<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Compositional Conformance Checking of Nested Petri Nets and Event Logs of Multi-Agent Systems</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Khalil</forename><surname>Mecheraoui</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">National Research University Higher School of Economics</orgName>
								<address>
									<addrLine>Myasnitskaya ul. 20</addrLine>
									<postCode>101000</postCode>
									<settlement>Moscow</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">University of Constantine</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Julio</forename><forename type="middle">C</forename><surname>Carrasquel</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">National Research University Higher School of Economics</orgName>
								<address>
									<addrLine>Myasnitskaya ul. 20</addrLine>
									<postCode>101000</postCode>
									<settlement>Moscow</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Irina</forename><forename type="middle">A</forename><surname>Lomazova</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">National Research University Higher School of Economics</orgName>
								<address>
									<addrLine>Myasnitskaya ul. 20</addrLine>
									<postCode>101000</postCode>
									<settlement>Moscow</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="department">-Abdelhamid Mehri</orgName>
								<address>
									<addrLine>Nouvelle ville Ali Mendjeli BP : 67A</addrLine>
									<postCode>25000</postCode>
									<settlement>Constantine</settlement>
									<country key="DZ">Algeria</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Compositional Conformance Checking of Nested Petri Nets and Event Logs of Multi-Agent Systems</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">8A68D5418619F9A9E545346AF1644E16</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T00:43+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Process mining</term>
					<term>conformance checking</term>
					<term>Petri nets</term>
					<term>nested Petri nets</term>
					<term>multi-agent systems</term>
					<term>fitness</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This paper presents a compositional conformance checking approach between nested Petri nets and event logs of multi-agent systems. By projecting an event log onto model components, one can perform conformance checking between each projected log and the corresponding component. We formally demonstrate the validity of our approach proving that, to check fitness of a nested Petri net is equivalent to check fitness of each of its components. Leveraging the multi-agent system structure of nested Petri nets, this approach may provide specific conformance diagnostics for each system component as well as to avoid to compute artificial boundaries when decomposing a model for conformance checking.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Lift, thrust, drag, and gravity are the four forces helping an airplane fly. Process mining has similarly four forces to measure its quality namely fitness, generalization, precision, and simplicity <ref type="bibr">[1]</ref>. Conformance checking, which is one of the three pillars of process mining, is actually the fitness force <ref type="bibr" target="#b3">[2]</ref>. It allows to check how well modeled behavior conforms reality as recorded in an event log. Conformance checking has become relevant in areas such as business alignment <ref type="bibr">[3]</ref>, auditing <ref type="bibr" target="#b5">[4]</ref>, and financial software testing <ref type="bibr" target="#b6">[5]</ref>. However, current conformance checking approaches fall short when analyzing large event logs of complex multi-agent systems. These systems are characterized by a large number of agents interacting, and exhibiting a high degree of concurrency. In this light, it makes sense to use compositional approaches, where a conformance problem can be decomposed into smaller problems (e.g. <ref type="bibr" target="#b7">[6,</ref><ref type="bibr" target="#b8">7,</ref><ref type="bibr" target="#b9">8]</ref>). In <ref type="bibr" target="#b7">[6]</ref>, the author formalizes the so-called valid decomposition to decompose conformance problems. This decomposition approach represents no problem from a conformance point of view. In <ref type="bibr" target="#b8">[7]</ref>, the authors proposed to decompose models using the idea of single-entry and single-exit (SESE).