<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Interoperability in the ProM Framework</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>H.M.W. Verbeek</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>B.F. van Dongen</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>J. Mendling</string-name>
          <email>jan.mendling@wu-wien.ac.at</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>W.M.P. van der Aalst</string-name>
          <email>w.m.p.v.d.aalstg@tm.tue.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Technology Management, Eindhoven University of Technology P.</institution>
          <addr-line>O. Box 513, NL-5600 MB, Eindhoven</addr-line>
          ,
          <country country="NL">The Netherlands</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Vienna University of Economics and Business Administration Augasse 2-6</institution>
          ,
          <addr-line>1090 Vienna</addr-line>
          ,
          <country country="AT">Austria</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Originally the ProM framework was developed as a design artifact for the process mining domain, i.e., extracting process models from event logs. However, in recent years the scope of the framework has become broader and now includes process veri¯cation, social network analysis, conformance checking, veri¯cation based on temporal logic, etc. Moreover, the framework supports a wide variety of process models, e.g., Petri nets, Event-driven Process Chains (EPCs), Heuristics nets, YAWL models, and is plug-able, i.e., people can add plug-ins without changing the framework itself. This makes the ProM framework an interesting environment for model interoperability. For example, people can take transaction log from IBM's WebSphere, discover a process model in terms of a heuristics net, convert the heuristics net to a Petri net for analysis, load an EPC de¯ned using the ARIS toolset, verify the EPC and convert it to a Petri net, determine the ¯tness of the ARIS model given the transaction log from WebSphere, and ¯nally convert both models to a YAWL speci¯cation that is exported. Such application scenarios are supported by ProM and demonstrate true model interoperability. In this paper, we present ProM's interoperability capabilities using a running example.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Information technology has changed business processes within and between
enterprises. More and more, work processes are being conducted under the
supervision of information systems that are driven by process models [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Examples
are: work°ow management systems such as Sta®ware, enterprise resource
planning systems such as SAP and Baan, and recently also web services composition
languages such as BPEL4WS and BPML. Unfortunately, there is little
consensus on the language to be used. Existing languages are typically vendor or tool
speci¯c and do not have formal and/or executable semantics. This has resulted
in the \Tower of Babel of process languages": A plethora of similar but subtly
di®erent languages inhibiting e®ective process support. Despite the many results
in concurrency theory, it is not realistic to assume that the situation will improve
in the near future [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Hence there is a need to be able to convert models from
one notation to another.
      </p>
      <p>Moreover, even within one organization there may be many models in
di®erent languages. For example, an organization may have process models developed
using ARIS, simulation models developed using Arena, and Sta®ware models to
con¯gure the work°ow system. Even if these models describe the same process,
they focus on di®erent aspects and use di®erent notations. Therefore, it is useful
to convert models from one notation into the other.</p>
      <p>Given the existence of a wide variety of process modeling languages and the
fact that within organizations models in di®erent languages (e.g., for simulation,
for decision making, for enactment, etc.) are being made for the same process,
(process) model interoperability is a relevant topic.</p>
      <p>
        In this paper, the focus is on interoperability in the context of the ProM
(Process Mining) framework [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. ProM has been developed as a design artifact
[
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] for the process mining domain. Process mining aims at extracting
information from event logs to capture the business process as it is being executed.
Process mining is particularly useful in situations where events are recorded but
there is no system enforcing people to work in a particular way. Consider for
example a hospital where the diagnosis and treatment activities are recorded in
the hospital information system, but where health-care professionals determine
the \care°ow". Many process mining algorithms have developed [3{6, 11{14] and
currently a variety of these techniques are supported by ProM.
