Discovering Target-Branched Declare Constraints
VerifiedAdded on 2023/03/30
|11
|2667
|254
AI Summary
This article discusses the process of discovering target-branched declare constraints in business process management. It explains the importance of process mining and the use of declarative models. The article explores the concept of target-branched declare constraints and their implications. It also provides insights on how to mine these constraints efficiently and effectively, with examples from real-world event logs and case studies.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Discovering Target-Branched Declare Constraints
(Claudio Di Ciccio , Fabrizio Maria Maggi , and Jan Mendling)
Student Name
Institution Affiliation
1
(Claudio Di Ciccio , Fabrizio Maria Maggi , and Jan Mendling)
Student Name
Institution Affiliation
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
DISCOVERING TARGET-BRANCHED DECLARE CONSTRAINTS
Introduction
Process discovery can be described as a significant first step in business process
management. Through it, one is able to arrive at the as-is model of a research process. The step is
however highly complex and time-consuming giving the necessity to employ techniques capable
of automatically discovering a process scheme from the logs event. The data log is usually
derived from information systems supporting sections or the whole process. The results are
displayed in the representation of a flow chart (Petri net). The immediate discovery process can
also be denoted as process mining. The assignment will typically dwell on some of the essential
Declare concepts providing formal basis for Target-Branched constraint mining. Other sections
to be featured in the assignment include the performance evaluation and investigation
contribution sections.
Body
Since process mining is a complex and useful approach when it comes to standardized
and structured processes, a lot of arguments have been raised on how effective mining can be
realized from processes with high variable rates (Feshland et al, 2009). In such a case, the
declarative process model can serve as a viable approach to processes with high variability
degrees. This model prioritizes on showing behavioral constraints rather than the execution
sequences. The results are outlaid in the Declare language. In numerous cases, the models
provide a simple way of representing unstructured and complex behavior which through the Petri
net representation would seem highly complex,(Di Ciccio et al., 2012). It should however be
noted that in Declare models, it’s quite complex to mine simple relative statements, for instance,
“if you carry out a, you eventually will have to do b or c. To address the Declare mining issue,
it’s paramount to begin by defining the Target-Branched Declare class and create effective
2
Introduction
Process discovery can be described as a significant first step in business process
management. Through it, one is able to arrive at the as-is model of a research process. The step is
however highly complex and time-consuming giving the necessity to employ techniques capable
of automatically discovering a process scheme from the logs event. The data log is usually
derived from information systems supporting sections or the whole process. The results are
displayed in the representation of a flow chart (Petri net). The immediate discovery process can
also be denoted as process mining. The assignment will typically dwell on some of the essential
Declare concepts providing formal basis for Target-Branched constraint mining. Other sections
to be featured in the assignment include the performance evaluation and investigation
contribution sections.
Body
Since process mining is a complex and useful approach when it comes to standardized
and structured processes, a lot of arguments have been raised on how effective mining can be
realized from processes with high variable rates (Feshland et al, 2009). In such a case, the
declarative process model can serve as a viable approach to processes with high variability
degrees. This model prioritizes on showing behavioral constraints rather than the execution
sequences. The results are outlaid in the Declare language. In numerous cases, the models
provide a simple way of representing unstructured and complex behavior which through the Petri
net representation would seem highly complex,(Di Ciccio et al., 2012). It should however be
noted that in Declare models, it’s quite complex to mine simple relative statements, for instance,
“if you carry out a, you eventually will have to do b or c. To address the Declare mining issue,
it’s paramount to begin by defining the Target-Branched Declare class and create effective
2
DISCOVERING TARGET-BRANCHED DECLARE CONSTRAINTS
mining algorithms. The idea behind this approach is to take advantage of the dominance
relationships which will aid shape the search space. Formal evidences are presented in order to
outlay the merits. Prototypical implementations are utilized to analyze performances, assess
feasibility as well as the efficiency to an approach,( Di Cicci0 et al., 2012).
