<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Directions of the business processes theory</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>G.N. Kalyanov</string-name>
          <email>Kalyanov@mail.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Control Sciences RAS</institution>
          ,
          <addr-line>Moscow</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <fpage>28</fpage>
      <lpage>35</lpage>
      <abstract>
        <p>The business processes (BP) theory [1, 2] is one of the areas of the processes theory, represents the “section of mathematical theory of programming, studying mathematical models of the of dynamical systems behavior” [3]. In [3] the process is defined as “a pattern of behavior which is performed by action.” BP-theory models are well suited for studying hierarchical systems, including organizational systems and their processes (business processes). In fact, in processes theory the process represented by the state transition diagram (STD), including such objects as the state, initial state, transition, action (but not including the conditions of transition between states). Differences from classic STD are in the presence of many process variables, the initial conditions of the process, the use of operators instead of action. The theory provides a formal description (as well as the analysis and verification) processes with message passing based on the calculus communicating systems by R. Milner [4]. The following areas lists as sources and precursors of the processes theory [3]:</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        1. The theory of communicating sequential processes Hoare [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ], which investigates
the interaction model synchronous parallel processes based on message passing.
2. The calculus of communicating systems of Milner [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], which introduced
denotational semantics of concurrent processes, a flow graph with synchronized ports,
using the model of interaction of parallel processes Hoare.
3. The communicating processes algebra [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] – the theory of first order with equality,
in which subject variables take values in the set of processes.
4. The mobile processes (describes the behavior of distributed systems with change
communications between its components and structure), the theory of Petri nets,
the theory of partial orders, the temporal logic, the metric approach (studies the
notion of distance between processes), the synchrony and asynchrony communicating
automata, etc.
      </p>
      <p>
        We will use the following definitions [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] for this article purposes:
• Business operation is an atomic (indivisible) action that execute one job.
• Business function is a set of operations grouped by a particular attribute.
• Business process is a related set of functions, which consumes some resources and
generates a product (physical or intangible result of human labor: the subject, the
service of scientific discovery, idea).
The formal apparatus underlying the BP-theory are based on the such directions of
programming theory as formal grammar and languages; parallel processes and
methods of paralleling; test theory; methods of optimization, verification, analysis and
evaluation of quality; the theory of databases and knowledge bases; structural
methods of analysis and design .
      </p>
      <p>The report addresses the following parts of the BP-theory:
• types and classes of BP,
• BP -models (types, notations),
• modeling technologies,
• structuring/decomposition methods,
• engineering/reengineering methods,
• analysis and verification methods,
• methods for the transition from BP-models to requirements for automation of BP.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Types and classes of BP</title>
      <p>
        There are several BP classifications (based on their grouping on a functional basis, by
appointment, etc.), the most commonly used ones is given in [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ]. However, the role
of such classifications is only to help in structuring the business model (in fact,
different methods of model structuring are based on them).
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] there are introduced a special class of BP – the "conveyor" process, it is
wider than "classic" conveyor, and it allows to calculate the main BP characteristics
cannot be evaluated using simulation. The conveyor model of a process has the
following major differences from classic models of conveyor:
1. BP is described using acyclic oriented graph with operation or trigger function as
vertices.
2. Numerical characteristics of the process are determined by the recursive
expressions (not analytically).
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>BP models</title>
      <p>
        This section of the BP theory is based on the structural approach to BP modeling. A
conceptual model of the structural language is given in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], it comprises four basic
components – language dictionary, language syntax, a set of abstract semantic
rules/procedures, aspects of linguistic pragmatics.
