<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">On Handling Business Process Anomalies through Artifact-based Modeling</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Luciano</forename><surname>Baresi</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Giovanni</forename><surname>Meroni</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Pierluigi</forename><surname>Plebani</surname></persName>
						</author>
						<author>
							<affiliation key="aff0">
								<orgName type="department">Politecnico di Milano -Dipartimento di Elettronica</orgName>
								<orgName type="institution">Informazione e Bioingegneria Piazza Leonardo da Vinci</orgName>
								<address>
									<postCode>32 -20133</postCode>
									<settlement>Milano</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="department" key="dep1">28th</orgName>
								<orgName type="department" key="dep2">International Conference on Advanced Information Systems Engineering</orgName>
								<address>
									<addrLine>13-17.6</addrLine>
									<postCode>2016</postCode>
									<settlement>Ljubljana</settlement>
									<country key="SI">Slovenia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">On Handling Business Process Anomalies through Artifact-based Modeling</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">A576382314CA7294AB96F73297820627</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T17:04+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Process Monitoring</term>
					<term>Guard-Stage-Milestone</term>
					<term>Artifact-centric processes</term>
					<term>Handling Process Exceptions</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Control flow-based process modeling notations, like BPMN, are good at defining the normal execution flow and the management of foreseen exceptions. When unforeseen situations occur, one cannot detect if the execution is still acceptable with respect to the process definition. In contrast, artifact-centric process modeling notations, like the Guard-Stage-Milestone (GSM), are better suited for this kind of scenarios: they define a process in terms of acceptable states and do not enforce any specific execution flow. This improves flexibility, but hampers the clarity of the defined models. The goal of this paper is to show how an extension of GSM, i.e., E-GSM, can be used to detect deviations from the execution path as modeled in BPMN, while keeping the process execution alive.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>The cooperation and communication among different organizations are usually defined through business processes that capture the tasks performed by each organization, their order, and the messages exchanged. To design these processes, one usually adopts imperative modeling languages, like the Business Process Modeling Notation (BPMN). These languages ease the definition of the expected execution flow and of the exceptional flows aimed to manage anomalies foreseen at design time. However, while a process is executed, each organization has full control only on the portion of the process that is under its responsibility. This means that the overall, actual execution flow may differ from the one defined originally, and unforeseen exceptions could materialize. Moreover, one organization can know the activities executed by the others only if they properly distribute information about their initiation and termination.</p><p>To alleviate these problems, this paper proposes a solution to monitor the execution of distributed control flow-based process models based on artifactcentric ones. We start from a BPMN process, which is easy to conceive, and we transform it into an equivalent model in E-GSM, an extension to the Guard-Stage-Milestone (GSM) artifact-centric modeling notation <ref type="bibr" target="#b4">[5]</ref>. The resulting E-GSM model can be shared by the involved parties to allow them to keep track of the order in which activities are executed and of the status of each activity. Deviations from the "original" execution flow can easily be detected at run-time during the process enactment.</p><p>The paper is structured as follows. Section 2 discusses how we extended GSM into E-GSM to enable a data-artifact driven process monitoring solution. Section 3 gives a brief overview of the rules we defined to translate BPMN to E-GSM. Section 4 shows how E-GSM can be used to monitor a real business process in the domain of logistics. After a comparison with relevant work in the literature in Section 5, Section 6 outlines possible future work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">E-GSM</head><p>The GSM notation is a declarative language that allows one to model artifactcentric processes by defining conditions that determine the activation and termination of activities, called Stages, based on events. Starting from the standard GSM notation and our preliminary work <ref type="bibr" target="#b1">[2]</ref>, we propose E-GSM, an extension where we distinguish between Data Flow Guards (that represent the original Guards in GSM) and Process Flow Guards, and we add Fault Loggers:  -The Execution status captures the status of a Stage: unopened (Data Flow Guards have never been triggered), opened (one of the Data Flow Guards triggers) or closed (when opened, a Milestone is achieved). </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">E-GSM generation</head><p>Starting from a process modeled using BPMN -that we aim to monitor -the generation of the corresponding E-GSM -that feeds the monitoring system -adheres to a set of transformation rules. These rules are applicable to every BPMN process model that complies with a workflow net <ref type="bibr" target="#b0">[1]</ref>, that is, the process has only one start event and only one end event, and it always terminates (soundness).