Presentation of mined models serves as one of the process mining challenges. Models
with procedural complexities, for instance, Petri nets tend to initiate difficulties and rigidity in
simple processes. In such scenarios, it’s advisable to go for declarative models as they serve to
avail better enlightenment on the mined processes by individuals. Declare is the mostly used and
utilized languages for declarative. Declare comprises of a group of constraints employed on
activities. Constraints, on the other hand, have a template basis which serves to define a given
class of properties. It should be noted that templates can be graphically represented with their
semantics being formalized through the use of presentable logics such as the Liner Semi
permanent Logic on endless traces (LTLf),(Van der Aelst et al., 2009). Through this, analysts
are able to operate with the template representation while hiding the underlying formulas.
Template parameters are indicated through x and y variables. For the real actions during
instantiation, variables such as a, b or c are used. For the Responded Existence template,
template variables are highly relative, that is, when x occurs, y is bound to occur. It should be
noted that in the Responded Existence case, y is bound to occur pre or post x. in the Response
template, x and y are directly relative, that is, x occurrence should lead to y’s occurrence. It
should however be noted that y only comes after x occurs,(Dumas et al., 2013). The Precedence
template, on the other hand, indicates that y’s occurrence depends on x’s occurrence, that is, y
can only occur if x occurs. The Precedence and Response templates are reaffirmed by the
Alternate Precedence and Alternate Response templates respectively. Other templates with
3
mining algorithms. The idea behind this approach is to take advantage of the dominance
relationships which will aid shape the search space. Formal evidences are presented in order to
outlay the merits. Prototypical implementations are utilized to analyze performances, assess
feasibility as well as the efficiency to an approach,( Di Cicci0 et al., 2012).
Presentation of mined models serves as one of the process mining challenges. Models
with procedural complexities, for instance, Petri nets tend to initiate difficulties and rigidity in
simple processes. In such scenarios, it’s advisable to go for declarative models as they serve to
avail better enlightenment on the mined processes by individuals. Declare is the mostly used and
utilized languages for declarative. Declare comprises of a group of constraints employed on
activities. Constraints, on the other hand, have a template basis which serves to define a given
class of properties. It should be noted that templates can be graphically represented with their
semantics being formalized through the use of presentable logics such as the Liner Semi
permanent Logic on endless traces (LTLf),(Van der Aelst et al., 2009). Through this, analysts
are able to operate with the template representation while hiding the underlying formulas.
Template parameters are indicated through x and y variables. For the real actions during
instantiation, variables such as a, b or c are used. For the Responded Existence template,
template variables are highly relative, that is, when x occurs, y is bound to occur. It should be
noted that in the Responded Existence case, y is bound to occur pre or post x. in the Response
template, x and y are directly relative, that is, x occurrence should lead to y’s occurrence. It
should however be noted that y only comes after x occurs,(Dumas et al., 2013). The Precedence
template, on the other hand, indicates that y’s occurrence depends on x’s occurrence, that is, y
can only occur if x occurs. The Precedence and Response templates are reaffirmed by the
Alternate Precedence and Alternate Response templates respectively. Other templates with
3
DISCOVERING TARGET-BRANCHED DECLARE CONSTRAINTS
strong order relations include the Chain Precedence and the Chain Response. In these templates,
activity occurrences are bound together, that is x and y. in semantic illustration, consider (a, b) as
the response constraint. This means taking into consideration a occurs, followed by b is bound to
happen. The following traces can therefore satisfy the constraint;
T1= [a, a, b, c], T2= [b, b, c, d] and T3= [a, b, c, d]. For T4, the case would be different as
activity a is not followed by an ab. It’s paramount to note that an activation is an event affects
targets. For the prior illustration given, it can be said that a in the trace stands as an activation
while b represents the object in the feedback limitations (a, b). This is highly due to a’s
compilation will eventually lead to b’s execution. A fulfillment is fully realized once there is
constraint compliancy in the trace,(Burratin et al, 2012). Going back to the earlier mentioned
traces, in T1 , there is constraint activation and twice fulfillment. The same case is featured for T3
but the constraint is only fulfilled once. In cases where there is no compliancy in the trace,
activation can create a fulfillment. It should be however noted that it can also initiate at least one
activation violation. In T4, activation for the response constraint can be initiated two times. The
initial activation leads to the eventual occurrence of b while the second stands as a violation as b
fails to occur. In order to reaffirm the significance of constraints, confidence and support are
adopted from data mining. Declare constraint’s confidence lies in the degree of traces holding
activation. Despite its numerous benefits, the Declare constraint fails to accommodate branching,
( Smirnov et al., 2012).