      </p>
      <p>Although the initial focus of ProM was on process mining, over time the
functionality of ProM was extended to include other types of analysis, model
conversions, model comparison, etc. This was enabled by the plug-able architecture
of ProM (it is possible to add new functionality without changing the
framework itself) and the fact that ProM supported multiple modeling formalisms
right from the start. By applying ProM in several case studies, we got a lot of
practical experiences with model interoperability. This paper reports on these
experiences using the running example depicted in Figure 1. This example will
be used to provide a guided tour of the ProM framework.</p>
      <p>
        Figure 1 shows an EPC (Event-driven Process Chain) [
        <xref ref-type="bibr" rid="ref18 ref20">18, 20</xref>
        ] describing a
review process. In principle each paper should be reviewed by three people.
However, reviewers may be tardy resulting in time-outs. After a while the reviews
are collected and based on the result: a paper is rejected, a paper is accepted,
or an additional reviewer is invited. In the EPC each activity is represented by
a function (shown as a rectangle), states in-between activities are events (shown
as hexagons), and to model the splitting and joining of °ows connectors are
used (shown as circles). Events and functions alternate (even in the presence of
connectors). Connectors may be split or join connectors and we distinguish
between XOR, OR, and AND connectors. For example, in Figure 1 the connector
following function \Invite reviewers" is an OR-split connector. The last
connector joining two °ows after \accept paper" and \reject paper" is an XOR-join
connector.
      </p>
      <p>
        The EPC shown in Figure 1 could have been imported into ProM from ARIS
[
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], ARIS PPM [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], or EPC Tools [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. (Note that each of these tools uses
a di®erent format.) Moreover, the EPC could have been discovered using some
process mining plug-in or be the result of some conversion (e.g., translating
Petri nets into EPCs). Once a model such as the EPC shown in Figure 1 is in
the ProM framework, it can be used as a starting point for analysis and model
conversion. For example, the EPC could be translated to a Petri net for analysis
or to a YAWL diagram for enactment. In this paper, we show that such model
interoperability is possible. Clearly, information can be lost in the conversions.
However, it is de¯nitely possible to support mature forms of interoperability by
following the rather pragmatic approach used in ProM.
      </p>
      <p>
        The remainder of this paper is organized as follows. Section 2 brie°y
introduces the ProM framework. For a more detailed introduction we refer to [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
Section 3 shows an example of a process discovery, i.e., based on a log ¯le a
Petri net model is constructed. Section 4 takes this Petri net, and analyses to
what extent another log corresponds to it. Section 5 converts the Petri net to
both an EPC and a YAWL model. Section 6 exports the resulting YAWL model
to a YAWL engine ¯les, and shows that we can upload this ¯le into a running
YAWL engine where the process can be enacted. Section 7 concludes the paper.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>The ProM Framework</title>
      <p>Export plug-ins</p>
      <p>Conversion plug-ins
°ow management systems such as Sta®ware, Oracle BPEL, Eastman Work°ow,
WebSphere, InConcert, FLOWer, Caramba, and YAWL, simulation tools such
as ARIS, EPC Tools, Yasper, and CPN Tools, ERP systems like PeopleSoft and
SAP, analysis tools such as AGNA, NetMiner, Viscovery, AlphaMiner, and ARIS
PPM. We have used more than 20 systems to exchange process models and/or
event logs with ProM. As Figure 2 shows there are ways to directly import or
export models or to load logs.</p>
      <p>Although ProM is open source and people can change or extend the code, in
addition we o®er the so-called \plug-in" concept. Plug-ins allow for the addition
of new functionality by adding a plug-in rather than modifying the source code.
Without knowing all details of the framework, external parties can create (and
have created) their own plug-ins with ease. Currently there are more than 70
plug-ins. ProM supports ¯ve kinds of plug-ins:
Mining plug-ins typically take a log and produce a model,
Import plug-ins typically import a model from ¯le, and possibly use a log to
identify the relevant objects in the model,
Export plug-ins typically export a model to ¯le,
Conversion plug-ins typically convert one model into another, and
Analysis plug-ins typically analyse a model, eventually in combination with
a log.</p>
      <p>
        In the paper, we cannot show each of the more than 70 plug-ins in detail. Instead
we focus on our running example of the review process and related mining,
analysis, conversion, import and export plug-ins.