</p><p>Basic transformation rules are shown in Figure <ref type="figure" target="#fig_3">2</ref>:  These transformation rules allow any well-structured BPMN process model to be translated into E-GSM. A BPMN to E-GSM prototype translator implemented in ATL (ATLAS Transformation Language <ref type="bibr" target="#b5">[6]</ref>), has been developed to support the translation activities. <ref type="foot" target="#foot_1">2</ref>The combination of the above rules for basic elements allows one to translate well-structured business process models. In particular, we focus on five types of blocks, defined starting from the classical control flow patterns <ref type="bibr" target="#b11">[12]</ref>: sequence block, parallel block, conditional exclusive block, conditional inclusive block, loop block. For each of these blocks a transformation rule have been defined and a graphical representation of some of them is reported in Figure <ref type="figure" target="#fig_4">3</ref>. In <ref type="bibr" target="#b8">[9]</ref>, the complete set of these transformation rules is discussed in details.</p><p>For instance, a sequence block corresponds to a Stage Seq that includes S x inner Stages obtained by applying the transformation rules to all the elements (i.e., Activities, Events, inner blocks) that belong to the block. Moreover, in addition to the existing Process Flow Guards, each inner stage has S x .PFG1 to state that none of its Milestones is achieved, and at least one of the Milestones of the element that directly precedes it (if present) is achieved. This way, inner Stages are expected to be opened only once, and only after their direct predecessor is closed. Finally, Seq has a set Seq.DFG that includes all S x .DFG i , and a Milestone Seq.M1 that requires that, for all S x , at least one S x .M j be achieved. This way, Seq is opened when at least one of its S x is opened too, and -as achieving a Milestone is enough to close a Stage -Seq is closed when all S x are closed.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">E-GSM in action</head><p>To better clarify how E-GSM models can be used to monitor the execution of complex (distributed) processes, here we concentrate on an example taken from the logistics domain. A manufacturing company M has to ship its goods to one of its customers N and, to do so, it relies on a shipping company S for rail and seacargo transportation, and on a shipping company T for truck transportation. The shipping process comprises four main phases: (i) loading goods into a shipping container; (ii) shipping such a container to an intermediate site A by truck; (iii) depending on the day of the week, shipping the goods to either site B by rail, or to site C by sea; (iv) delivering the goods to the customer's site by truck. Furthermore, if part of the goods drops during the loading phase, that activity should stop, all involved actors should be notified of such an accident, and then the loading phase redone. Figure <ref type="figure" target="#fig_5">4</ref> shows the BPMN definition of this process in the upper part, and the derived E-GSM process, which is produced by our translator, in the lower part.</p><p>The resulting E-GSM model definition feeds an E-GSM engine that is able to check the evolution of the lifecycle of the Stages. We assume that a smart device embeds this engine and travels along with the goods. Using on-board sensors, or via explicit messages sent by an operator, the engine is able to determine when E-GSM elements that decorate each Stage are triggered, and to log information on each Stage along with the execution status, outcome and compliance perspectives: Data Flow Guards allow the parties to realize when activities are started, Milestones when they end, Fault Loggers if they were not correctly executed, and Process Flow Guards if they are compliant with the defined control flow.</p><p>Let us suppose that the shipping process is carried out as follows: the process starts on Wednesday, when T carefully loads the goods onto their truck at M 's site (when the loading phase is complete, the operator sends a message making LoadGoods.M1 achieved) and ships them to site A on Thursday. Once the goods arrive at A, ShipToA.M1 is achieved. Before taking the goods from T , S queries the smart device to verify that the activities LoadGoods and ShipToA have been correctly performed, and then the goods are exchanged. Being Thursday, S ships the goods to site C by sea. Finally, T delivers the goods to N 's site, where N queries the smart device to have information on how the process has been enacted. In this case, since the execution flow has been respected (i.e., every time a Stage was opened, the conditions on its process flow guards have been satisfied), and no Fault Logger has been triggered, N accepts the goods.