Branch as outlaid in the alpha algorithm and behavioral profile synthesis approach
explicitly mines for statements such as ‘if we carry out a, we shall resort to doing one of b or c.
the exclusive results are normally employed on process model comprehension due to their
practical significance. A Target-Branched Declare refers to a Declare extension where the target
4
strong order relations include the Chain Precedence and the Chain Response. In these templates,
activity occurrences are bound together, that is x and y. in semantic illustration, consider (a, b) as
the response constraint. This means taking into consideration a occurs, followed by b is bound to
happen. The following traces can therefore satisfy the constraint;
T1= [a, a, b, c], T2= [b, b, c, d] and T3= [a, b, c, d]. For T4, the case would be different as
activity a is not followed by an ab. It’s paramount to note that an activation is an event affects
targets. For the prior illustration given, it can be said that a in the trace stands as an activation
while b represents the object in the feedback limitations (a, b). This is highly due to a’s
compilation will eventually lead to b’s execution. A fulfillment is fully realized once there is
constraint compliancy in the trace,(Burratin et al, 2012). Going back to the earlier mentioned
traces, in T1 , there is constraint activation and twice fulfillment. The same case is featured for T3
but the constraint is only fulfilled once. In cases where there is no compliancy in the trace,
activation can create a fulfillment. It should be however noted that it can also initiate at least one
activation violation. In T4, activation for the response constraint can be initiated two times. The
initial activation leads to the eventual occurrence of b while the second stands as a violation as b
fails to occur. In order to reaffirm the significance of constraints, confidence and support are
adopted from data mining. Declare constraint’s confidence lies in the degree of traces holding
activation. Despite its numerous benefits, the Declare constraint fails to accommodate branching,
( Smirnov et al., 2012).
Branch as outlaid in the alpha algorithm and behavioral profile synthesis approach
explicitly mines for statements such as ‘if we carry out a, we shall resort to doing one of b or c.
the exclusive results are normally employed on process model comprehension due to their
practical significance. A Target-Branched Declare refers to a Declare extension where the target
4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
DISCOVERING TARGET-BRANCHED DECLARE CONSTRAINTS
is a set rather than a single activity. A TBDeclare constraint can therefore be presented as (a, [b,
c]). It depicts that for any occurrence of a, b or c are bound to occur. The constraint is quite
unique in that it holds interesting characteristics. The set-dominance held together with its
implications renders it applicable in the mining algorithm,( Weidlich et al., 2011). The
experiments and evaluation section assesses the efficiency of pruning techniques. On evaluating
the approach based on a simulation, the following constraints were included, that is, Chain
Precedence ([a, b], c); Responded Existence (a, [b, c, d, e]); Chain Precedence ([a, b, d], c);
Response (a, [b, c]); Alternate Response (a, [b, c]) and Precedence ([a, b, c, d], e). The
constraints were simulated to outlay compliant event logs, (Reijers et al., 2013).
The experiments prioritized on distinct characteristics of the investigative task, that is,
amount of traces, mean length of the traces and the amount of activities. Additionally, other
model characteristics were also included such as maximum branch number and support. In the
study, algorithms were run with varying variables at every instance. The left values were
corresponding and fixed to 25 and 4 respectively for maximum and minimum trace lengths. In
data mining, different curves depict distinct miner configurations; with exclusive threshold
support (triangles), with pruning which is set-containment based, with hierarchy based and set-
containment pruning and support threshold and with exclusive hierarchy and set-containment
based pruning,(Schunselaar et al.,2012). It should be noted that as the activity level in the
alphabetic logs multiplies the amount of discoverable limitations consequently goes up.
