appeared under different names in [6,14,18].
Unlike their work, Theorem 23 demands being in a group-B-fair relation only for sets of transitions corresponding to sets of labels used in the guards.
9 Conclusion
In this paper the authors emphasize the importance of taking history into account while modelling processes.
Historical information is present in most state-of-the-art enterprise information systems.
The guard language will allow to evaluate conditions both on separate tokens and on their combinations.
The authors are going to develop a method for transforming broader subclasses of global history nets to classical and inhibitor Petri nets.
The authors are grateful to Jan Hidders and Jan Paredaens for a number of fruitful discussions at the early stages of this research.
TL;DR: A weighted fuzzy reasoning algorithm is designed to address the reasoning problem of uncertain goal propositions and known goal concepts by combining forward reasoning with backward reasoning and therefore to facilitate cause analysis and handling of workflow exceptions.
Abstract: Exception handling plays a key role in dynamic workflow management that enables streamlined business processes. Handling application-specific exceptions is a knowledge-intensive process involving different decision-making strategies and a variety of knowledge, especially much fuzzy knowledge. Current efforts in workflow exception management are not adequate to support the knowledge-based exception handling. This paper proposes a hybrid exception handling approach based on two extended knowledge models, i.e., generalized fuzzy event-condition-action (GFECA) rule and typed fuzzy Petri net extended by process knowledge (TFPN-PK). The approach realizes integrated representation and reasoning of fuzzy and non-fuzzy knowledge as well as specific application domain knowledge and workflow process knowledge. In addition, it supports two handling strategies, i.e., direct decision and analysis-based decision, during exception management. The approach fills in the gaps in existing related researches, i.e., only providing the capability of direct exception handling and neglecting fuzzy knowledge. Based on TFPN-PK, a weighted fuzzy reasoning algorithm is designed to address the reasoning problem of uncertain goal propositions and known goal concepts by combining forward reasoning with backward reasoning and therefore to facilitate cause analysis and handling of workflow exceptions. A prototype system is developed to implement the proposed approach.
TL;DR: A semantic model for scenarios that seamlessly integrates scenario-based specifications and state-based implementations is introduced, and a minimal set of notions to specify the behavior of distributed systems with scenarios are identified, called oclets.
Abstract: Scenario-based modeling has evolved as an accepted paradigm for developing complex systems of various kinds. Its main purpose is to ensure that a system provides desired behavior to its users. A scenario is generally understood as a behavioral requirement, denoting a course of actions that shall occur in the system. A typical notation of a scenario is a Message Sequence Chart or, more general, a finite partial order of actions. A specification is a set of scenarios. Intuitively, a system implements a specification if all scenarios of the specification can occur in the system. The main challenge in this approach is to systematically synthesize from a given scenario-based specification state-based components which together implement the specification; preferably to be achieved automatically. A further challenge is to analyze scenarios to avoid erroneous specifications. Existing scenario-based techniques exhibit a conceptual and formal gap between a scenariobased specification on the one hand and a state-based implementation on the other hand. This gap often renders synthesis surprisingly complex, and obscures the relationship between a specification and its implementation. Additionally, existing techniques for analyzing implementations cannot immediately be re-used for analyzing specifications, and vice versa. In this thesis, we introduce a semantic model for scenarios that seamlessly integrates scenario-based specifications and state-based implementations. We focus on modeling and analyzing the control-flow of systems. Technically, we use Petri nets together with the well established notion of distributed runs for (a) describing the semantics of scenarios, for (b) systematically constructing and analyzing a specification, and for (c) synthesizing an implementation from a given specification. Our first contribution is to identify a minimal set of notions to specify the behavior of distributed systems with scenarios. We formalize these notions in a novel semantic model for scenarios, called oclets. Oclets combine formal notions from Petri net theory with formal notions from scenario-based techniques in a unified way. We define a classical declarative semantics for scenario-based specifications which defines when a given set of runs satisfies a given specification. These semantics are compositional : a set of runs satisfies a composition of two specifications iff it satisfies each of the specifications. We then provide composition and decomposition operators on oclets and relations for comparing oclets. Using these notions, we systematically derive for each scenario-based specification S the behavior exhibited by a minimal implementation of S. The second contribution of this thesis aims at closing the conceptual and methodological gap between scenario-based specifications and state-based system models. In our approach, the semantics of scenarios and the semantics of systems both employ the same notions from Petri nets. We provide operational semantics for scenario-based specifications. On the basis of these operational semantics, we consider the problems of analyzing behavioral properties of specifications and of synthesizing components that implement the specification. We show that these problems are undecidable in general and we present a sufficient property for the decidable case. We then present algorithms for analysis and synthesis. We derive these results by generalizing existing techniques from Petri nets to the domain of scenario-based specifications. We implemented our algorithms for simulating, analyzing, and synthesizing from scenariobased specifications in our tool Greta. We report on an industrial case study that shows the feasibility of our techniques.