</p><p>MACSPro'2020: Modeling and Analysis of Complex Systems and Processes, October 22-24, 2020, Venice, Italy &amp; Moscow, Russia email: k_mecheraoui@esi.dz (K. Mecheraoui); jcarrasquel@hse.ru (J.C. Carrasquel); ilomazova@hse.ru (I.A. Lomazova) url: https://www.hse.ru/en/staff/jcarrasquel (J.C. Carrasquel); https://www.hse.ru/en/staff/ilomazova (I.A. Lomazova) orcid: 0000-0001-9906-6074 (K. Mecheraoui); 0000-0003-3557-797X (J.C. Carrasquel); 0000-0002-9420-3751 (I.A. Lomazova)</p><p>Figure <ref type="figure">1</ref>: A nested Petri net where the system net 𝑆𝑁 models an automated assistant engine, serving customers concurrently (in this case, agents 𝑟 1 and 𝑟 2 ).</p><p>A SESE component is a subnet that has a simple interface w.r.t the rest of the net. Another approach is presented in <ref type="bibr" target="#b9">[8]</ref> to compute the overall conformance of a model by merging previously decomposed fragments.</p><p>Nevertheless, these approaches use process models whose structure may not provide a clear distinction between system components and their boundaries. This leads these approaches to increase their complexity to compute such boundaries (e.g., where to decompose a model, how many components, etc). Moreover, it may happen that the decomposition is artificial, i.e., fragments of a decomposed model do not represent a real division of a system, so diagnostics for each real component may not be provided. In this sense, we propose the use of models of multi-agent systems. In particular, we consider nested Petri nets (NP-nets) <ref type="bibr" target="#b10">[9]</ref> -an extension of Petri nets, where tokens can be Petri nets themselves, allowing to model multi-agent systems. NP-nets have been already used in the broader context of process modeling and workflow management <ref type="bibr" target="#b11">[10,</ref><ref type="bibr" target="#b12">11]</ref>.</p><p>Fig. <ref type="figure">1</ref> depicts an example of a NP-net describing an automated assistant engine that can serve multiple customers concurrently. A NP-net consists of a system net, i.e., modeling the system's environment, and a set of net tokens, denoting interacting agents. Each net token has an inner Petri net structure describing agent behavior.</p><p>In this paper, we present a compositional conformance checking approach between nested Petri nets and event logs of multi-agent systems. Given an event log of a multi-agent system, we decompose it into several projections according to the model components. Then, a conformance checking technique (e.g., replay, alignment) can be performed separately between each projection and the corresponding model component (an agent or the system net). We assume that each agent in the event log corresponds to a net token in the nested Petri net model. For this task, we provide clear definitions regarding a subclass of nested Petri nets and event logs of multi-agent systems. To demonstrate the validity of our approach, we consider the notion of fitness. If a model has perfect fitness, then all log traces can be replayed on the model from beginning to end. In this work, we map such notion of an event log that perfectly fits a model, by defining how an event log of a multi-agent system fits a nested Petri net. Consequently, as an important result of this paper, we state and prove the following theorem: an event log of a multi-agent system perfectly fits a nested Petri net if and only if the event log is syntactically correct w.r.t to the nested Petri net and each projection perfectly fits the corresponding model component. This theorem justifies the validity of our compositional approach.</p><p>The remainder of this paper is structured as follows. In section 2, we describe nested Petri nets. In section 3, we define the structure for event logs of multi-agent systems. In section 4, we present the compositional conformance checking approach of nested Petri nets and event logs of multi-agent systems, including the aforementioned theorem and its proof. Finally, section 5 presents some conclusions and future work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Nested Petri Nets</head><p>ℕ denotes the set of natural numbers (including zero). Let 𝑆 be a set. The set of all subsets of 𝑆 is called a power set, denoted as 𝒫 (𝑆), e.g., the power set of 𝑆 = {𝑎, 𝑏} is 𝒫 (𝑆) = {{𝑎, 𝑏}, {𝑎}, {𝑏}, ∅}. A 𝑚𝑢𝑙𝑡𝑖𝑠𝑒𝑡 over 𝑆 is a mapping 𝑚 ∶ 𝑆 → ℕ. In other words, a multiset is a collection of elements, each of them with certain multiplicity, e.g., {𝑏, 𝑎, 𝑏}, {𝑎, 𝑎, 𝑏}, and ∅ are multisets over 𝑆. For compactness, we write {𝑎 3 , 𝑏 2 } for {𝑎, 𝑎, 𝑎, 𝑏, 𝑏}. ℙ 𝑚 (𝑆) denotes the set of all multisets over 𝑆. 𝜎 = ⟨𝑎 1 , 𝑎 2 , ..., 𝑎 𝑛 ⟩ ∈ 𝑆 * denotes a sequence of length 𝑛 over a set 𝑆.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 1 (Petri net). A Petri net is a triple 𝑁 = (𝑃, 𝑇 , 𝐹 ), where 𝑃 is the set of places, 𝑇 is the set of transitions, 𝑃 ∩ 𝑇 = ∅, and 𝐹 ⊆ (𝑃 × 𝑇 ) ∪ (𝑇 × 𝑃) is the set of directed arcs (flow relation).