However, the constraints increase at a lower level as one proceeds further in the pruning
sequence. There is a big difference between the numbers of discoverable constraints and pruning
based constraints.
5
is a set rather than a single activity. A TBDeclare constraint can therefore be presented as (a, [b,
c]). It depicts that for any occurrence of a, b or c are bound to occur. The constraint is quite
unique in that it holds interesting characteristics. The set-dominance held together with its
implications renders it applicable in the mining algorithm,( Weidlich et al., 2011). The
experiments and evaluation section assesses the efficiency of pruning techniques. On evaluating
the approach based on a simulation, the following constraints were included, that is, Chain
Precedence ([a, b], c); Responded Existence (a, [b, c, d, e]); Chain Precedence ([a, b, d], c);
Response (a, [b, c]); Alternate Response (a, [b, c]) and Precedence ([a, b, c, d], e). The
constraints were simulated to outlay compliant event logs, (Reijers et al., 2013).
The experiments prioritized on distinct characteristics of the investigative task, that is,
amount of traces, mean length of the traces and the amount of activities. Additionally, other
model characteristics were also included such as maximum branch number and support. In the
study, algorithms were run with varying variables at every instance. The left values were
corresponding and fixed to 25 and 4 respectively for maximum and minimum trace lengths. In
data mining, different curves depict distinct miner configurations; with exclusive threshold
support (triangles), with pruning which is set-containment based, with hierarchy based and set-
containment pruning and support threshold and with exclusive hierarchy and set-containment
based pruning,(Schunselaar et al.,2012). It should be noted that as the activity level in the
alphabetic logs multiplies the amount of discoverable limitations consequently goes up.
However, the constraints increase at a lower level as one proceeds further in the pruning
sequence. There is a big difference between the numbers of discoverable constraints and pruning
based constraints.
5
DISCOVERING TARGET-BRANCHED DECLARE CONSTRAINTS
The pattern of the quantity of found limitations is distinctive for various designs. Without
pruning, or with the basic separating by least help edge, the quantity of found limitations
increments as the quantity of branches increments. Alternatively, if we incorporate the set-
predominance and chain of importance based pruning methods, the quantity of found limitations
increments up to an expanding estimation of 3. After this esteem, the quantity of imperatives
diminishes,(Mendling et al., 2012). When we implement all the suggested pruning procedures
with the quantity of limitations in the long run increments. Furthermore, the quantity of
requirements gotten by incorporating set-predominance together with submission progression
combines to the quantity of limitations found when every pruning methods have been connected
with one another. The distinction between the quantity of found limitation with help edge
furthermore, the number subsequent to utilizing the pruning strategies introduced in this article is
measured (spreading variable of 8) in a decrease proportion of 88%.
The sketch affirms that for any limit somewhere in the range of 0.85 and 1.0, the quantity
of the needs gotten from the output of the methods of pruning is less compared to the one gotten
from incoporating the help limit separating. The decrease proportion is in fact 93% when the
limit is set to 1.0. The paper centers on time proficiency of the methodology. The productivity is
watched emphatically relies upon the layout. Specifically, the "substitute" formats are less
performativity. It demonstrates this by sketching the calculation duration as capacity from the log
letters in in logarithmic scope,( Di Ciccio et al., 2013). Whenever the exchange formats are
incorporated into the assessment, the calculation time develops exponentially with the
development of the letter set size. As a subsequent stage, the consequently bar the substitute
formats and gets the calculation duration as a component of log letters in order size and estimate
log.