Mining plug-ins like the alpha algorithm [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and social network analyzer [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]
extract models from even logs. Extracting these event-logs from di®erent
operational systems is an interoperability issue in itself, which has been dealt with in
[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], where the mapping from these systems to our MXML format is described.
      </p>
      <p>Most mining plug-ins discover process models represented in terms of Petri
nets, EPCs, etc. However, some mining plug-ins also address other perspectives
such as the data or organizational perspective.</p>
      <p>
        Starting point for our running example is a log containing events related
to the reviewing of papers. Based on such events we can automatically create
a process model as shown in Figure 3. This model has been created using the
®-algorithm [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Using the same log, we can also construct and analyze a social
network as shown in Figure 4.
      </p>
    </sec>
    <sec id="sec-3">
      <title>Analysis</title>
      <p>After obtaining a process model using process mining or by simply loading the
model from another tool, we can analyse it using one of the available analysis
plug-ins for this model type. Because the process model is a Petri net, we can
only start a Petri-net analysis plug-in. The framework is capable of determining
at runtime which plug-ins can handle the current model, and it will only o®er
plug-ins that can handle the current model to the user. In addition to classical
analysis tools such as a veri¯cation tool, ProM also o®er a conformance checker
and an LTL checker as described below.
4.1</p>
      <sec id="sec-3-1">
        <title>Conformance Checker</title>
        <p>
          As an example, and to show how versatile ProM is, we can analyze to what
extent another log ¯ts the mined review process model. For this reason, we open
another log, and start a conformance checker [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ] plug-in with the combination
of the process model and the log as input (note that ProM automatically o®ers
this combination to the conformance plug-in in the analysis menu). Figure 5
shows a snippet of the results. From these results, we learn that (for example):
{ The log does not ¯t the model entirely, as the ¯tness ¼ 0:89 (if the log would
¯t the model, the ¯tness would be 1).
{ In 65 out of 100 cases, the process ended just before the \decide" task.
{ In 29 out of the remaining 35 cases, the \decide" task was executed
successfully.
{ In the remaining 6 cases, an execution of the \decide" task had to be inserted
to allow logged successors (like \accept" and \reject") to execute.
4.2
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>LTL Checker</title>
        <p>
          Another interesting analysis plug-in is the LTL-checker [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ], that can check logical
expressions that involve time on a log. Using this plug-in, we can for example
check whether in all cases the `four-eyes principle' was satis¯ed, using the
following LTL expressions:
subformula execute( p : person, a : activity ) :=
{Is a specific activity executed by a specific person?}
&lt;&gt; ( (activity == a /\ person == p ) ) ;
formula four_eyes_principle(a1:activity,a2:activity) :=
{Two specific activities should not be executed by the same person.}
forall[p:person |(!(execute(p,a1)) \/ !(execute(p,a2)))];
After we have analyzed the process model (a Petri net), we can convert it into
other process models. For example, we can convert it into an EPC or a YAWL
model. However, before doing so, we declare the four \time-out" transitions in
Figure 3 to be invisible. Figure 7 shows the result. The four \time-out"
transitions did not correspond to any real activities in the process, i.e., they were only
there for routing purposes (to bypass the \get review" tasks). When converting
one model to another we can use such information.
First, we convert the Petri net shown in Figure 7 into an EPC. The general idea of
this conversion is to map transitions to EPC functions, to derive connectors from
splits and joins in the Petri Net, and to add events in order to conform with the
EPC de¯nition. The resulting EPC has the same structure as the one in Figure 1.
Of course, after converting the Petri net to an EPC, di®erent plug-ins may be
applied to the process model. For example, we could check the correctness of the
resulting EPC using the plug-ins described in [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. Figure 8 shows the result: The
EPC is trivially correct.