</head><p>Petri nets <ref type="bibr" target="#b13">[12]</ref> is a formalism for modeling and analyzing concurrent distributed systems. As defined above, a Petri net consists of 𝑝𝑙𝑎𝑐𝑒𝑠 and 𝑡𝑟𝑎𝑛𝑠𝑖𝑡𝑖𝑜𝑛𝑠, which correspond respectively to 𝑐𝑜𝑛𝑑𝑖𝑡𝑖𝑜𝑛𝑠 and 𝑎𝑐𝑡𝑖𝑣𝑖𝑡𝑖𝑒𝑠 of a system. Places may contain tokens, representing resources, control threads, etc. A 𝑚𝑎𝑟𝑘𝑖𝑛𝑔 𝑚 ∶ 𝑃 → ℕ is a function that assigns tokens to places, denoting a system's state. The initial marking is denoted as 𝑚 0 , and the change into a new marking is defined by the firing rule. Let 𝑁 = (𝑃, 𝑇 , 𝐹 ) be a Petri net, 𝑋 = 𝑃 ∪ 𝑇, the sets When modeling individual agents in multi-agent systems, we consider workflow nets <ref type="bibr" target="#b14">[13]</ref>. A WF-net has an initial and a final state, represented by markings 𝑚 0 = {𝑖} and 𝑚 𝑓 = {𝑜}. Let 𝑁 = (𝑃, 𝑇 , 𝐹 ) be a WF-net, we consider an activity labeling function 𝛿 ∶ 𝑇 → 𝐴, which assigns an activity label to each transition 𝑡 ∈ 𝑇, where 𝐴 is a finite set of activities. We define a sequence 𝜎 = ⟨𝑎 1 , ..., 𝑎 𝑛 ⟩ ∈ 𝐴 * as a 𝑟𝑢𝑛 of a WF-net 𝑁 if there exists a firing sequence ⟨𝑡 1 , ..., 𝑡 𝑛 ⟩ that leads from the initial marking 𝑚 0 = {𝑖} of 𝑁 to its final marking 𝑚 𝑓 = {𝑜} s.t. 𝛿(𝑡 𝑖 ) = 𝑎 𝑖 (1 ≤ 𝑖 ≤ 𝑛). The set of all possible runs of a WF-net 𝑁 is denoted by ℬ(𝑁 ) and is called the behavior of 𝑁.</p><p>For modeling complex systems, one can use colored Petri nets (CP-nets). In CP-nets, tokens are attached with values belonging to different domains (color types). Let 𝒰 be the set of these different domains. Then, each place in a CP-net is typed with a domain in 𝒰 indicating the type of tokens it contains. Arcs in CP-nets are annotated with expressions from a language 𝐸𝑥𝑝𝑟 defined over 𝐴𝑡𝑜𝑚 = 𝑉 ∪ 𝐶, where 𝑉 and 𝐶 are sets of variables and constants. 𝐸𝑥𝑝𝑟 is defined as follows: (𝑖) An 𝑎𝑡𝑜𝑚 ∈ 𝐴𝑡𝑜𝑚 is an expression in 𝐸𝑥𝑝𝑟, (𝑖𝑖) if 𝑒 1 , 𝑒 2 ∈ 𝐸𝑥𝑝𝑟, then (𝑒 1 + 𝑒 2 ) is an expression in 𝐸𝑥𝑝𝑟.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 3 (Colored Petri net).</head><p>A colored Petri net is a tuple 𝐶𝑃𝑁 = (𝑃, 𝑇 , 𝐹 , t y p e , 𝑊 ) where:</p><p>• (𝑃, 𝑇 , 𝐹 ) is a Petri net;</p><p>• t y p e ∶ 𝑃 → 𝒰 is a place-typing function, mapping each place to a type in 𝒰;</p><p>• 𝑊 ∶ 𝐹 → 𝐸𝑥𝑝𝑟 is an arc expression function. ∀𝑟 ∈ 𝐹, if 𝑟 is adjacent to a place 𝑝 ∈ 𝑃, then the type of 𝑊 (𝑟) corresponds to the type of 𝑝.</p><p>Let 𝐶𝑃𝑁 = (𝑃, 𝑇 , 𝐹 , t y p e , 𝑊 ) be a CP-net over a set of domains 𝒰. A marking 𝑀 in CPN is a function that maps each place 𝑝 ∈ 𝑃 into a multiset of tokens 𝑀(𝑝) ∈ ℙ 𝑚 (type(𝑝)). For a CPN, we distinguish an initial marking 𝑀 0 and a set of final markings Ω. A binding 𝑏 of a transition 𝑡 is a function that assigns a value 𝑏(𝑣) to each variable 𝑣 occurring in the expression of an arc adjacent to 𝑡. For each variable 𝑣, 𝑏(𝑣) ∈ ⋃ 𝑄∈𝒰 𝑄. A pair (𝑡, 𝑏), where 𝑏 is a binding of 𝑡, is called a binding element. An evaluation 𝑊 (𝑝, 𝑡)(𝑏) determines token demands (multiset of tokens) on 𝑝 for 𝑡 to be enabled with the binding 𝑏, and the multiset of tokens that the transition 𝑡 removes from the place 𝑝 when 𝑡 occurs with the binding 𝑏. 𝑊 (𝑡, 𝑝)(𝑏) determines the multiset of tokens added to an output place 𝑝. A transition is enabled in a marking 𝑀 w.r.t a binding 𝑏 iff for all 𝑝 ∈ 𝑃, 𝑊 (𝑝, 𝑡)(𝑏) ⊆ 𝑀(𝑝). An enabled transition fires in a marking 𝑀 yielding a new marking 𝑀 ′ , such that for all places 𝑝, 𝑀 ′ (𝑝) = (𝑀(𝑝) ⧵ 𝑊 (𝑝, 𝑡)(𝑏)) ∪ 𝑊 (𝑡, 𝑝)(𝑏).</p><p>In the following we consider a subclass of nested Petri nets (NP-nets). A NP-net 𝑁 𝑃 consists of a colored Petri net called the system net 𝑆𝑁, and a set of WF-nets 𝒩 = {𝐸 1 , ..., 𝐸 𝑛 } called element nets, which define types of net tokens. In a system net 𝑆𝑁, places contain either a set of net tokens or a multiset of atomic colored tokens. A net token is a marked element net, whereas an atomic colored token is a data value of some domain 𝐷 ∈ 𝒟, where 𝒟 is a finite set of domains. Regarding the system net, we consider a language of expressions 𝐸𝑥𝑝𝑟 defined over 𝐴𝑡𝑜𝑚 = 𝑉 ∪ 𝐶, where: (i) 𝑉 is a finite set of variables, typed over the set of element nets 𝒩 and data domains 𝒟 (e.g., the type of 𝑥 ∈ 𝑉 is 𝐸 1 ) and (ii) 𝐶 is a finite set of constants, typed only over the set of data domains 𝒟. Each arc 𝑟 is supplied with an arc expression from 𝐸𝑥𝑝𝑟. This arc expression can be either: a sum of variables typed over 𝒩 if t y p e (𝑝) ∈ 𝒫 (𝒩 ) where 𝑝 is a place adjacent to arc 𝑟 containing net tokens, or an arbitrary sum of distinct variables and constants typed over 𝒟 if t y p e (𝑝) ∈ 𝒟 where 𝑝 is a place adjacent to arc 𝑟 containing atomic colored tokens.