      </p>
      <p>There are three basic models – the functional, date, behavioral (all three can
include elements orgstructure model). Types of BP models are divided into static and
dynamic, its formalisation lows are divided into weakly formalized and formal.</p>
      <p>
        The formal BP model proposed in [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. The lower level of the model contains
information objects (IO) represented by the tuples Di (ai1, ai2,…, ain), where Di is the
identifier of the i-th IO, aij is the j-th attribute of the i-th IO. A business operation is
simulated as a pair Ti Dj =(Ti, Dj), where Ti is the type of IO operations. There are the
following types of operations: creating, assigning values (definition), archiving,
destruction, registration, familiarization, editing, approval (sight), coordination of
publication (for public access), transmission performance (including appointment
routes), control of execution, binding to another IO. As rule Ti Dj =(Ti aj1, Ti aj2,…, Ti
ajk), however, for some operations (e.g., editing operations) may exist indices m such
that Ti ajm=ajm, i.e. the operation may not apply to all attributes of IO. The business
function is modeled by the tuple business transactions Im ((T1m, D1l),…, (Tkm, Dkl)),
where Im is the role of the employee, T1m,…,Tkm - elements of the set {Ti}, D1l,…,Dkl,
the elements of the set {Dj}. The business process model is a graph of control of
business functions G (N, n0, nf, E, M, EM, EN, R, ER), where N is the set of nodes,
each of which corresponds to the business function; n0 and nf - input and a terminating
node, respectively; E is a set of control edges such that ∀ i, j∈N∪{ n0, nf}: (i, j)∈E if
possible when performing a business function i will execute the business function j; M
is the set of nodes corresponding to the structural units of the enterprise; EM is the set
of edges of subordination such that ∀ i, j∈M: (i, j)∈EM, if the structural unit j is
subject to structural unit i; EN is the edge set of the execution of the business functions
that ∀ i∈M, j∈N: (i, j) ∈ EN, if the business function j can be executed in unit i; R
the set of resources of the enterprise; ER - the set of weighted edges in the use of
resources such that ∀ i∈R, j∈N: (i, j)∈ER, if the business function j uses at run time,
the resource i.
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>Modeling technologies</title>
      <p>
        Modern BP modeling technologies are based on the following basic principles:
1. Integration of models of different types, for example, DFD-technology [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ]
(integrating diagrams DFD, CFD, ERD, STD and processes specification in
different notations), Zachman framework [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], “3D-enterprise” model [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ],
BungeWanda-Weber ontological model [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
2. “Translation” from static to dynamic models (especially to Petri nets [
        <xref ref-type="bibr" rid="ref17 ref18">17, 18</xref>
        ]), for
example, software Design/IDEF–Design/CPN (the transition from IDEF0 to color
Petri nets), CPN-AMI and INCOME (the transition from DFD to Petri nets).
3. “Translation” from models of simple types to more “developed” models, in
particular, the transition from DFD or IDEF0 to a BP graph [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>
        Among the formalized technologies of building a “correct” model, it should be
noted the method of ERD normalization using Codd normal forms [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], which
consists in transforming the most simple schema to Third normal form (3NF). Note that
in practice schema 1NF and 2НФ tend to occur when you try to describe a few
realworld entity in one schema (order and book, project and staff). 3NF is the most simple
way of presenting data that reflects common sense. Building a 3NF, we actually
released the basic domain entities.
      </p>
    </sec>
    <sec id="sec-5">
      <title>Structuring/decomposition methods</title>
      <sec id="sec-5-1">
        <title>The basic principles of structuring are given in [8, 9].</title>
        <p>
          In [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ] the process decomposition is defined as a random Galton-Watson
branching process [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ]. There are builded the probabilistic model of the process
decomposition, estimated the expected number of BP model elements, the time of BP scenarios
design, the design complexity, the decomposition depth, etc.
        </p>
        <p>
          In [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ] the method of constructing the BP model based on ontological model of
Bunge-Wanda-Weber is proposed, and the “correctness” of model decomposition is
proved.
        </p>
        <p>
          In [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] the metrics to evaluate of decomposition quality (based on general
properties of “good” system - coupling and cohesion) are proposed , and many types of
coupling and cohesion are introduced and ranked (the statistics show that more than
70% of the real BP are matching these types). The method of BP designing with
given “good” type of coupling and cohesion is developed.