6
The pattern of the quantity of found limitations is distinctive for various designs. Without
pruning, or with the basic separating by least help edge, the quantity of found limitations
increments as the quantity of branches increments. Alternatively, if we incorporate the set-
predominance and chain of importance based pruning methods, the quantity of found limitations
increments up to an expanding estimation of 3. After this esteem, the quantity of imperatives
diminishes,(Mendling et al., 2012). When we implement all the suggested pruning procedures
with the quantity of limitations in the long run increments. Furthermore, the quantity of
requirements gotten by incorporating set-predominance together with submission progression
combines to the quantity of limitations found when every pruning methods have been connected
with one another. The distinction between the quantity of found limitation with help edge
furthermore, the number subsequent to utilizing the pruning strategies introduced in this article is
measured (spreading variable of 8) in a decrease proportion of 88%.
The sketch affirms that for any limit somewhere in the range of 0.85 and 1.0, the quantity
of the needs gotten from the output of the methods of pruning is less compared to the one gotten
from incoporating the help limit separating. The decrease proportion is in fact 93% when the
limit is set to 1.0. The paper centers on time proficiency of the methodology. The productivity is
watched emphatically relies upon the layout. Specifically, the "substitute" formats are less
performativity. It demonstrates this by sketching the calculation duration as capacity from the log
letters in in logarithmic scope,( Di Ciccio et al., 2013). Whenever the exchange formats are
incorporated into the assessment, the calculation time develops exponentially with the
development of the letter set size. As a subsequent stage, the consequently bar the substitute
formats and gets the calculation duration as a component of log letters in order size and estimate
log.
6
DISCOVERING TARGET-BRANCHED DECLARE CONSTRAINTS
The paper has assessed the applicability of the methodology utilizing certifiable occasion
logs accommodated the BPI challenge 2012 (Wedlich et al, 2011). The occasion log relates the
process of an application for individual advances or some sorts of drafts of a Dutch bank. It
involves 262,200 occasions appropriated crosswise over 24 various conceivable occasion
identifiers and incorporates 13,087 cases. For this situation, it is conceivable to prune the
rundown of found limitations so as to get a minimized arrangement of imperative, which is
reasonable for human examiners.
A few examination components for Declare are accessible in the related reviews. Several
of them have been actualized as modules of the procedure mining device ProM (Maggi, 2013). A
few methodologies center around the run-time checking of consistence particulars characterized
through Declare. For instance, in (Maggi et al., 2011), the creators suggests a method for
observing models of Declare dependent on limited automata state. Westergaard and Maggi,
(2012) states that the creators define pre-set Declare, an expansion of Declare that depends on
automata which has been defined. In Montali et al.,(2013), the EC is utilized for characterizing
an information mindful semantics for Declare. The creators propose a methodology for checking
the definitive procedure model that can fill in as a feasible way to deal with procedures with high
changeability degrees. This model organizes on indicating social requirements instead of the
execution groupings. The outcomes are outlaid in the Declare language. In various cases, the
models give a straightforward method for speaking to unstructured and complex conduct which
through the Petri net portrayal would appear to be profoundly unpredictable. It ought to anyway
be noticed that in Declare models, it's very unpredictable to mine straightforward relative
explanations, (Montali et al., 2010). To address the Declare mining issue, it's foremost to start by
characterizing the Target-Branched Declare class and make successful mining calculations so as
7
The paper has assessed the applicability of the methodology utilizing certifiable occasion
logs accommodated the BPI challenge 2012 (Wedlich et al, 2011). The occasion log relates the
process of an application for individual advances or some sorts of drafts of a Dutch bank. It
involves 262,200 occasions appropriated crosswise over 24 various conceivable occasion
identifiers and incorporates 13,087 cases. For this situation, it is conceivable to prune the
rundown of found limitations so as to get a minimized arrangement of imperative, which is
reasonable for human examiners.