</p><p>Let us now focus on a process execution where the designed control flow is not respected. For instance, during the initial loading, part of the goods is dropped. However, T ignores that accident and the shipping process continues as planned. This cause the verification of the FaultLogger LoadGoods.FL1, that moves LoadGoods to the faulty outcome. Once N receives the goods, it discovers that some of them are damaged, and returns them to M . By querying the smart device, M immediately identifies that the goods have been dropped (i.e., the condition on LoadGoods.FL1 has been satisfied), that ShipToA started while LoadGoods was still in progress, and that the accident has not been notified (i.e., NotifyAccident has not been executed even though NotifyAccident.PFG1 was satisfied). Thank to these information, M is able to charge T a penalty for the damaged goods, and to impose it to ship the new goods to N for free.</p><p>A third example shows how the system can handle unforeseen exceptions. In this case, the shipping to site A takes longer than expected and the goods arrive there on Sunday. Nevertheless, S ships the goods by sea to site C. This causes a significant delay and a waste of resources since the goods are expected to arrive at B and, once their current location is identified, a truck must bring them from site B to C. Again, the information collected by the smart device allows N to identify that ShipToC does not comply with the model: ShipToC is executed instead of ShipToB, and ShipToC has been opened even though ShipToC.PFG1 was not satisfied. Moreover, by knowing that ShipToC is currently running, M can blame S as the responsible for this inefficiency. If the smart device is also equipped with a communication interface, it can autonomously send information to all involved parties. This allows T to figure out that ShipToC is in progress and be ready to pick up the goods at site C instead of B.</p><p>These examples demonstrate how E-GSM can be used to effectively monitor the execution of a distributed process, especially in case of processes where several actors are involved and no central orchestrator is imposed. While an E-GSM engine is not available yet, an extension of the Barcelona GSM engine <ref type="bibr" target="#b3">[4]</ref> is currently under development.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Related Work</head><p>Modeling business processes with declarative languages is generally more difficult than with imperative ones as proved by Pichler et al. <ref type="bibr" target="#b9">[10]</ref>. For this reason, and also because of the need for reusing excerpts of preexisting process models, there have been some attempts to develop methods and solutions to translate imperative languages into declarative ones.</p><p>Köpke et al. <ref type="bibr" target="#b6">[7]</ref> start from a BPMN process model and produce a GSM equivalent that forces the process to behave exactly as defined in the BPMN model. While we have borrowed the Stage nesting, our rules differ significantly from the ones in <ref type="bibr" target="#b6">[7]</ref>, mainly due to the fact that the purpose of our work is completely different. In particular, we are interested in identifying control flow violations, and not in forcing the process to rigidly follow a given execution flow, which is what is pursued in this work.</p><p>Eshuis et al. <ref type="bibr" target="#b2">[3]</ref> define a semi-automated approach to produce GSM models starting from UML Activity Diagrams, while Kumaran et al. <ref type="bibr" target="#b7">[8]</ref> propose a language-agnostic algorithm to derive the lifecycle of artifacts based on an imperative process model. With respect to our work, which keeps control flow information in the target process model to assess compliance, <ref type="bibr" target="#b2">[3]</ref> and <ref type="bibr" target="#b7">[8]</ref> use such information to model the interactions among data artifacts.</p><p>Popova et al. <ref type="bibr" target="#b10">[11]</ref> define a translator from Petri Nets to GSM to transform the outcome of process mining algorithms, which is often represented as a Petri Net, in a language easier to understand by domain experts.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusions and Future Work</head><p>In this paper we proposed an extension of the Guard-Stage-Milestone (GSM) notation to embed control flow information in the process model definition to enable the translation from BPMN models into equivalent E-GSM ones. The resulting declarative process can drive the process monitoring to check anomalies during the execution of the process. Future work will concentrate on how to verify the soundness of the derived E-GSM processes and the level of equivalence with respect to the original BPMN process. As E-GSM has been studied to drive a flexible monitoring system, tools for distributing and running E-GSM-driven monitoring on smart devices will be proposed.