        </p>
        <p>
          The set of methods for developing of BP regulations are proposed in [
          <xref ref-type="bibr" rid="ref23 ref24">23, 24</xref>
          ] from
practical point.
6
        </p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Engineering/reengineering methods</title>
      <p>
        In [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] the approach to the enterprises engineering based the application of intelligent
technologies is proposed. The BP reengineering and management evolution with
using dynamic intelligent systems, simulation modeling and knowledge management
systems is presented. Integration paradigm enterprises engineering using methods of
strategic engineering, cognitive and data mining, service-oriented architectures
enterprises, multi-agent technology and ontological engineering is shown.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref11 ref26">11, 26</xref>
        ] the formalized engineering/reengineering methodology based on BP
graph model is proposed. Its central method is the method of designing a BP
scenarios, This method allow to expand the number of analyzed scenarios of the business
process until they complete enumeration, on the one hand, and to cut off the greater
part of scenarios, unacceptable for a number of objective and subjective criteria, on
the other hand. The corresponding parallel attribute grammar is a generative BP
grammar including following nine objects: G = (VN, VT, V0, P, As, Ms, An, Mn, C),
where VT - the set of terminal symbols; VN - the set of nonterminal symbols; V0 ⊆ VN
- the set of initial symbols; P - the set of generative rules; As - the finite set of
synthesized attributes; Ms - the set of methods for the synthesis of attributes; An is the finite
set of inherited attributes; Mn - the set of methods inheritance attributes; C - a set of
characters that define the parallelism. The first four object G determines the
traditional way of generating grammar description. The following four object defines a set of
properties (attributes) characterizing the symbols generated by chains, and rules for
processing these properties. The last symbol is intended to enable the generation of
business functions that can (but not necessarily must) be executed in parallel.
      </p>
      <p>
        It is proved [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] that
1. BP scenario belongs to the class of regular sets, i.e. it is the smallest of all the
classes of languages that contain the sets Ω, {ε},{terminal symbol} and closed with
respect to operations of union, concatenation and iteration. Therefore, it is a
language recognized by a nondeterministic finite state machine.
2. Its generating grammar is right grammar.
      </p>
      <p>
        Currently, under this section, the BP theory develops in the direction of formalize
the properties of “good” (according to [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]) processes such as horizontal and vertical
sealing, versioning, etc.
7
      </p>
    </sec>
    <sec id="sec-7">
      <title>Analysis and verification methods</title>
      <p>This section includes BP testing method, static data flow analysis method, dynamic
analysis techniques based on Petri nets, functional-cost analysis method and methods
of BP evaluating on the basis of software quality metrics.</p>
      <p>
        The BP testing method [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ] are based on data flows model [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] reflected the
relationship between definition and use of information objects under different masks
(for example, data access rights). The proposed method of testing allows you to:
• provide detection of specific BP errors in data flows associated with their treatment
under various masks that are not detected by other known testing methods;
• ensure detection of all errors detected by other testing methods (based on the
analysis of graph models of objects).
      </p>
      <p>
        The static analysis method of [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] provides automatic detection of errors in “static
semantics” of BP.
      </p>
      <p>
        Dynamic analysis based on Petri nets [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ] is the most developed area in this section
the BP theory. In practice, there are used complex and developed Petri nets. The
modifications usually relate to the following three points [
        <xref ref-type="bibr" rid="ref17 ref31">17, 31</xref>
        ]:
• the introduction of a hierarchy (hierarchical Petri nets);
• identify differences in markers, each of which has its own unique characteristics
(colored Petri nets);
• introduction of multi-markers positions (Petri nets with multi-positions).
      </p>
      <sec id="sec-7-1">
        <title>The functional-cost analysis method is described in detail in [32].</title>
        <p>
          Methods of BP evaluating on quality metrics software basis are based on construct
a comprehensive evaluation method combining volume and topological metrics (such
as Halstead measure [
          <xref ref-type="bibr" rid="ref33">33</xref>
          ], the cyclomatic complexity measure of McCabe [
          <xref ref-type="bibr" rid="ref34">34</xref>
          ], the
node-based measure [
          <xref ref-type="bibr" rid="ref35">35</xref>
          ], measures Henry Kafura [
          <xref ref-type="bibr" rid="ref36">36</xref>
          ], etc.) and procedures of expert
estimation.