        </p>
        <p>getreview2
complete
getreview1
complete
getreview3
complete
Of course, we can also export any model to ¯le. For example, we can export the
converted YAWL model to a YAWL engine ¯le, which can be uploaded
rightaway by a YAWL engine. Figure 10 shows the result after we've uploaded the ¯le:
a YAWL model with ID \WFNet28922354" has been uploaded. Note that most
¯elds (speci¯cation ID, speci¯cation name, documentation, . . . ) are generated by
ProM. Figure 10 also shows a work list for the uploaded process. Currently, three
work items are available in the work list: One for the task \invite reviewers",
one for \decide", and one for \collect reviews".</p>
        <p>
          Note that sometimes a model type in ProM (e.g., Petri net or EPC) can
have multiple export and import formats. For example, ProM supports three
EPC formats: the ARIS Markup Language (AML) used by the ARIS toolset,
the ARIS graph format used by ARIS PPM, and the EPC Markup Language
(EPML) used by EPC Tools. For a detailed analysis of the heterogeneities and
the di®erent scope of these EPC formats refer to [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ]. For Petri nets four di®erent
formats are supported: PNML, TPN, PNK, and CPN Tools.
7
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Conclusions</title>
      <p>This paper described the many models types and associated plug-ins that exist
inside the ProM framework. Although the initial focus of ProM was on process
mining, the current functionality of the tool makes ProM also interesting from
a model interoperability point of view. To demonstrate this, we have used a
running example.</p>
      <p>Figure 11 provides an overview of the di®erent ways we have used ProM
regarding this example. The numbers on the edges refer to the sections where
the edges were used. Prior to the paper, we used CPN Tools to generate both logs
(the one we used for the mining and the one we used for the analysis), and we
used ProMimport to convert the generated logs to the common MXML format.
After having mined one log for the review process model and its social network
(see Section 3), we analyzed the mined process in combination with the second
log (see Section 4) to check (i) to what extent the process model and the other
log ¯t (conformance checker) and (ii) whether the log adheres to some additional
properties one would want to hold for the review process (LTL checker). Next,
we converted the discovered Petri net into an EPC (which was used in Section 1)
and a YAWL model (see Section 5). Finally, we exported the YAWL model (see
Section 6) and uploaded the resulting YAWL engine ¯le into a running YAWL
engine.</p>
      <p>It is important to note that in the process described Figure 11 we only
partially used the broad functionality of ProM. At the moment, ProM contains
10 import plug-ins, 13 mining plug-ins, 19 analysis plug-ins, 9 conversion
plugins, and 19 export plug-ins. Although we could only show a fraction of the model
interoperability o®ered by ProM, Figure 11 nicely demonstrates how versatile
the ProM framework is, and how it can link di®erent external tools together.</p>
      <p>
        The development and practical applications of ProM and experiences in the
BABEL project [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] helped us to get a deeper understanding of model
interoperability. One of the important lessons is that it is fairly easy to convert one
model into another model if one is willing to accept some loss of information
or precision. For example, there exist many interpretations of the semantics of
EPCs (cf. the \Vicious Circle" discussion in [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]). Nevertheless, rough
translations from EPCs to YAWL and Petri nets can be very useful because they
YAWL
engine
NetMiner
External
tools
6
3
      </p>
      <p>YAWL
model</p>
      <p>Model files</p>
      <p>NetMiner
file
6
3
Import plug-ins</p>
      <p>NetMiner
3
3
social
netwrks</p>
      <p>
        Fig. 11. An overview of the way we used ProM in this paper.
are correct in most practical cases. Moreover, operations such as EPC reduction
and veri¯cation can be applied without selecting one particular semantical
interpretation [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Therefore, we advocate a pragmatic approach which is based on
simply testing model interoperability by implementing this in an environment
like the ProM framework and by applying it to a wide variety of real-life models.
For example, at this point in time we are converting all EPCs in the SAP R/3
reference model (approximately 600 process models) to YAWL for the purpose
of veri¯cation.
