<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Process Mining representation using Communication Structured Acyclic Nets (CSA-nets)</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Dr. Nadiyah Almutairi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tuwailaa Alshammari</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mohammed Alahmadi</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Science and Technology, University of Hafr Albatin</institution>
          ,
          <addr-line>Hafr Al-Batin 39524, Kingdom of</addr-line>
          <country country="SA">Saudi Arabia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Software Engineering, University of Jeddah</institution>
          ,
          <addr-line>Jeddah 21493, Kingdom of</addr-line>
          <country country="SA">Saudi Arabia</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>School of Computing, Newcastle University</institution>
          ,
          <addr-line>Science Square, Newcastle upon Tyne, NE4 5TG</addr-line>
          ,
          <country country="UK">United Kingdom</country>
        </aff>
      </contrib-group>
      <fpage>217</fpage>
      <lpage>232</lpage>
      <abstract>
        <p>Communication Structured Acyclic Nets (CSA-nets) are derived from Structured Occurrence Nets SON which are a Petri net-based formalism used to represent the behaviour of Complex Evolving Systems (CESs). It consists of sets of Acyclic Nets ANs that communicate with each other through a set of buffer places. It supports the analysis and visualisation of activities of CESs. In this work, we use SONs formalism to represent processes that have been decomposed using approaches in [1], we used SONs to compose the subnets and use its robust representation to analyse and visualise the same model, however, without any existing cycles. Our approach provides a mechanism for composing a SON model by using the decomposed subnets. We argue that the resulting model exhibits similar behaviour to the original model.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;structured occurrence net</kwd>
        <kwd>structured acyclic nets</kwd>
        <kwd>communication structured acyclic net</kwd>
        <kwd>labeled Petri nets</kwd>
        <kwd>model decomposition</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Process mining is a technique that combines data mining and process analysis to extract valuable
insights from event logs generated by information systems. Its aim is to discover, monitor,
and improve real processes by extracting knowledge related to these processes from event
logs recorded during the execution of business operations. Process mining utilises various
techniques, including process discovery, which involves deriving process models from event logs;
conformance checking, which compares the actual processes to predefined models; and process
enhancement, which improves processes based on insights gained from event logs [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>Petri nets are one of the popular models for representing processes in process mining. Petri
nets can effectively capture concurrency, conflict, and synchronisation aspects of process flows
between processes or activities. Specifically, different techniques and algorithms can be used to
generate Petri nets from event logs such as the α -algorithm, state-based regions, and
languagebased regions.</p>
      <p>
        SONs is generalised in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] as Communication Structure Acyclic Nets (CSA-nets) which are
a Petri net-based formalism used to represent the behaviour of Complex Evolving Systems
(CESs). CSA-nets consist of sets of acyclic nets that communicate with each other through a set
of buffer places. These buffer places allow both asynchronous and synchronous communication
between acyclic nets, and so can represent the concurrent behaviour of the system as well as
synchronisation behaviour. They are suitable tools for modelling and visualising the behaviour of
event-based systems.
      </p>
      <p>
        In this paper, we focus on the outcome of the Petri net decomposition approach presented in
[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Essentially, we propose constructing a CSA-net model from the decomposed fragments of a
process model. That is accomplished by identifying each decomposite subnet as an individual
acyclic net and subsequently applying the proposed rules to establish communication via buffer
places.