        </p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>Methods for the transition from BP-models to requirements for automation of BP</title>
      <p>
        One of the first methods of transition from BP models to the requirements for their
automation was a method of transition from the BP functional model as hierarchy of
DFD diagrams to structural charts as models of the BP automation system design
phase [
        <xref ref-type="bibr" rid="ref37">37</xref>
        ]. This research is to assess the quality of the constructed models was
conducted.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref38">38</xref>
        ] the method of requirements generation and analysis based on the
modification of BP graph is proposed. The requirements model (reduced graph) is
investigated in following areas: calculation of metrics of coupling and cohesion, the
adequacy of the BP model, etc.
9
      </p>
    </sec>
    <sec id="sec-9">
      <title>Conclusion</title>
      <p>The article is one of the first attempts of systematization of formal methods for
modeling, analysis, reorganization and automation of business processes and formation of
their general theory, based on the theory and methods of sequential programming.
Private theories associated with different kinds of concurrency of business processes –
theory pipelined processes, the theory of vector (synchronous) processes, the theory
of asynchronous processes – are outside the focus remained.</p>
      <p>As for the general theory of processes, the article helped to identify the main gaps
and to formulate directions of development and the creation of its formal methods.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>G.N.</given-names>
            <surname>Kalyanov</surname>
          </string-name>
          .
          <article-title>Models and methods of the business processes theory (review</article-title>
          ) // Open education,
          <year>2015</year>
          , №
          <issue>6</issue>
          , pp.
          <fpage>4</fpage>
          -
          <lpage>9</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>G.N.</given-names>
            <surname>Kalyanov</surname>
          </string-name>
          .
          <article-title>The theory of business processes: formal models</article-title>
          and methods // Economics, statistics and informatics,
          <year>2016</year>
          , №
          <issue>4</issue>
          , pp.
          <fpage>19</fpage>
          -
          <lpage>21</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>A.M.</given-names>
            <surname>Mironov</surname>
          </string-name>
          . The theory of processes // Pereslavl University,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>R.</given-names>
            <surname>Milner</surname>
          </string-name>
          .
          <source>A Calculus of Communicating Systems // Number 92 in Lecture Notice in Computer Science</source>
          . Springer Verlag,
          <year>1980</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>C.A.R.</given-names>
            <surname>Hoare</surname>
          </string-name>
          . Communicating Sequential Processes // CACM,
          <year>1978</year>
          ,
          <volume>21</volume>
          (
          <issue>8</issue>
          ), pp.
          <fpage>666</fpage>
          -
          <lpage>677</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>C.A.R.</given-names>
            <surname>Hoare</surname>
          </string-name>
          . Communicating Sequential Processes // N.J.: Prentice Hall,
          <year>1985</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>J.A.</given-names>
            <surname>Bergstra</surname>
          </string-name>
          , J.W. Process Algebra for Synchronous Communicaition // Information and Control,
          <year>1984</year>
          ,
          <volume>60</volume>
          (
          <issue>1</issue>
          /3), pp.
          <fpage>109</fpage>
          -
          <lpage>137</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>G.N.</given-names>
            <surname>Kalyanov</surname>
          </string-name>
          .
          <article-title>Business processes modeling, analysis, reorganization</article-title>
          and automation// M.: Finance and statistics,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>G.N.</given-names>
            <surname>Kalyanov</surname>
          </string-name>
          .
          <article-title>Consulting: from business strategy to corporate information system</article-title>
          // M.:
          <string-name>
            <surname>Hot</surname>
          </string-name>
          line - Telecom,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>B.V.</given-names>
            <surname>Kupriyanov</surname>
          </string-name>
          .
          <source>Pipelined business processes modelling // Proceedings of "Managing large systems" // M.: 2010</source>
          , vol.