      </p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgements and relation to INTEROP</title>
      <p>We thank INTEROP for supporting this work that has been conducted in the
context of the INTEROP work package \Domain Ontologies for
Interoperability" and the INTEROP-SIG \Contract and Webservices Execution Monitoring
through Conformance Testing". We also thank EIT, STW, and NWO for
supporting the development of the ProM framework, cf. www.processmining.org.
The authors would also like to thank Ton Weijters, Ana Karla Alves de Medeiros,
Anne Rozinat, Christian GuÄnter, Minseok Song, Lijie Wen, Laura Maruster,
Huub de Beer, Peter van den Brand, Andriy Nikolov, et al. for developing parts
of ProM.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>W.M.P. van der Aalst</surname>
            , H.T. de Beer, and
            <given-names>B.F. van Dongen. Process</given-names>
          </string-name>
          <string-name>
            <surname>Mining</surname>
          </string-name>
          and
          <article-title>Veri¯cation of Properties: An Approach based on Temporal Logic</article-title>
          . In R. Meersman and
          <string-name>
            <given-names>Z.</given-names>
            <surname>Tari</surname>
          </string-name>
          et al., editors,
          <source>On the Move to Meaningful Internet Systems</source>
          <year>2005</year>
          : CoopIS, DOA, and ODBASE: OTM Confederated International Conferences, CoopIS, DOA, and
          <source>ODBASE</source>
          <year>2005</year>
          , volume
          <volume>3760</volume>
          of Lecture Notes in Computer Science, pages
          <volume>130</volume>
          {
          <fpage>147</fpage>
          . Springer-Verlag, Berlin,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>W.M.P. van der Aalst</surname>
            ,
            <given-names>H.A.</given-names>
          </string-name>
          <string-name>
            <surname>Reijers</surname>
            , and
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Song</surname>
          </string-name>
          .
          <article-title>Discovering Social Networks from Event Logs</article-title>
          . Computer Supported Cooperative work,
          <volume>14</volume>
          (
          <issue>6</issue>
          ):
          <volume>549</volume>
          {
          <fpage>593</fpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>W.M.P. van der Aalst</surname>
            ,
            <given-names>B.F. van Dongen</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Herbst</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Maruster</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>Schimm, and</article-title>
          <string-name>
            <given-names>A</given-names>
            .
            <surname>J.M.M. Weijters</surname>
          </string-name>
          .
          <article-title>Work°ow Mining: A Survey of Issues and Approaches</article-title>
          .
          <source>Data and Knowledge Engineering</source>
          ,
          <volume>47</volume>
          (
          <issue>2</issue>
          ):
          <volume>237</volume>
          {
          <fpage>267</fpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>W.M.P. van der Aalst</surname>
          </string-name>
          , A.
          <string-name>
            <surname>J.M.M. Weijters</surname>
            , and
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Maruster</surname>
          </string-name>
          . Work°ow Mining:
          <article-title>Discovering Process Models from Event Logs</article-title>
          .
          <source>IEEE Transactions on Knowledge and Data Engineering</source>
          ,
          <volume>16</volume>
          (
          <issue>9</issue>
          ):
          <volume>1128</volume>
          {
          <fpage>1142</fpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>R.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gunopulos</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Leymann</surname>
          </string-name>
          .
          <article-title>Mining Process Models from Work°ow Logs</article-title>
          .
          <source>In Sixth International Conference on Extending Database Technology</source>
          , pages
          <volume>469</volume>
          {
          <fpage>483</fpage>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>J.E.</given-names>
            <surname>Cook</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.L.</given-names>
            <surname>Wolf</surname>
          </string-name>
          .
          <article-title>Discovering Models of Software Processes from EventBased Data</article-title>
          .