      </p>
      <p>The remainder of this paper is organised as follows: Section 2 summarise some of the existing
knowledge and related work. Basic properties of acyclic nets are introduced in the preliminaries
Section 3. Section 4 introduces CSA-nets and some of the definitions, while Section 5 discusses
the steps taken to compose SON models from decomposed process model. Section 6 concludes
our study summarising our findings.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related work</title>
      <p>
        Various algorithms utilise Petri nets as representations for process mining. Region-based process
discovery techniques and α-algorithm are examples of such techniques. Basically, α-algorithm
can be used to construct a Petri net process model to describe behaviour from an event log,
which consists of a set of traces (sequence of events). This is known as process discovery
problem. Also, measuring the differences between the observed behaviour (captured by the
traces in the event log) and the modelled behaviour (firing sequence of a Peti net) for a given
event log and Petri net is known as conformance checking problem. In the context of process
mining, these two problems are formulated using Petri nets. For instance, [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] developed a
regionbased algorithm for discovering Petri nets from event logs, addressing the challenge of deriving
accurate process models in process mining. Their approach focuses on constructing a bounded
Petri net that encompasses the behaviour observed in event logs, prioritising the generation of
models with minimal behaviour while still capturing the essence of the logged events. This
method is notable for its ability to produce nets that accurately reflect the observed processes,
enhancing the precision of process discovery. The effectiveness of their algorithm is demonstrated
through implementation in a tool and validation on various examples, highlighting its potential
in improving the reliability and accuracy of process mining outcomes. Where in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] , methods
for identifying workflow models are developed, starting with a "workflow log" that records the
actual execution of the workflow process. Additionally, a new algorithm is introduced to extract
a process model from the log and represent it through a Petri net. The authors demonstrate the
capability of the α-algorithm to effectively mine workflows described by a so-called SWF-net.
      </p>
      <p>
        An important study in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], presented a generic approach of decomposing Petri nets for process
mining has been introduced to address the challenges of complexity and scalability in analysing
large process models or event logs. In another words, a decomposition approach for process
mining problems was proposed, in particular, process discovery and conformance checking.
Basically, a process model is decomposed into smaller subnets and the conformance is preformed
to each subnet locally to reduce the computation time.
      </p>
      <p>
        Generally, a large body of work exists in the literature about Petri nets decomposition and
composition. For instance, the authors in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] present a method for increasing productivity in
system development through the use of Petri nets class input-output-place-transition (IOPT)
for modelling. They introduce a technique for partitioning Petri net models into concurrent
sub-models for distributed implementation, extending the model’s capabilities with directed
synchronous communication channels. This approach aims to propose a net-splitting operation
that allows centralised models to be transformed into distributed models suitable for heterogeneous
platforms. The operation includes specific rules for handling structural complexities and ensures
behavioural consistency through node duplication. The approach has been validated through
case studies demonstrating its applicability in co-design techniques. Moreover, [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] presents
a compositional approach for a new extension of ordinary Petri nets called open Petri nets
where the places are distinguished as open (input or output) to represent the interaction with
the environment. In their approach, two independent open nets which they agree on a common
subnet can be glued together to compose a new net. More precisely, a composition operation
pushout is introduced over open nets such that the common part of the component nets is
fused in the composed net. Their approach enables the systematic construction and analysis
of large and complex systems by composing smaller nets and understanding their interactions.
However, only the semantics of deterministic processes are considered. An extended version of
the compositional approach in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] was introduced in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Hence, non-deterministic processes
semantic is investigated in the compositional approach. Ranked open nets were defined (an
extension of open nets introduced in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]) where the maximum number of allowed input and output
connections are specified. The composition operation is extended as well to non-deterministic
processes. Modal I/O-Petri Nets (MIOPNs) is introduced in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] for asynchronous composition via
communication channels. More precisely, the interfaces are defined by labelled Petri nets which
distinguished input and output labels. In their composition approach, individuals components
are connected by channels for asynchronous communication. That is components with shared
input and output actions are connected together with a new place called communication channel.
Generally, the paper investigates how MIOPNs can be utilised to model asynchronous interactions
between components via compositional methodology.