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 4 (Nested Petri net). Let 𝒟 be a finite set of domains, 𝐿𝑎𝑏 -a finite set of synchronization labels and 𝐴 -a finite set of activities. A nested Petri net (NP-net) is a tuple</head><p>𝑁 𝑃 = (𝑆𝑁 , (𝐸 1 , ..., 𝐸 𝑘 ), 𝜆, 𝛿), where: In what follows, we consider conservative NP-nets <ref type="bibr" target="#b15">[14]</ref>. In a conservative NP-net 𝑁 𝑃 = (𝑆𝑁 , (𝐸 1 , ..., 𝐸 𝑘 ), 𝜆, 𝛿), net tokens cannot be cloned or disappear. In a run, there is a stable set of net tokens which we distinguish using individual agent names. Let 𝑅 be a set of agent names, we propose a function c l a s s ∶ 𝑅 → {𝐸 1 , ..., 𝐸 𝑘 }, which maps to each agent name 𝑟 an element net. We denote by (𝑟, 𝑚) a net token which is characterized by an individual agent name 𝑟 with the corresponding element net c l a s s (𝑟) and a marking 𝑚. The set of all possible net tokens is denoted by 𝑆 a g e n t .</p><p>A marking 𝑀 in a NP-net 𝑁 𝑃 is a function mapping each place 𝑝 ∈ 𝑃 𝑆𝑁 to a subset of 𝑆 a g e n t or a multiset over a domain 𝐷 ∈ 𝒟, in accordance with the type of 𝑝. Hence, elements in 𝑀(𝑝) are either distinguishable net tokens or atomic colored tokens which can be repeated. We say that a net token (𝑟, 𝑚) resides in a place 𝑝 (under marking 𝑀) if (𝑟, 𝑚) ∈ 𝑀(𝑝). Thus, the marking of a NP-net is defined by the marking of its system net. For a NP-net, we distinguish an initial marking 𝑀 0 and a set of final markings 𝑀 𝑓 ∈ Ω.</p><p>Let 𝑡 be a transition in the system net 𝑆𝑁 of a NP-net, and let be • 𝑡 = {𝑝 1 , ..., 𝑝 𝑖 } and 𝑡 • = {𝑞 1 , ..., 𝑞 𝑗 } the sets of pre-and post-elements of transition 𝑡. 𝑊 (𝑡) = {𝑊 (𝑝 1 , 𝑡), ..., 𝑊 (𝑝 𝑖 , 𝑡), 𝑊 (𝑡, 𝑞 1 ), 𝑊 (𝑡, 𝑞 𝑗 )} denotes the set of all arc expressions adjacent to 𝑡. A binding of 𝑡 is a function 𝑏 assigning to each variable 𝑣, occurring in each expression in 𝑊 (𝑡), a value 𝑏(𝑣) ∈ ⋃ 𝐷∈𝒟 𝐷 ∪ 𝑆 a g e n t . A transition 𝑡 in 𝑆𝑁 is enabled in a marking 𝑀 w.r.t a binding 𝑏 if for all 𝑝 ∈ • 𝑡 𝑊 (𝑝, 𝑡)(𝑏) ⊆ 𝑀(𝑝). An enabled transition fires in a marking 𝑀 yielding a new marking 𝑀 ′ , such that for all places 𝑝 ∈ 𝑃 𝑆𝑁 , 𝑀 ′ (𝑝) = (𝑀(𝑝) ⧵ 𝑊 (𝑝, 𝑡)(𝑏)) ∪ 𝑊 (𝑡, 𝑝)(𝑏). For net tokens from 𝑆 a g e n t serving as variable values in input arc expressions from 𝑊 (𝑡), we say that they are involved in the firing of 𝑡. They are removed from input places and brought to output places of 𝑡. We consider three kinds of steps in a NP-net:</p><p>Element-autonomous step: let 𝑡 be a transition without a synchronization label in a net token named 𝑟, i.e., 𝜆(𝑡) is not defined. When 𝑡 is enabled in a marking 𝑚, an element-autonomous step is a firing of 𝑡 in marking 𝑚, producing a new marking 𝑚 ′ , according to the usual firing rules of WF-nets. This is also written as:</p><formula xml:id="formula_0">𝑚 𝛿(𝑡),𝑟 − −−− → 𝑚 ′</formula><p>System-autonomous step: let 𝑡 ∈ 𝑇 𝑆𝑁 be a transition without a synchronization label in the system net 𝑆𝑁. A system-autonomous step (also called a transfer step when net tokens are involved) is the firing of transition 𝑡 according to the firing rule described above for a NP-net. The occurrence of this step in a marking 𝑀 w.r.t a binding 𝑏, producing a new marking 𝑀 ′ , is denoted by:  </p><formula xml:id="formula_1">𝑀 𝛿(𝑡),𝑏 − −−− → 𝑀 ′</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 2</head><p>An event log of a multi-agent system ℒ in tabular form, whose expected behavior is modeled in fig. <ref type="figure">1</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Trace</head><p>Freq. 𝜎 1 = ⟨ (𝑑, 𝑟 1 ), (𝑑, 𝑟 2 ), (ℎ, 𝑟 1 ), (ℎ, 𝑟 2 ), (𝑎, 𝑆𝑁 , {(𝑓 , 𝑟 1 )}), (𝑎, 𝑆𝑁 , {(𝑓 , 𝑟 2 )}), (𝑏, 𝑆𝑁 , {𝑟 2 }), (𝑏, 𝑆𝑁 , {𝑟 1 }) ⟩ 4 𝜎 2 = ⟨ (𝑑, 𝑟 2 ), (ℎ, 𝑟 2 ), (𝑑, 𝑟 1 ), (ℎ, 𝑟 1 )(𝑎, 𝑆𝑁 , {(𝑓 , 𝑟 2 )}), (𝑎, 𝑆𝑁 , {(𝑓 , 𝑟 1 )}), (𝑏, 𝑆𝑁 , {𝑟 1 }), (𝑏, 𝑆𝑁 , {𝑟 2 }) ⟩ 1 𝜎 3 = ⟨ (𝑑, 𝑟 2 ), (𝑒, 𝑟 2 ), (𝑑, 𝑟 1 ), (ℎ, 𝑟 1 ), ((𝑐, 𝑆𝑁 , {(𝑔, 𝑟 1 )}), (𝑐, 𝑆𝑁 , {(𝑔, 𝑟 2 )}) ⟩ 1 𝜎 4 = ⟨ (𝑑, 𝑟 1 ), (𝑑, 𝑟 2 ), (ℎ, 𝑟 2 ), (𝑒, 𝑟 1 ), (𝑐, 𝑆𝑁 , {(𝑔, 𝑟 2 )}), (𝑐, 𝑆𝑁 , {(𝑔, 𝑟 1 )}) ⟩ 1 𝜎 5 = ⟨ (𝑑, 𝑟 1 ), (𝑑, 𝑟 2 ), (𝑒, 𝑟 1 ), (𝑒, 𝑟 2 ), (𝑎, 𝑆𝑁 , {(𝑓 , 𝑟 1 )}), (𝑐, 𝑆𝑁 , {(𝑔, 𝑟 2 )}), (𝑏, 𝑆𝑁 , {𝑟 1 }) ⟩ 2 occurred two times. It is a sequence of seven events. First, both activities 𝑑 and 𝑒 were executed by agents 𝑟 1 and 𝑟 2 . Next, the system 𝑆𝑁 executed two synchronization steps with agents 𝑟 1 and 𝑟 2 , where activities 𝑎 and 𝑓, and later 𝑐 and 𝑔, were executed simultaneously. The trace ended by a system-autonomous step where 𝑆𝑁 executed 𝑏 for agent 𝑟 1 .</p><p>Let ℒ be an event log of a multi-agent system and 𝑁 𝑃 -a nested Petri net. ℒ is syntactically correct w.r.t. 𝑁 𝑃 if each event in ℒ is syntactically correct w.r. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Compositional Conformance Checking of Nested Petri Nets and Event Logs of Multi-Agent Systems</head><p>In this section, we propose a solution to check conformance of event logs of multi-agent systems and nested Petri nets. We prove that an event log perfectly fits a NP-net iff the event log is</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>• 𝑥 = {𝑦 ∈ 𝑋 |(𝑦, 𝑥) ∈ 𝐹 } and 𝑥 • = {𝑦 ∈ 𝑋 |(𝑥, 𝑦) ∈ 𝐹 } denote the preset and the postset of 𝑥 ∈ 𝑋. Transition 𝑡 ∈ 𝑇 is enabled in a marking 𝑚 iff • 𝑡 ⊆ 𝑚. Then, the firing of 𝑡 leads to a new marking 𝑚 ′ = 𝑚 − • 𝑡 + 𝑡 • . Definition 2 (Workflow net). Let 𝑁 = (𝑃, 𝑇 , 𝐹 ) be a Petri net. 