26 citations
Cites background from "History-dependent Petri nets"
...[120] define history-dependent Petri nets in which each token records its history....
TL;DR: The adaptive workflow nets framework allows both healthcare providers and patients to get an insight into the past and current processes, but also foresee possible future developments, and ensures quality and timing of data communication essential for efficient information flow.
Abstract: Current challenges in Healthcare Information Systems (HIS) include supplying patients with personalized medical information, creating means for efficient information flow between different healthcare providers in order to lower risks of medical errors and increase the quality of care. To address these challenges, the information about patient-related processes, such as currently executed medical protocols, should be made available for medical staff and patients. Existing HIS are mostly data-centered, and therefore cannot provide an adequate solution. To give processes a prominent role in HIS, we apply the adaptive workflow nets framework. This framework allows both healthcare providers and patients to get an insight into the past and current processes, but also foresee possible future developments. It also ensures quality and timing of data communication essential for efficient information flow.
22 citations
Cites background or methods from "History-dependent Petri nets"
...Global history nets [12] further extend Petri nets by assuming the availability of a history record, registering all firings and the time of firing together with the information which process performed it....
[...]
...Our approach relies on the framework of adaptive workflow nets [10,12]....
TL;DR: A new decision procedure is given for generalized soundness and a logic, called LogLogics, is introduced for the specification of guards based on a log of a current running process and an evaluation algorithm for such guards are given.
Abstract: In this thesis we focus on improving current modeling and verification techniques for complex business processes. The objective of the thesis is to consider several aspects of real-life business processes and give specific solutions to cope with their complexity. In particular, we address verification of a proper termination property for workflows, called generalized soundness. We give a new decision procedure for generalized soundness that improves the original decision procedure. The new decision procedure reports on the decidability status of generalized soundness and returns a counterexample in case the workflow net is not generalized sound. We report on experimental results obtained with the prototype implementation we made and describe how to verify large workflows compositionally, using reduction rules. Next, we concentrate on modeling and verification of adaptive workflows — workflows that are able to change their structure at runtime, for instance when some exceptional events occur. In order to model the exception handling properly and allow structural changes of the system in a modular way, we introduce a new class of nets, called adaptive workflow nets. Adaptive workflow nets are a special type of Nets in Nets and they allow for creation, deletion and transformation of net tokens at runtime and for two types of synchronizations: synchronization on proper termination and synchronization on exception. We define some behavioral properties of adaptive workflow nets: soundness and circumspectness and employ an abstraction to reduce the verification of these properties to the verification of behavioral properties of a finite state abstraction. Further, we study how formal methods can help in understanding and designing business processes. We investigate this for the extended event-driven process chains (eEPCs), a popular industrial business process language used in the ARIS Toolset. Several semantics have been proposed for EPCs. However, most of them concentrated solely on the control flow. We argue that other aspects of business processes must also be taken into account in order to analyze eEPCs and propose a semantics that takes data and time information from eEPCs into account. Moreover, we provide a translation of eEPCs to Timed Colored Petri nets in order to facilitate verification of eEPCs. Finally, we discuss modeling issues for business processes whose behavior may depend on the previous behavior of the process, history which is recorded by workflow management systems as a log. To increase the precision of models with respect to modeling choices depending on the process history, we introduce history-dependent guards. The obtained business processes are called historydependent processes.We introduce a logic, called LogLogics for the specification of guards based on a log of a current running process and give an evaluation algorithm for such guards. Moreover, we show how these guards can be used in practice and define LogLogics patterns for properties that occur most commonly in practice.
TL;DR: This work extends the basic Petri net framework with the notion of history and adds guards to transitions evaluated on the process history, and shows that some classes of historydependent nets can be automatically converted to classical Petri nets for analysis purposes.
Abstract: Most information systems that are driven by processmodels (e.g., workflowmanagement systems) record events in event logs, also known as transaction logs or audit trails. We consider processes that not only keep track of their history in a log, but also make decisions based on this log. To model such processes we extend the basic Petri net framework with the notion of history and add guards to transitions evaluated on the process history. We show that some classes of historydependent nets can be automatically converted to classical Petri nets for analysis purposes. Some of these classes are characterized by the form of the guards (e.g., LTL+Past guards), while others by restrictions on the underlying classical Petri net.