          <source>ACM Transactions on Software Engineering and Methodology</source>
          ,
          <volume>7</volume>
          (
          <issue>3</issue>
          ):
          <volume>215</volume>
          {
          <fpage>249</fpage>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>B. van Dongen</given-names>
            ,
            <surname>A.K. Alves de Medeiros</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.M.W.</given-names>
            <surname>Verbeek</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.J.M.M. Weijters</surname>
            , and
            <given-names>W.M.P. van der Aalst.</given-names>
          </string-name>
          <article-title>The ProM framework: A New Era in Process Mining Tool Support</article-title>
          . In G. Ciardo and P. Darondeau, editors,
          <source>Application and Theory of Petri Nets</source>
          <year>2005</year>
          , volume
          <volume>3536</volume>
          of Lecture Notes in Computer Science, pages
          <volume>444</volume>
          {
          <fpage>454</fpage>
          . Springer-Verlag, Berlin,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>B.F. van Dongen</given-names>
            and
            <surname>W.M.P. van der Aalst</surname>
          </string-name>
          .
          <article-title>A Meta Model for Process Mining Data</article-title>
          . In J. Casto and E. Teniente, editors,
          <source>Proceedings of the CAiSE'05 Workshops (EMOI-INTEROP Workshop)</source>
          , volume
          <volume>2</volume>
          , pages
          <fpage>309</fpage>
          {
          <fpage>320</fpage>
          . FEUP, Porto, Portugal,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>B.F. van Dongen</given-names>
            ,
            <surname>W.M.P. van der Aalst</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.M.W.</given-names>
            <surname>Verbeek</surname>
          </string-name>
          .
          <article-title>Veri¯cation of EPCs: Using Reduction Rules and Petri Nets</article-title>
          . In O. Pastor and J. Falcao e Cunha, editors,
          <source>Proceedings of the 17th Conference on Advanced Information Systems Engineering (CAiSE'05)</source>
          , volume
          <volume>3520</volume>
          of Lecture Notes in Computer Science, pages
          <volume>372</volume>
          {
          <fpage>386</fpage>
          . Springer-Verlag, Berlin,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>M. Dumas</surname>
          </string-name>
          ,
          <string-name>
            <surname>W.M.P. van der Aalst</surname>
          </string-name>
          , and
          <string-name>
            <surname>A.H.M. ter Hofstede</surname>
          </string-name>
          .
          <source>Process-Aware Information Systems: Bridging People and Software through Process Technology</source>
          . Wiley &amp; Sons,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. W. Gaaloul,
          <string-name>
            <given-names>S.</given-names>
            <surname>Bhiri</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Godart</surname>
          </string-name>
          .
          <article-title>Discovering Work°ow Transactional Behavior from Event-Based Log</article-title>
          . In R. Meersman,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Tari</surname>
          </string-name>
          ,
          <string-name>
            <surname>W.M.P. van der Aalst</surname>
          </string-name>
          , C. Bussler,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Gal</surname>
          </string-name>
          et al., editors,
          <source>On the Move to Meaningful Internet Systems</source>
          <year>2004</year>
          : CoopIS, DOA, and ODBASE: OTM Confederated International Conferences, CoopIS, DOA, and
          <source>ODBASE</source>
          <year>2004</year>
          , volume
          <volume>3290</volume>
          of Lecture Notes in Computer Science, pages
          <volume>3</volume>
          {
          <fpage>18</fpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. G. Greco,
          <string-name>
            <given-names>A.</given-names>
            <surname>Guzzo</surname>
          </string-name>
          , G. Manco, and
          <string-name>
            <given-names>D.</given-names>
            <surname>Saccµa</surname>
          </string-name>
          .
          <article-title>Mining and Reasoning on Work°ows</article-title>
          .
          <source>IEEE Transaction on Knowledge and Data Engineering</source>
          ,
          <volume>17</volume>
          (
          <issue>4</issue>
          ):
          <volume>519</volume>
          {
          <fpage>534</fpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>D.</given-names>
            <surname>Grigori</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Casati</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Castellanos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Dayal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sayal</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.C.</given-names>
            <surname>Shan</surname>
          </string-name>
          .
          <article-title>Business process intelligence</article-title>
          . Computers in Industry,
          <volume>53</volume>
          (
          <issue>3</issue>
          ):
          <volume>321</volume>
          {
          <fpage>343</fpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>J. Herbst.</surname>
          </string-name>
          <article-title>A Machine Learning Approach to Work°ow Management</article-title>
          .