          <volume>28</volume>
          , pp.
          <fpage>230</fpage>
          -
          <lpage>273</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>G.N.</given-names>
            <surname>Kalyanov</surname>
          </string-name>
          .
          <article-title>The theory and practice of business-processes reorganization</article-title>
          // Moskow: SYNTEG,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>Gane</article-title>
          . Computer Aided Software Engineering: the Methodologies. N.J.: Prentice Hall,
          <year>1990</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>D.</given-names>
            <surname>Hatley</surname>
          </string-name>
          ,
          <string-name>
            <surname>I.Pirbhai.</surname>
          </string-name>
          <article-title>Integrated Structured Analysis</article-title>
          and
          <string-name>
            <given-names>Design. N.Y.: Dorset</given-names>
            <surname>House</surname>
          </string-name>
          ,
          <year>1987</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>J.A.</given-names>
            <surname>Zachman</surname>
          </string-name>
          .
          <article-title>A Framework for Information Systems Architecture // IBM Syst</article-title>
          . J.,
          <year>1987</year>
          , vol.
          <volume>26</volume>
          , №3, pp.
          <fpage>276</fpage>
          -
          <lpage>292</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>E.Z.</given-names>
            <surname>Zinder</surname>
          </string-name>
          .
          <article-title>"3D-enterprise" - a model of transformed system /</article-title>
          / Information Services Director,
          <year>2000</year>
          , №. 4.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Y.Wand.</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Weber</surname>
          </string-name>
          ,
          <source>An Ontological Model of an Information System // IEEE Transactions on Software Engineering</source>
          ,
          <year>1990</year>
          , Vol.
          <volume>16</volume>
          , №
          <volume>11</volume>
          , pp.
          <fpage>1282</fpage>
          -
          <lpage>1292</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <given-names>S.A.</given-names>
            <surname>Yuditskii</surname>
          </string-name>
          . Scenario approach to business systems modelling // M.: SINTEG,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <given-names>S.A.</given-names>
            <surname>Yuditskii</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.N.</given-names>
            <surname>Vladislavlev</surname>
          </string-name>
          .
          <article-title>The basics of organizational systems pre-project analysis// M.:</article-title>
          <string-name>
            <surname>SINTEG</surname>
          </string-name>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>C.J.Date</surname>
          </string-name>
          . Introduction to Database Systems, 8th Edition // Pearson,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <given-names>G.N.</given-names>
            <surname>Tziperman</surname>
          </string-name>
          .
          <article-title>A stochastic model of the information system services identification process //</article-title>
          <source>Proceedings of the ISP RAS</source>
          ,
          <year>2014</year>
          , vol.
          <volume>26</volume>
          , № 5, pp.
          <fpage>7</fpage>
          -
          <lpage>28</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <given-names>V.A.</given-names>
            <surname>Vatutin</surname>
          </string-name>
          .
          <article-title>Branching processes</article-title>
          and their applications // M.:
          <source>Steklov mathematical Institute</source>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <given-names>I.G.</given-names>
            <surname>Fedorov</surname>
          </string-name>
          .
          <article-title>Methodology of executable models and business processes control system creation // M.:</article-title>
          <string-name>
            <surname>MESI</surname>
          </string-name>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <given-names>V.V.</given-names>
            <surname>Repin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.G.</given-names>
            <surname>Eliferov</surname>
          </string-name>
          . Process approach to management: business processes modelling // M.: RIA “Standards and quality”,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <given-names>V.V.</given-names>
            <surname>Repin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.G.</given-names>
            <surname>Eliferov</surname>
          </string-name>
          .
          <article-title>Business processes: regulations</article-title>
          and methods // M.:
          <string-name>
            <surname>INFRA-M</surname>
          </string-name>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <given-names>Y.F.</given-names>
            <surname>Telnov</surname>
          </string-name>
          .
          <article-title>Reengineering of business processes: a component methodology</article-title>
          // M.: Finance and statistics,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <given-names>G.N.</given-names>
            <surname>Kalyanov</surname>
          </string-name>
          .