6 citations
Cites background from "History-dependent Petri nets"
...In this paper, which is a revised version of [17], we consider processes that not only record the events but also make choices based on the previous events, i.e. based on its history....
TL;DR: This book is a rigorous exposition of formal languages and models of computation, with an introduction to computational complexity, appropriate for upper-level computer science undergraduates who are comfortable with mathematical arguments.
Abstract: This book is a rigorous exposition of formal languages and models of computation, with an introduction to computational complexity. The authors present the theory in a concise and straightforward manner, with an eye out for the practical applications. Exercises at the end of each chapter, including some that have been solved, help readers confirm and enhance their understanding of the material. This book is appropriate for upper-level computer science undergraduates who are comfortable with mathematical arguments.
13,779 citations
"History-dependent Petri nets" refers background in this paper
...Therefore, they can be made deterministic and minimized with standard algorithms [10]....
TL;DR: The third volume of a definitive work on coloured Petri nets as discussed by the authors contains a detailed presentation of 19 applications of CP-nets across a broad range of application areas, including a security system, ATM networks, audio/video systems, transaction processing, ISDN services, VLSI chips, document storage, distributed programming, electronic funds transfer, a naval vessel, chemical processing, nuclear waste management, and many more.
Abstract: This is the third volume of a definitive work on coloured Petri nets. It contains a detailed presentation of 19 applications of CP-nets across a broad range of application areas, including a security system, ATM networks, audio/video systems, transaction processing, ISDN services, VLSI chips, document storage, distributed programming, electronic funds transfer, a naval vessel, chemical processing, nuclear waste management, and many more. Most of the projects were carried out in an industrial setting, and in each case the original authors have cooperated with the author and approved the new presentation. The author has taken care to unify the terminology and the CPN diagrams and to ensure that the background knowledge required has been provided in the first two volumes of the work.
TL;DR: This is the third volume of a definitive work on coloured Petri nets and contains a detailed presentation of 19 applications of CP-nets across a broad range of application areas, including a security system, ATM networks, audio/video systems, transaction processing, ISDN services, VLSI chips, document storage, distributed programming, electronic funds transfer, and many more.
Abstract: This is the third volume of a definitive work on coloured Petri nets. It contains a detailed presentation of 19 applications of CP-nets across a broad range of application areas, including a security system, ATM networks, audio/video systems, transaction processing, ISDN services, VLSI chips, document storage, distributed programming, electronic funds transfer, a naval vessel, chemical processing, nuclear waste management, and many more. Most of the projects were carried out in an industrial setting, and in each case the original authors have cooperated with the author and approved the new presentation. The author has taken care to unify the terminology and the CPN diagrams and to ensure that the background knowledge required has been provided in the first two volumes of the work.
TL;DR: In this paper, the authors present an introduction to some of the basic issues in the study of program logics and discuss their syntax, semantics, proof theory, and expressiveness.
Abstract: Publisher Summary This chapter presents an introduction to some of the basic issues in the study of program logics. The chapter describes various forms of first-order Dynamic Logic and discusses their syntax, semantics, proof theory, and expressiveness. The chapter discusses the power of auxiliary data structures such as arrays and stacks, and a powerful assignment statement called the nondeterministic assignment. Program logics differ from classical logics in that truth is dynamic rather than static. In classical predicate logic, the truth value of a formula is determined by a valuation of its free variables over some structure. The valuation and the truth value of the formula it induces are regarded as immutable. In program logics, there are explicit syntactic constructs called programs to change the values of variables, thereby changing the truth values of formulas. There are two main approaches to modal logics of programs: (1) the exogenous approach, exemplified by Dynamic Logic and its precursor, the Partial Correctness Assertions Method; and (2) the endogenous approach, exemplified by Temporal Logic and its precursor, the Inductive Assertions Method.
Q1. What are the future works in "History-dependent petri nets" ?
The authors have provided means to model history-dependent processes by extending the classical Petri nets model and considered two ways of incorporating history: token history nets and global history nets. Future work. For the future work the authors plan to adapt their token net framework for modelling component-based systems. The authors intend to extend the language of operations on histories by adding projection in order to allow information hiding and intersection to check disjointness/presence of common parts in token histories.
Q2. What have the authors contributed in "History-dependent petri nets" ?
The authors consider processes that not only keep track of their history in a log, but also make decisions based on this log. The authors show that some classes of historydependent nets can be automatically converted to classical Petri nets for analysis purposes.