𝑁 is a workflow net (WF-net) iff P contains a source place 𝑖 and a sink place 𝑜 s.t. • 𝑖 = 𝑜 • = ∅, and each node in 𝑁is on a path from 𝑖 to 𝑜.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>−</head><label></label><figDesc>−−−−−−−−−−−−−−−− → 𝑀 ′ Definition 5 (Run, Behavior of a nested Petri net). Let 𝑁 𝑃 be a conservative nested Petri net and 𝜎 -a sequence of steps in 𝑁 𝑃. The occurence of 𝜎 from the initial marking 𝑀 0 of 𝑁 𝑃, results in some final marking 𝑀 𝑓 ∈ Ω, is called a run. The set of all possible runs is denoted by ℬ(𝑁 𝑃) and is called the behavior of 𝑁 𝑃.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head></head><label></label><figDesc>t. a step in 𝑁 𝑃 where: • An event (𝑎, 𝑟) is syntactically correct w.r.t. a step in 𝑁 𝑃 if there is a transition 𝑡 without synchronization label in a net token named 𝑟 where 𝛿(𝑡) = 𝑎, and 𝑡 can fire in a marking 𝑚 producing a new marking 𝑚 ′ , i.e., 𝑚 𝛿(𝑡),𝑟 − −−− → 𝑚 ′ in 𝑁 𝑃 where 𝑡 ∈ 𝐸 𝑖 , 1 ≤ 𝑖 ≤ 𝑘, and c l a s s (𝐸 𝑖 ) = 𝑟. • An event (𝑎, 𝑆𝑁 , 𝑑 1 , ..., 𝑑 𝑚 ) is syntactically correct w.r.t. a step in 𝑁 𝑃 if there is a transition 𝑡 ∈ 𝑇 𝑆𝑁 without synchronization label where 𝛿(𝑡) = 𝑎, and 𝑡 can fire in a marking 𝑀 w.r.t. a binding 𝑏 such that 𝑏 assigns the atomic tokens 𝑑 1 , ..., 𝑑 𝑚 to the variables in 𝑊 (𝑡), i.e., 𝑀 𝛿(𝑡),𝑏 − −−− → 𝑀 ′ in 𝑁 𝑃. • An event (𝑎, 𝑆𝑁 , {(𝑎 1 , 𝑟 1 ), ..., (𝑎 𝑞 , 𝑟 𝑞 )}, {𝑑 1 , ..., 𝑑 𝑝 }) is syntactically correct w.r.t. a step in 𝑁 𝑃 if there is a transition 𝑡 ∈ 𝑇 𝑆𝑁 with synchronization label 𝜆(𝑡) where 𝛿(𝑡) = 𝑎, (𝑟 1 , 𝑚 1 ), ..., (𝑟 𝑛 , 𝑚 𝑛 ) are net tokens involved in the firing of 𝑡 such that in each (𝑟 𝑖 , 𝑚 𝑖 ) there is an enabled transition 𝑡 𝑖 (𝛿(𝑡 𝑖 ) = 𝑎 𝑖 ) labeled with the same value 𝜆(𝑡), and 𝑡 can fire in a marking 𝑀 w.r.t. a binding 𝑏 assigning the atomic tokens 𝑑 1 , ..., 𝑑 𝑝 and also the agent names 𝑟 1 , ..., 𝑟 𝑞 to the variables in 𝑊 (𝑡), i.e., 𝑀 𝛿(𝑡),{(𝛿(𝑡 𝑖 ),𝑟 𝑖 ),1≤𝑖≤𝑛},𝑏− −−−−−−−−−−−−−−−− → 𝑀 ′ in 𝑁 𝑃.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="2,153.64,84.19,288.00,209.13" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>•</head><label></label><figDesc>𝑆𝑁 = (𝑃 𝑆𝑁 , 𝑇 𝑆𝑁 , 𝐹 𝑆𝑁 , t y p e , 𝑊 ) is a colored Petri net (called a system net) with two sets of places 𝑃 𝑁 𝑒𝑡 and 𝑃 𝐴𝑡𝑜𝑚 (𝑃 𝑁 𝑒𝑡 ∪ 𝑃 𝐴𝑡𝑜𝑚 = 𝑃 𝑆𝑁 ), such that for all 𝑝 ∈ 𝑃 𝑁 𝑒𝑡 , t y p e (𝑝) ⊆ {𝐸 1 , ..., 𝐸 𝑘 } and for all 𝑝 ∈ 𝑃 𝐴𝑡𝑜𝑚 , t y p e (𝑝) ∈ 𝒟;• 𝑓 𝑜𝑟 𝑖 = 1, 𝑘, 𝐸 𝑖 = (𝑃 𝑖 , 𝑇 𝑖 , 𝐹 𝑖 ) is a WF-net, called an element net, s.t. (𝑇 𝑆𝑁 ∪ 𝑇 𝑖 ) ∩ (𝑃 𝑆𝑁 ∪ 𝑃 𝑖 ) = ∅;• 𝜆 ∶ 𝑇 𝑁 𝑃 ↛ 𝐿𝑎𝑏 is a (partial) synchronization labeling function, where 𝑇 𝑁 𝑃 = 𝑇 𝑆𝑁 ∪𝑇 1 ∪...∪ 𝑇 𝑘 ;• 𝛿 ∶ 𝑇 𝑁 𝑃 → 𝐴 is an activity labeling function, s.t. 𝑓 𝑜𝑟 𝑖 = 1, 𝑘 𝑇 𝑆𝑁 ∩ 𝑇 𝑖 = ∅.</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 1</head><label>1</label><figDesc>Event attributes in event logs of multi-agent systems. {𝑟 1 , ..., 𝑟 𝑛 }) {𝑑 1 , ..., 𝑑 𝑚 } (3) a synchronization step (𝑎, 𝑎 1 , ..., 𝑎 𝑛 ) (𝑆𝑁 , 𝑟 1 , ..., 𝑟 𝑛 ) {𝑑 1 , ..., 𝑑 𝑚 } Synchronization step: let 𝑡 ∈ 𝑇 𝑆𝑁 be a transition with a synchronization label 𝜆(𝑡), and enabled in a marking 𝑀 w.r.t a binding 𝑏, and let (𝑟 1 , 𝑚 1 ), ..., (𝑟 𝑛 , 𝑚 𝑛 ) ∈ 𝑆 a g e n t be net tokens involved in the firing of 𝑡. Then, 𝑡 can fire provided that in each (𝑟 𝑖 , 𝑚 𝑖 ) (1 ≤ 𝑖 ≤ 𝑛) there is an enabled transition labeled with the same value 𝜆(𝑡). Thus, a synchronization step goes in two stages: first, the firing of transitions 𝑡 1 , ..., 𝑡 𝑛 in all net tokens involved in the firing of 𝑡, and then, the firing of 𝑡 in 𝑆𝑁 w.r.t. a binding 𝑏. This step is denoted by:</figDesc><table><row><cell>Event type</cell><cell></cell><cell>Attributes</cell><cell></cell></row><row><cell>event refers to...</cell><cell>Activity</cell><cell>Resource</cell><cell>Data</cell></row><row><cell>(1) an element-autonomous step</cell><cell>𝑎 1</cell><cell>𝑟 1</cell><cell>none.</cell></row><row><cell cols="3">(2) a system-autonomous step (𝑆𝑁 , 𝑀 𝑎 𝛿(𝑡),{(𝛿(𝑡 𝑖 ),𝑟 𝑖 ),1≤𝑖≤𝑛},𝑏</cell><cell></cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This work is supported by the Basic Research Program at the National Research University Higher School of Economics.</p></div>
			</div>