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1</head><label>1</label><figDesc>Figure 1 sketches the lifecycle of an E-GSM Stage organized around three main orthogonal execution perspectives: status, outcome, and compliance 1 :</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Lifecycle of an E-GSM Stage S. -The Execution outcome captures the situation of a Stage, which can be either regular (none of its Fault Loggers has ever been triggered) or faulty (at least one of its Fault Loggers has been triggered, A.FL l ). -The Execution compliance captures the compliance of each Stage with the normal flow. A Stage is declared onTime by default. It can become outO-fOrder (according to the normal flow) when one of its Data Flow Guards is triggered but none of its Process Flow Guards holds, or skipped if it does not become active before the Stages that requires its activation. Summarizing, Data Flow Guards drive the change of status. Fault Loggers drive the outcome, while Process Flow Guards are in charge of the compliance. With respect to Standard GSM, E-GSM interprets reopening a closed Stage as a new iteration of that process portion. Therefore, once a parent Stage is reopened, the lifecycle of all its child Stages will restart from scratch.</figDesc><graphic coords="3,177.99,116.83,259.37,172.34" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head></head><label></label><figDesc>(a) BPMN Activities are translated into E-GSM Stages. (b) BPMN Start, End or Intermediate Events are translated into E-GSM Stages where their Data Flow Guards and the Milestones are associated to the occurrence of the event.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. BPMN to E-GSM transformation rules for basic elements.(c) BPMN Activities with a non-interrupting Boundary Event attached to them are translated into E-GSM Stages as in case (a), with a Fault Logger having the occurrence of the event as condition. (d) BPMN Activities A with an interrupting Boundary Event attached to them are translated into E-GSM Stages as in case (a), with an additional Milestone and Fault Logger having the occurrence of the event as condition.</figDesc><graphic coords="4,186.64,116.83,242.08,86.28" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Excerpt of BPMN to E-GSM transformation rules.</figDesc><graphic coords="5,134.77,116.83,345.84,127.02" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. BPMN and E-GSM models of the example shipping process.</figDesc><graphic coords="6,134.77,116.84,345.81,328.62" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>-</head><label></label><figDesc>A Data Flow Guard is an Event-Condition-Action (ECA) rule. If true, the associated Stage is declared opened. A Milestone is another ECA rule. If true, the Stage is declared closed. A Milestone may also have an invalidator : a boolean expression that can invalidate the Milestone and reopen the Stage. -A Process Flow Guard is a boolean expression that predicates on the activation of the Data Flow Guards and Milestones used to map the expected control flow. The expression is evaluated once one of the Data Flow Guards of the associated Stage is triggered, and before the Stage becomes opened. If the expression is true, the Stage complies with the expected execution, otherwise the Stage has been activated without respecting the normal flow. -A Fault Logger is an ECA rule. If true, the associated Stage is declared as faulty because something went wrong during the execution of the activity. A faulty Stage does not imply its termination, as the termination is only determined by Milestones.</figDesc><table /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">In this paper we use the the notation introduced in<ref type="bibr" target="#b4">[5</ref>], so we write S.DFGi, S.PFGk, S.FLl to indicate the activation of a Data Flow Guard, Process Flow Guard, or a Fault Logger associated with Stage S, +S.Mj (-S.Mj) to indicate the achievement (invalidation) of a Milestone Mj, S.Mj to indicate that Stage S is closed and a Milestone Mj is achieved, and Active(S) to indicate that Stage S is opened.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">The tool is publicly available at https://bitbucket.org/polimiisgroup/ bpmn2egsm.</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Acknowledgments. This work has been partially funded by the Italian Project ITS Italy 2020 under the Technological National Clusters program.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Verification of workflow nets</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Application and Theory of Petri Nets</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1997">1997. 1997</date>
			<biblScope unit="page" from="407" to="426" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><forename type="first">L</forename><surname>Baresi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Meroni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Plebani</surname></persName>
		</author>
		<title level="m">A gsm-based approach for monitoring crossorganization business processes using smart objects</title>
				<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
	<note>accepted for publication</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Synthesizing data-centric models from business process models</title>
		<author>
			<persName><forename type="first">R</forename><surname>Eshuis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Van Gorp</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computing</title>
		<imprint>
			<biblScope unit="page" from="1" to="29" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Barcelona: A design and runtime environment for declarative artifact-centric bpm</title>
		<author>