          <source>In Proceedings 11th European Conference on Machine Learning</source>
          , volume
          <volume>1810</volume>
          <source>of Lecture Notes in Computer Science</source>
          , pages
          <volume>183</volume>
          {
          <fpage>194</fpage>
          . Springer-Verlag, Berlin,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>A.R. Hevner</surname>
            ,
            <given-names>S.T.</given-names>
          </string-name>
          <string-name>
            <surname>March</surname>
            , J. Park, and
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Ram</surname>
          </string-name>
          .
          <article-title>Design science in information systems research</article-title>
          .
          <source>MIS Quarterly</source>
          ,
          <volume>28</volume>
          (
          <issue>1</issue>
          ):
          <volume>75</volume>
          {
          <fpage>105</fpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>A.H.M. ter Hofstede</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Dumas</surname>
            , and
            <given-names>W.M.P. van der Aalst. Unraveling</given-names>
          </string-name>
          <article-title>the Babel of Process Support: On the expressiveness and exchange of business process execution languages (BABEL)</article-title>
          .
          <source>Project Proposal ARC Discovery</source>
          , http://www.bpm.¯t.qut.edu.au/projects/babel/,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <given-names>IDS</given-names>
            <surname>Scheer. ARIS Process Performance</surname>
          </string-name>
          <article-title>Manager (ARIS PPM): Measure, Analyze and Optimize Your Business Process Performance (whitepaper)</article-title>
          .
          <source>IDS Scheer</source>
          , Saarbruecken, Gemany, http://www.ids-scheer.com,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18. G. Keller and T. Teufel. SAP R/3 Process Oriented Implementation. AddisonWesley, Reading MA,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19. E. Kindler.
          <article-title>On the Semantics of EPCs: A Framework for Resolving the Vicious Circle</article-title>
          . In J. Desel,
          <string-name>
            <given-names>B.</given-names>
            <surname>Pernici</surname>
          </string-name>
          , and M. Weske, editors,
          <source>International Conference on Business Process Management (BPM</source>
          <year>2004</year>
          ), volume
          <volume>3080</volume>
          of Lecture Notes in Computer Science, pages
          <volume>82</volume>
          {
          <fpage>97</fpage>
          . Springer-Verlag, Berlin,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20. E. Kindler.
          <article-title>On the Semantics of EPCs: A Framework for Resolving the Vicious Circle</article-title>
          .
          <source>Data and Knowledge Engineering</source>
          ,
          <volume>56</volume>
          (
          <issue>1</issue>
          ):
          <volume>23</volume>
          {
          <fpage>40</fpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <given-names>J.</given-names>
            <surname>Mendling</surname>
          </string-name>
          and
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>NuÄttgens. Transformation of ARIS Markup Language to EPML</article-title>
          .
          <source>In Proceedings of the 3rd GI Workshop on Business Process Management with Event-Driven Process Chains (EPK</source>
          <year>2004</year>
          ), pages
          <fpage>27</fpage>
          {
          <fpage>38</fpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <given-names>A.</given-names>
            <surname>Rozinat</surname>
          </string-name>
          and
          <string-name>
            <given-names>W.M.P. van der Aalst. Conformance</given-names>
            <surname>Testing</surname>
          </string-name>
          <article-title>: Measuring the Fit and Appropriateness of Event Logs and Process Models</article-title>
          . In C. Bussler et al., editor,
          <source>BPM 2005 Workshops (BPI Workshop)</source>
          , volume
          <volume>3812</volume>
          of Lecture Notes in Computer Science, pages
          <volume>163</volume>
          {
          <fpage>176</fpage>
          . Springer-Verlag, Berlin,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <given-names>A.W.</given-names>
            <surname>Scheer</surname>
          </string-name>
          . ARIS: Business Process Modelling. Springer-Verlag, Berlin,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>