			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 3</head><p>Projections 𝐿 𝑆𝑁 , 𝐿 1 , and 𝐿 2 from the event log ℒ (cf. Table <ref type="table">2</ref>) onto (a) the system net 𝑆𝑁, and agents (b) 𝑟 1 and (c) 𝑟 2 from 𝑁 (cf. Fig. <ref type="figure">1</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Trace</head><p>Freq. ⟨(𝑎, {𝑟 1 }), (𝑎, {𝑟 2 }), (𝑏, {𝑟 2 }), (𝑏, {𝑟 1 })⟩ 4 ⟨(𝑎, {𝑟 2 }), (𝑎, {𝑟 1 }), (𝑏, {𝑟 1 }), (𝑏, {𝑟 2 })⟩ 1 ⟨(𝑐, {𝑟 1 }), (𝑐, {𝑟 2 })⟩ 1 ⟨(𝑐, {𝑟 2 }), (𝑐, {𝑟 1 })⟩ 1 ⟨(𝑎, {𝑟 1 }), (𝑐, {𝑟 2 }), <ref type="bibr">(</ref> Def. 7 (resp. Def. 8) is used to project traces of an event log onto net tokens (resp. a system net).</p><p>A projection of a trace onto a net token yields the sequence of agent activities. A projection onto the system net yields a sequence of pairs where each pair consists of an activity and the set of resources and data involved in this activity execution. For instance, consider the projection of the event log ℒ (cf. Table <ref type="table">2</ref>) onto components of the NP-net 𝑁 (cf. Fig. <ref type="figure">1</ref>). Table <ref type="table">3</ref> shows the three decomposed event logs 𝐿 𝑆𝑁 , 𝐿 1 , and 𝐿 2 resulting from the projection of ℒ onto (a) the system net, (b) agent 𝑟 1 , and (c) agent 𝑟 2 respectively. Thus, a conformance checking technique can be applied to each projection and the corresponding NP-net component, ignoring their synchronization labels. In particular, for the system net, we replace net tokens by their agent names, which are atomic colored tokens. We consider synchronization steps as autonomous steps, and for a marking 𝑀 in a NP-net 𝑁 𝑃, marking projections onto 𝑁 𝑃 components are defined as follows: (1) the projection of 𝑀 onto a system net 𝑆𝑁, denoted as 𝑀↾ 𝑆𝑁 , is a marking of the colored Petri net 𝑆𝑁 obtained by replacing all net tokens in 𝑀 by their agent names, and (2) the projection of 𝑀 onto a net token (𝑟, 𝑚), denoted as 𝑀↾ (𝑟,𝑚) , is just 𝑚. A system net component 𝑆𝑁, with a marking 𝑀↾ 𝑆𝑁 and without synchronization labels, is a CP-net labeled by activity names. A sequence of binding elements ⟨(𝑡 1 , 𝑏 1 ), ..., (𝑡 𝑛 , 𝑏 𝑛 )⟩, starting from the initial marking 𝑀 0 ↾ 𝑆𝑁 and ending in a final marking 𝑀 𝑓 ↾ 𝑆𝑁 , projected onto the set of system net activities is called a run. </p><p>and for 𝑖 = 1, 𝑚, 𝑒 𝑖 = (𝑎 𝑖 , {𝑑 𝑖 1 , ..., 𝑑 𝑖 𝑝 }), 𝛿(𝑡 𝑖 ) = 𝑎 𝑖 , and 𝑏 𝑖 is the binding assigns {𝑑 𝑖 1 , ..., 𝑑 𝑖 𝑝 } to the variables in 𝑊 (𝑡 𝑖 ). For 𝑖 = 1, 𝑛, 𝐿 𝑖 perfectly fits (𝑟 𝑖 , 𝑚 𝑖 ) if and only if for all 𝜎 = ⟨𝑒 1 , ..., 𝑒 𝑚 ⟩ ∈ 𝐿 𝑖 , there is a run 𝜎 ′ in the element net c l a s s (𝑟 𝑖 ) where</p><p>and for 𝑗 = 1, 𝑚, 𝑒 𝑗 = 𝑎 𝑗 and 𝛿(𝑡 𝑗 ) = 𝑎 𝑗 .</p><p>An event log perfectly fits a model if all traces in the log can be replayed on the model from beginning to end. For instance, let us consider the event log ℒ (cf. Table <ref type="table">2</ref>) and the NP-net 𝑁 depicted in fig. <ref type="figure">1</ref>. Clearly, ℒ perfectly fits 𝑁 𝑃. Also, each projected event log 𝐿 𝑆𝑁 , 𝐿 1 , or 𝐿 2 (cf. Table <ref type="table">3</ref>) perfectly fits the corresponding component in 𝑁 𝑃.</p><p>Theorem 1. Given a nested Petri net 𝑁 𝑃 = (𝑆𝑁 , (𝐸 1 , ..., 𝐸 𝑘 ), 𝜆, 𝛿) and an event log ℒ ∈ ℙ 𝑚 (ℰ a g e n t , ℰ s y s t e m , ℰ s y n c ) * , let (𝑟 1 , 𝑚 1 ), ..., (𝑟 𝑛 , 𝑚 𝑛 ) be net tokens of 𝑁 𝑃, 𝐿 1 , ..., 𝐿 𝑛corresponding projections of ℒ, and 𝐿 𝑆𝑁 -a projection of ℒ onto the system net 𝑆𝑁. ℒ perfectly fits 𝑁 𝑃 if and only if:</p><p>2. 𝐿 𝑆𝑁 perfectly fits 𝑆𝑁;</p><p>3. 𝐿 𝑖 perfectly fits (𝑟 𝑖 , 𝑚 𝑖 ), 1 ⩽ 𝑖 ⩽ 𝑛.</p><p>Proof. Let ℒ be an event log of a multi-agent system, 𝑁 𝑃 = (𝑆𝑁 , (𝐸 1 , ..., 𝐸 𝑘 ), 𝜆, 𝛿) -a nested Petri net, and (𝑟 1 , 𝑚 1 ), ..., (𝑟 𝑛 , 𝑚 𝑛 ) -net tokens of 𝑁 𝑃.</p><p>(⇒) Let 𝜎 = ⟨𝑒 1 , ..., 𝑒 𝑚 ⟩ ∈ ℒ be such that there is a run 𝜎 ′ = ⟨𝑠 1 , ..., 𝑠 𝑚 ⟩ ∈ ℬ(𝑁 𝑃) and for 𝑗 = 1, 𝑚: i.e., 𝜎 perfectly fits 𝑁 𝑃. We need to prove that • 𝜎 is syntactically correct w.r.t 𝑁 𝑃;</p><p>• 𝜎 ↾ 𝑆𝑁 = ⟨𝑒 𝑠 1 , ..., 𝑒 𝑠 𝑚 ′ ⟩ perfectly fits the system net component, i.e., there is a run 𝜎 𝑆𝑁 in the system net component where:</p><p>, and for 𝑖 = 1, 𝑚 ′ , 𝑒 𝑠 𝑖 = (𝑎 𝑖 , {𝑑 𝑖 1 , ..., 𝑑 𝑖 𝑝 }), 𝛿(𝑡 𝑖 ) = 𝑎 𝑖 , and 𝑏 𝑖 is the binding that assigns {𝑑 𝑖 1 , ..., 𝑑 𝑖 𝑝 } to the variables in 𝑊 (𝑡 𝑖 );</p><p>• for 𝑖 = 1, 𝑛, 𝜎 ↾ 𝑟 𝑖 = ⟨𝑎 𝑖 1 , ..., 𝑎 𝑖 𝑚 ″ ⟩ perfectly fits (𝑟 𝑖 , 𝑚 𝑖 ), i.e., there is a run 𝜎 𝑟 𝑖 in the element net c l a s s (𝑟 𝑖 ) where:</p><p>By the fact that 𝜎 perfectly fits 𝑁 𝑃, it follows trivially that 𝜎 is syntactically correct w.r.t 𝑁 𝑃 (cf. Def. 9).</p><p>Taking into account that 𝜎 ′ = ⟨𝑠 1 , ..., 𝑠 𝑚 ⟩ is a run in 𝑁 𝑃 (which can hold synchronization labels) where for 𝑖 = 1, 𝑚 we have (1), ( <ref type="formula">2</ref>) and (3), and that</p><p>⟨(𝑎, {𝑟 1 , ..., 𝑟 𝑞 , 𝑑 1 , ..., 𝑑 𝑝 })⟩, 𝑖𝑓 𝑒 𝑖 = (𝑎, 𝑆𝑁 , {(𝑎 1 , 𝑟 1 ), ..., (𝑎 𝑞 , 𝑟 𝑞 )}, {𝑑 1 , ..., 𝑑 𝑝 }) (cf. Def. 8) we deduce that for 𝜎 ↾ 𝑆𝑁 = ⟨𝑒 𝑠 1 , ..., 𝑒 𝑠 𝑚 ′ ⟩, there is a run 𝜎 𝑆𝑁 in the system net component where:</p><p>and for 𝑖 = 1, 𝑚 ′ , 𝑒 𝑠 𝑖 = (𝑎 𝑖 , {𝑑 𝑖 1 , ..., 𝑑 𝑖 𝑝 }), 𝛿(𝑡 𝑖 ) = 𝑎 𝑖 , and 𝑏 𝑖 is the binding that assigns {𝑑 𝑖 1 , ..., 𝑑 𝑖 𝑝 } to the variables in 𝑊 (𝑡 𝑖 ). Therefore, 𝜎 ↾ 𝑆𝑁 perfectly fits the system net component. Now by the fact that 𝜎 ′ is a run in 𝑁 𝑃 (which can hold synchronization labels) where for 𝑖 = 1, 𝑚 we have (1), ( <ref type="formula">2</ref>) and (3), and that for 𝑗 = 1, 𝑛</p><p>⟨𝑎⟩, 𝑖𝑓 𝑒 𝑖 = (𝑎, 𝑟 𝑗 ) ⟨𝑎 𝑗 ⟩, 1 ≤ 𝑗 ≤ 𝑞, 𝑖𝑓 𝑒 𝑖 = (𝑎, 𝑆𝑁 , {(𝑎 1 , 𝑟 1 ), ..., (𝑎 𝑞 , 𝑟 𝑞 )},</p><p>(5) {𝑑 1 , ..., 𝑑 𝑝 }) ⟨⟩, 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 (cf. Def. 7) it follows that for 𝜎 ↾ 𝑟 𝑖 = ⟨𝑎 1 , ..., 𝑎 𝑚 ″ ⟩, 1 ≤ 𝑖 ≤ 𝑛, there is a run 𝜎 𝑟 𝑖 in the element net c l a s s (𝑟 𝑖 ) where:</p><p>and for 𝑗 = 1, 𝑚 ″ , 𝛿(𝑡 𝑗 ) = 𝑎 𝑗 . Therefore, 𝜎 ↾ 𝑟 𝑖 perfectly fits (𝑟 𝑖 , 𝑚 𝑖 ).