A few examination components for Declare are accessible in the related reviews. Several
of them have been actualized as modules of the procedure mining device ProM (Maggi, 2013). A
few methodologies center around the run-time checking of consistence particulars characterized
through Declare. For instance, in (Maggi et al., 2011), the creators suggests a method for
observing models of Declare dependent on limited automata state. Westergaard and Maggi,
(2012) states that the creators define pre-set Declare, an expansion of Declare that depends on
automata which has been defined. In Montali et al.,(2013), the EC is utilized for characterizing
an information mindful semantics for Declare. The creators propose a methodology for checking
the definitive procedure model that can fill in as a feasible way to deal with procedures with high
changeability degrees. This model organizes on indicating social requirements instead of the
execution groupings. The outcomes are outlaid in the Declare language. In various cases, the
models give a straightforward method for speaking to unstructured and complex conduct which
through the Petri net portrayal would appear to be profoundly unpredictable. It ought to anyway
be noticed that in Declare models, it's very unpredictable to mine straightforward relative
explanations, (Montali et al., 2010). To address the Declare mining issue, it's foremost to start by
characterizing the Target-Branched Declare class and make successful mining calculations so as
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
DISCOVERING TARGET-BRANCHED DECLARE CONSTRAINTS
to exploit the predominance connections which will help shape the inquiry space. Information
mindful Declare requirements at execution dependent on this rules that govern the state. This
methodology additionally permits the confirmation of sets of transient requirement
Conclusion
The research paper has characterized the models of Target-Branched Declare, that shows
intriguing attributes with regards to terms of set-predominance. We misuse these attributes for
the meaning of a proficient mining methodology. Moreover, it has determine pruning rules so as
to land at a conservative guideline set. The strategy is assessed for productivity and viability
utilizing mimicked information and the instance of the BPI test. Additionally the paper has
assessed the applicability of the methodology utilizing certifiable occasion logs accommodated
the BPI challenge. Branch as outlaid in the alpha calculation and conduct profile combination
approach expressly digs for explanations, the select articulations are regularly utilized on
procedure model cognizance because of their handy centrality. A Target-Branched Declare
alludes to a Declare augmentation where the objective is a set instead of a solitary action. A
TBDeclare imperative can along these lines be exhibited. It delineates that for any event of a, b
or c will undoubtedly happen. The limitation is very one of a kind in that it holds intriguing
attributes. The set-strength held together with its suggestions renders it appropriate in the mining
calculation. The analyses and assessment segment evaluates the proficiency of pruning
procedures.
8
to exploit the predominance connections which will help shape the inquiry space. Information
mindful Declare requirements at execution dependent on this rules that govern the state. This
methodology additionally permits the confirmation of sets of transient requirement
Conclusion
The research paper has characterized the models of Target-Branched Declare, that shows
intriguing attributes with regards to terms of set-predominance. We misuse these attributes for
the meaning of a proficient mining methodology. Moreover, it has determine pruning rules so as
to land at a conservative guideline set. The strategy is assessed for productivity and viability
utilizing mimicked information and the instance of the BPI test. Additionally the paper has
assessed the applicability of the methodology utilizing certifiable occasion logs accommodated
the BPI challenge. Branch as outlaid in the alpha calculation and conduct profile combination
approach expressly digs for explanations, the select articulations are regularly utilized on
procedure model cognizance because of their handy centrality. A Target-Branched Declare
alludes to a Declare augmentation where the objective is a set instead of a solitary action. A
TBDeclare imperative can along these lines be exhibited. It delineates that for any event of a, b
or c will undoubtedly happen. The limitation is very one of a kind in that it holds intriguing
attributes. The set-strength held together with its suggestions renders it appropriate in the mining
calculation. The analyses and assessment segment evaluates the proficiency of pruning
procedures.
8
DISCOVERING TARGET-BRANCHED DECLARE CONSTRAINTS
References
Burattin, A., Maggi, F.M., van der Aalst, W.M.P., Sperduti, A.: Techniques for a
Posteriori Analysis of Declarative Processes. In: EDOC, pp. 41–50 (2012)
D., Treharne, H. (eds.) IFM 2012. LNCS, vol. 7321, pp. 327–342. Springer, Heidelberg
(2012)
Di Ciccio, C., Marrella, A., Russo, A.: Knowledge-Intensive Processes: An Overview of
Contemporary Approaches. In: KiBP, pp. 33–47 (2012)
Di Ciccio, C., Mecella, M.: A Two-Step Fast Algorithm for the Automated Discovery of
Declarative Workflows. In: CIDM, pp. 135–142 (2013)
Di Ciccio, C., Mecella, M.: Mining Constraints for Artful Processes. In: Abramowicz,
W., Kriksciuniene, D., Sakalauskas, V. (eds.) BIS 2012. LNBIP, vol. 117, pp. 11–23.