			<persName><forename type="first">Iii</forename><surname>Heath</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">T</forename><surname>Boaz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Gupta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Vaculín</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Sun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Hull</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Limonad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Service-Oriented Computing</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="705" to="709" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Introducing the guard-stage-milestone approach for specifying business entity lifecycles</title>
		<author>
			<persName><forename type="first">R</forename><surname>Hull</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Damaggio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Fournier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Gupta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Fenno</forename><forename type="middle">(</forename><surname>Heath</surname></persName>
		</author>
		<author>
			<persName><forename type="first">)</forename><surname>Terry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Hobson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Linehan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Maradugu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Nigam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sukaviriya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Vaculin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Web Services and Formal Methods</title>
		<imprint>
			<biblScope unit="volume">6551</biblScope>
			<biblScope unit="page" from="1" to="24" />
			<date type="published" when="2011">2011</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Atl: A model transformation tool</title>
		<author>
			<persName><forename type="first">F</forename><surname>Jouault</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Allilaire</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Bézivin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Kurtev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Science of computer programming</title>
		<imprint>
			<biblScope unit="volume">72</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="31" to="39" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Towards ontology guided translation of activity-centric processes to gsm</title>
		<author>
			<persName><forename type="first">J</forename><surname>Köpke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Su</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
	<note>accepted for publication</note>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">On the duality of information-centric and activitycentric models of business processes</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kumaran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">Y</forename><surname>Wu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advanced Information Systems Engineering</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="32" to="47" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">Translating BPMN to E-GSM: specifications and rules</title>
		<author>
			<persName><forename type="first">G</forename><surname>Meroni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Baresi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Plebani</surname></persName>
		</author>
		<ptr target="http://hdl.handle.net/11311/976678" />
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
		<respStmt>
			<orgName>Politecnico di Milano</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Tech. rep.</note>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Imperative versus declarative process modeling languages: An empirical investigation</title>
		<author>
			<persName><forename type="first">P</forename><surname>Pichler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Weber</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Zugal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Pinggera</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mendling</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Reijers</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Business Process Management Workshops</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="383" to="394" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">From petri nets to guard-stage-milestone models</title>
		<author>
			<persName><forename type="first">V</forename><surname>Popova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Dumas</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Business Process Management Workshops</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="340" to="351" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">Workflow controlflow patterns: A revised view</title>
		<author>
			<persName><forename type="first">N</forename><surname>Russell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">H M T</forename><surname>Hofstede</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Mulyar</surname></persName>
		</author>
		<idno>BPM-06-22</idno>
		<ptr target=".org" />
		<imprint>
			<date type="published" when="2006">2006</date>
			<pubPlace>BPMcenter</pubPlace>
		</imprint>
	</monogr>
	<note type="report_type">BPM Center Report</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