</p><p>(⇐) Let 𝜎 = ⟨𝑒 1 , ..., 𝑒 𝑚 ⟩ ∈ ℒ be such that 𝜎 is syntactically correct w.r.t 𝑁 𝑃, 𝜎 ↾ 𝑆𝑁 perfectly fits the system net component, and for 𝑖 = 1, 𝑛, 𝜎 ↾ 𝑟 𝑖 perfectly fits (𝑟 𝑖 , 𝑚 𝑖 ). We need to prove that 𝜎 perfectly fits 𝑁 𝑃.</p><p>Taking into account ( <ref type="formula">4</ref>) and ( <ref type="formula">5</ref>), and that 𝜎 is syntactically correct w.r.t 𝑁 𝑃, we deduce that by associating to each element of the projected sequences the corresponding resource, elements can be merged together into the trace 𝜎. Therefore, being 𝜎 ↾ 𝑆𝑁 perfectly fits the system net component and for 𝑖 = 1, 𝑛 𝜎 ↾ 𝑟 𝑖 perfectly fits (𝑟 𝑖 , 𝑚 𝑖 ), then 𝜎 perfectly fits 𝑁 𝑃 and this concludes the proof.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusions and Future Work</head><p>In this paper, we proposed a compositional approach for conformance checking of nested Petri nets and event logs of multi-agent systems. Nested Petri nets are a well-known Petri net extension where tokens can be Petri nets themselves, allowing to model multi-agent systems. An event log can be projected onto NP-net components (system net and all agents), so conformance checking can be performed between each projection and the corresponding component. This approach can provide specific conformance diagnostics for each system component. We demonstrated the validity of our approach proving that, an event log perfectly fits a nested Petri net if and only if it is syntactically correct w.r.t the model and each projection perfectly fits the corresponding model component. For future research, we consider the experimental evaluation of our approach against other approaches when checking conformance of multi-agent systems.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">6 (Trace, Event log of a multi-agent system). Let 𝑆𝑁 be a system name, 𝑆 -a set of system activities, 𝐷 -a set of data, 𝐵 -a set of agent activities, 𝑅 𝐵 -a set agent names, and 𝒞</title>
	</analytic>
	<monogr>
		<title level="m">activity 𝑎 by the system 𝑆𝑁 where 𝑛 resources (agents) are involved, or (3) the simultaneous execution of activity 𝑎 by 𝑆𝑁, and activities 𝑎 1</title>
				<imprint>
			<biblScope unit="page">ℙ 𝑚</biblScope>
		</imprint>
	</monogr>
	<note>, ℰ s y s t e m = (𝑆 × {𝑆𝑁 } × 𝒞 ), and ℰ sy n c = (𝑆 × {𝑆𝑁 } × 𝒫 (𝐵 × 𝑅 𝐵 ) ×</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">a multiset of traces. Table 2 shows an event log ℒ of the multi-agent system modeled in fig. 1. ℒ contains information on nine traces. A distinct trace can occur multiple times</title>
		<author>
			<persName><forename type="first">ℒ</forename></persName>
		</author>
		<author>
			<persName><forename type="first">ℙ</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ℰ a g e n t , ℰ sy s t e m</title>
				<imprint/>
	</monogr>
	<note>ℰ s y n c ) * is an event log, i.e.. For instance, trace 𝜎 5</note>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<author>
			<persName><forename type="first">W</forename></persName>
		</author>
		<title level="m">Process Mining: Data Science in Action</title>
				<meeting>ess Mining: Data Science in Action</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
	<note>van der Aalst. 2nd ed</note>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><surname>Carmona</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Van Dongen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Solti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Weidlich</surname></persName>
		</author>
		<title level="m">Conformance Checking: Relating Processes and Models</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Business alignment: using process mining as a tool for delta analysis and conformance testing</title>
		<author>
			<persName><forename type="first">W</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Requirements Engineering</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="198" to="211" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Auditing 2.0: Using process mining to support tomorrow&apos;s auditor</title>
		<author>
			<persName><forename type="first">W</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">M</forename><surname>Van Hee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Van Der Werf</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Verdonk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="page" from="90" to="93" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<author>