Springer, Heidelberg (2012)
Dumas, M., La Rosa, M., Mendling, J., Reijers, H.A.: Fundamentals of Business Process
Management. Springer (2013
Fahland, D., L¨ ubke, D., Mendling, J., Reijers, H., Weber, B., Weidlich, M., Zugal, S.:
Declarative versus Imperative Process Modeling Languages: The Issue of
Understandability. In: Halpin, T., Krogstie, J., Nurcan, S., Proper, E., Schmidt, R., Soffer,
P., Ukor, R. (eds.) Enterprise, Business-Process and Information Systems Modeling.
LNBIP, vol. 29, pp. 353–366. Springer, Heidelberg (2009)
Maggi, F.M., Montali, M., Westergaard, M., van der Aalst, W.M.P.: Monitoring Business
Constraints with Linear Temporal Logic: An Approach Based on Colored Automata. In:
9
References
Burattin, A., Maggi, F.M., van der Aalst, W.M.P., Sperduti, A.: Techniques for a
Posteriori Analysis of Declarative Processes. In: EDOC, pp. 41–50 (2012)
D., Treharne, H. (eds.) IFM 2012. LNCS, vol. 7321, pp. 327–342. Springer, Heidelberg
(2012)
Di Ciccio, C., Marrella, A., Russo, A.: Knowledge-Intensive Processes: An Overview of
Contemporary Approaches. In: KiBP, pp. 33–47 (2012)
Di Ciccio, C., Mecella, M.: A Two-Step Fast Algorithm for the Automated Discovery of
Declarative Workflows. In: CIDM, pp. 135–142 (2013)
Di Ciccio, C., Mecella, M.: Mining Constraints for Artful Processes. In: Abramowicz,
W., Kriksciuniene, D., Sakalauskas, V. (eds.) BIS 2012. LNBIP, vol. 117, pp. 11–23.
Springer, Heidelberg (2012)
Dumas, M., La Rosa, M., Mendling, J., Reijers, H.A.: Fundamentals of Business Process
Management. Springer (2013
Fahland, D., L¨ ubke, D., Mendling, J., Reijers, H., Weber, B., Weidlich, M., Zugal, S.:
Declarative versus Imperative Process Modeling Languages: The Issue of
Understandability. In: Halpin, T., Krogstie, J., Nurcan, S., Proper, E., Schmidt, R., Soffer,
P., Ukor, R. (eds.) Enterprise, Business-Process and Information Systems Modeling.
LNBIP, vol. 29, pp. 353–366. Springer, Heidelberg (2009)
Maggi, F.M., Montali, M., Westergaard, M., van der Aalst, W.M.P.: Monitoring Business
Constraints with Linear Temporal Logic: An Approach Based on Colored Automata. In:
9
DISCOVERING TARGET-BRANCHED DECLARE CONSTRAINTS
Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. LNCS, vol. 6896, pp. 132–
147. Springer, Heidelberg (2011)
Maggi, F.M.: Declarative Process Mining with the Declare Component of ProM. In:
BPM (Demos). CEUR, vol. 1021 (2013)
Mendling, J., Strembeck, M., Recker, J.: Factors of Process Model Comprehension -
Findings from a Series ofExperiments. DecisionSupport Systems 53(1), 195–206(2012)
Montali, M., Chesani, F., Maggi, F.M., Mello, P.: Towards Data-Aware Constraints in
Declare. In: SAC, pp. 1391–1396 (2013)
Montali, M., Pesic, M., van der Aalst, W.M.P.: Federico Chesani, Paola Mello, and
Sergio Storari. Declarative Specification and Verification of Service Choreographies.