          <article-title>Formal methods to support the business</article-title>
          processes reengineering // Economy, statistics and informatics,
          <year>2013</year>
          , №
          <issue>3</issue>
          , pp.
          <fpage>161</fpage>
          -
          <lpage>165</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>M.Hammer</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Champy</surname>
          </string-name>
          .
          <article-title>Reengineering the Corporation: A Manifesto for</article-title>
          Business Revolution // N.Y.: Harper-Collins,
          <year>1993</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <given-names>G.N.</given-names>
            <surname>Kalyanov</surname>
          </string-name>
          .
          <article-title>The testing of information flows // Proceedings of the 13-th Russian scientific-practical conference “Business processes reengineering on the basis of modern information technologies</article-title>
          .
          <source>Process control systems and knowledge”. M.: 2010</source>
          , pp.
          <fpage>146</fpage>
          -
          <lpage>151</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <given-names>G.N.</given-names>
            <surname>Kalyanov</surname>
          </string-name>
          .
          <article-title>Formal business processes engineering</article-title>
          and verification methods // Proceedings of 16
          <article-title>-th scientific-practical conference “Enterprises engineering and knowledge management”</article-title>
          . M.:
          <year>2013</year>
          , pp.
          <fpage>144</fpage>
          -
          <lpage>149</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <given-names>J.L.</given-names>
            <surname>Peterson</surname>
          </string-name>
          .
          <article-title>Petri Net Theory and</article-title>
          the Modeling of Systems // N.J.: Prentice Hall,
          <year>1981</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>J.Mendling</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Reijers</surname>
            ,
            <given-names>W.Van der Aalst. Seven</given-names>
          </string-name>
          <string-name>
            <surname>Process</surname>
          </string-name>
          Modeling Guidelines // Information and Software Technology,
          <year>2010</year>
          , Vol.
          <volume>52</volume>
          , № 2, pp.
          <fpage>127</fpage>
          -
          <lpage>136</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <given-names>V.A.</given-names>
            <surname>Ivlev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.V.</given-names>
            <surname>Popova</surname>
          </string-name>
          . ABC/ABM/ABB - methods and systems // M.: “1C publishing”,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>M.H.Halstead</surname>
          </string-name>
          . Elements of Software Science // Amsterdam: Elsevier North-Holland,
          <year>1977</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>T.J.McCabe</surname>
          </string-name>
          . A Complexity Measure // IEEE Transactions on Software Engineering,
          <year>1976</year>
          , Vol. SE-
          <volume>2</volume>
          , № 4, pp.
          <fpage>308</fpage>
          -
          <lpage>320</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>M.R.Woodword</surname>
          </string-name>
          and etc.
          <source>A Measure of Control Flow Complexity in Program Text // IEEE Transactions on Software Engineering</source>
          ,
          <year>1979</year>
          , Vol. SE-
          <volume>5</volume>
          , № 1, pp.
          <fpage>45</fpage>
          -
          <lpage>50</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <given-names>S.</given-names>
            <surname>Henry</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Kafura</surname>
          </string-name>
          .
          <source>Software Structure Metrics Based on Information Flow // IEEE Transactions on Software Engineering</source>
          ,
          <year>1981</year>
          , Vol. SE-
          <volume>7</volume>
          , № 5, pp.
          <fpage>510</fpage>
          -
          <lpage>518</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>Gane</article-title>
          . Computer Aided Software Engineering: the Methodologies // N.J.: Prentice Hall,
          <year>1990</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <given-names>G.N.</given-names>
            <surname>Kalyanov</surname>
          </string-name>
          .
          <article-title>System analysis of requirements for KIS // Proceedings of the 15-th Russian scientific-practical conference “Business processes reengineering on the basis of modern information technologies. Knowledge management system”</article-title>
          . M.:
          <year>2012</year>
          , pp.
          <fpage>96</fpage>
          -
          <lpage>98</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>