			<persName><forename type="first">I</forename><surname>Itkin</surname></persName>
		</author>
		<ptr target="https://tinyurl.com/y55sndcv,????" />
		<title level="m">Mind the gap between testing and production: applying process mining to test the resilience of exchange platforms</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Decomposing petri nets for process mining : a generic approach</title>
		<author>
			<persName><forename type="first">W</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Distributed and Parallel Databases</title>
		<imprint>
			<biblScope unit="volume">31</biblScope>
			<biblScope unit="page" from="471" to="507" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Single-entry single-exit decomposed conformance checking</title>
		<author>
			<persName><forename type="first">J</forename><surname>Munoz-Gama</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Carmona</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Systems</title>
		<imprint>
			<biblScope unit="volume">46</biblScope>
			<biblScope unit="page" from="102" to="122" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Recomposing conformance: Closing the circle on decomposed alignment-based conformance checking in process mining</title>
		<author>
			<persName><forename type="first">W</forename><surname>Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Verbeek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Munoz-Gama</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sepúlveda</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Sciences</title>
		<imprint>
			<biblScope unit="volume">466</biblScope>
			<biblScope unit="page" from="55" to="91" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Nested Petri Nets -a Formalism for Specification and Verification of Multi-Agent Distributed Systems</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">A</forename><surname>Lomazova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fundamenta Informaticae</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="page" from="195" to="214" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Checking properties of adaptive workflow nets</title>
		<author>
			<persName><forename type="first">K</forename><surname>Hee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Van</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Oanea</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Serebrenik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sidorova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Voorhoeve</surname></persName>
		</author>
		<author>
			<persName><surname>Lomazova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fundamenta Informaticae</title>
		<imprint>
			<biblScope unit="volume">79</biblScope>
			<biblScope unit="page" from="347" to="362" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">Nested Petri Nets for Adaptive Process Modeling</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">A</forename><surname>Lomazova</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2008">2008</date>
			<publisher>Springer</publisher>
			<biblScope unit="volume">4800</biblScope>
			<biblScope unit="page" from="460" to="474" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Petri nets: Properties, analysis and applications</title>
		<author>
			<persName><forename type="first">T</forename><surname>Murata</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the IEEE</title>
				<meeting>the IEEE</meeting>
		<imprint>
			<date type="published" when="1989">1989</date>
			<biblScope unit="volume">77</biblScope>
			<biblScope unit="page" from="541" to="580" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">The Application of Petri Nets to Workflow Management</title>
		<author>
			<persName><forename type="first">W</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Circuits, Systems and Computers</title>
		<imprint>
			<biblScope unit="volume">08</biblScope>
			<biblScope unit="page" from="21" to="66" />
			<date type="published" when="1998">1998</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Verification of Nested Petri Nets Using an Unfolding Approach</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">A</forename><surname>Lomazova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">O</forename><surname>Ermakova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Petri Nets and Software Engineering</title>
		<title level="s">CEUR Workshop Proceedings</title>
		<editor>
			<persName><forename type="first">L</forename><surname>Cabac</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><forename type="middle">M</forename><surname>Kristensen</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><surname>Rölke</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="volume">1591</biblScope>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