ACM Transactions on the Web 4(1) (2010)
Reijers, H.A., Slaats, T., Stahl, C.: Declarative Modeling–An Academic Dream or the
Future for BPM? In: Daniel, F., Wang, J., Weber, B. (eds.) BPM 2013. LNCS, vol. 8094,
pp. 307–322. Springer, Heidelberg (2013)
Schunselaar, D.M.M., Maggi, F.M., Sidorova, N.: Patterns for a Log-Based
Strengthening of Declarative Compliance Models. In: Derrick, J., Gnesi, S., Latella,
Smirnov, S., Weidlich, M., Mendling, J.: Business Process Model Abstraction Based on
Synthesis from Well-Structured Behavioral Profiles. Int. J. Cooperative Inf. Syst. 21(1),
55–83 (2012)
Van der Aalst, W.M.P., Pesic, M., Schonenberg, H.: Declarative Workflows: Balancing
between Flexibility andSupport. CSRD 23(2), 99–113 (2009)
Weidlich, M., Polyvyanyy, A., Desai, N., Mendling, J., Weske, M.: Process Compliance
Analysis Based on Behavioural Profiles. Inf. Syst. 36(7), 1009–1025 (2011)
10
Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. LNCS, vol. 6896, pp. 132–
147. Springer, Heidelberg (2011)
Maggi, F.M.: Declarative Process Mining with the Declare Component of ProM. In:
BPM (Demos). CEUR, vol. 1021 (2013)
Mendling, J., Strembeck, M., Recker, J.: Factors of Process Model Comprehension -
Findings from a Series ofExperiments. DecisionSupport Systems 53(1), 195–206(2012)
Montali, M., Chesani, F., Maggi, F.M., Mello, P.: Towards Data-Aware Constraints in
Declare. In: SAC, pp. 1391–1396 (2013)
Montali, M., Pesic, M., van der Aalst, W.M.P.: Federico Chesani, Paola Mello, and
Sergio Storari. Declarative Specification and Verification of Service Choreographies.
ACM Transactions on the Web 4(1) (2010)
Reijers, H.A., Slaats, T., Stahl, C.: Declarative Modeling–An Academic Dream or the
Future for BPM? In: Daniel, F., Wang, J., Weber, B. (eds.) BPM 2013. LNCS, vol. 8094,
pp. 307–322. Springer, Heidelberg (2013)
Schunselaar, D.M.M., Maggi, F.M., Sidorova, N.: Patterns for a Log-Based
Strengthening of Declarative Compliance Models. In: Derrick, J., Gnesi, S., Latella,
Smirnov, S., Weidlich, M., Mendling, J.: Business Process Model Abstraction Based on
Synthesis from Well-Structured Behavioral Profiles. Int. J. Cooperative Inf. Syst. 21(1),
55–83 (2012)
Van der Aalst, W.M.P., Pesic, M., Schonenberg, H.: Declarative Workflows: Balancing
between Flexibility andSupport. CSRD 23(2), 99–113 (2009)
Weidlich, M., Polyvyanyy, A., Desai, N., Mendling, J., Weske, M.: Process Compliance
Analysis Based on Behavioural Profiles. Inf. Syst. 36(7), 1009–1025 (2011)
10
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
DISCOVERING TARGET-BRANCHED DECLARE CONSTRAINTS
Westergaard, M., Maggi, F.M.: Looking into the Future: Using Timed Automata to
Provide A Priori Advice about Timed Declarative Process Models. In: Meersman, R., et
al. (eds.) OTM 2012, Part I. LNCS, vol. 7565, pp. 250–267. Springer, Heidelberg (2012)
11
Westergaard, M., Maggi, F.M.: Looking into the Future: Using Timed Automata to
Provide A Priori Advice about Timed Declarative Process Models. In: Meersman, R., et
al. (eds.) OTM 2012, Part I. LNCS, vol. 7565, pp. 250–267. Springer, Heidelberg (2012)
11
1 out of 11
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.