      </p>
      <p>
        Despite the fact that there exists an extensive literature on the approaches of net composition
and decomposition, yet difficulties dealing with large event log still an issue. Hence, [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] proposes
innovative methods for process discovery decomposition and conformance checking
decomposition. In process discovery problem , the approach involves dividing the set of activities into partly
overlapping activity sets, discovering model fragments for each activity set, and then combining
these to form a complete process model. We utilised this approach to represent acyclic nets from
the decomposed sets (nets) identified.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Preliminaries</title>
      <sec id="sec-3-1">
        <title>3.1. Acyclic Petri Nets</title>
        <p>This section provides basic concepts related to acyclic Petri nets and event logs. Acyclic nets can
represent alternative ways of interpreting what has happened, and so may exhibit (backward and
forward) non-determinism.</p>
        <p>An acyclic net is a triple acnet = (P, T, F), where P and T are disjoint finite sets of places and
transitions respectively, and F ⊆ (P × T ) ∪ (T × P) is a flow relation such that: (i) P is nonempty
and F is acyclic; and (ii) for every t ∈ T , there is p ∈ P such that pFt. Graphically, places
are represented by circles, transitions by boxes, and arcs between the nodes represent the flow
relation If needed, we denote P by Pacnet, etc. For all x ∈ P ∪ T , • x = preacnet (x) ≜ {z | zFx} and
x• = postacnet (x) ≜ {z | xFz} (and similarly for sets of nodes • X = ⋃︁x∈X • x and X • = ⋃︁x∈X x• ).
Moreover, Paincnitet = {p ∈ P | • p = ∅} , Pafincnet = {p ∈ P | p• = ∅}are the initial places and final
places respectively.</p>
        <p>Given an acyclic net, its execution proceeds by the occurrence (or firing) of sets of transitions.
Let acnet = (P, T, F) be an acyclic net.</p>
        <p>• markings(acnet) ≜ {M |⊆ P} are the markings (shown by placing tokens within the circles),
ifn ifn
and Maincintet ≜ Paincnitet is the default initial marking, and Macnet ≜ Pacnet is the final marking.
• steps(acnet) ≜ {U ⊆ T | U ̸= ∅ ∧ ∀t ̸= u ∈ U : • t ∩ • u = ∅} are the steps.
• enabledacnet(M) ≜ {U ∈ steps(acnet) | • U ⊆ M} are the steps enabled at a marking M, and
a step U enabled at M can be executed yielding a new marking M′ ≜ (M ∪ U • ) \ • U . This
is denoted by M[U ⟩acnet M′.</p>
        <p>Let M0, . . . , Mk (k ≥ 0) be markings and U1, . . . ,Uk be steps of an acyclic net acnet such that</p>
        <sec id="sec-3-1-1">
          <title>Mi− 1[Ui⟩acnet Mi, for every 1 ≤ i ≤ k.</title>
          <p>• σ = U1 . . .Uk is a step sequence from M0 to Mk</p>
          <p>denote by M0[σ ⟩acnet Mk, and M0[⟩acnet Mk denotes that Mk is reachable from M0.
• If M0 = Maincintet, then σ ∈ sseq(acnet) is a step sequence, and Mk is a reachable
marking of acnet. Also, if σ cannot be extended further, it is a maximal step sequence in
maxsseq(acnet).</p>
          <p>
            A labeled acyclic Perti net ( [
            <xref ref-type="bibr" rid="ref1">1</xref>
            ] ), acnet = (P, T, F, l) is an acyclic Petri net (P, T, F) with
labeling function T ↛ UA where UA is some universe of activity labels. Let σv = {a1, a2, . . . an} ∈
UA∗ be a sequence of activities. M0[σv Mk iff there is a step sequence σ ∈ sseq(acnet) such
that M0[σ ⟩acnet Mk and l(σ ) = σv. Also, dom(l) ⊆ T is the domain of l and the range of l denoted
by rng(l) is the set of the corresponding observable activities.
          </p>
          <p>
            For each transition t ∈ T , t is called invisible if it is without a label, t ∈/ dom(l), however, it is
visible when l(t) ∈ dom(l). Note that occurrence of visible transition t corresponds to observable
activity l(t) [
            <xref ref-type="bibr" rid="ref1">1</xref>
            ].
          </p>
          <p>
            Example 1. Figure 1 shows a labelled acyclic Petri net (generated using ProM, a
process mining framework after modifying the event log used in [
            <xref ref-type="bibr" rid="ref1">1</xref>
            ]). The set of places are
P = {start, p1, . . . , p9, end}, and the transitions are T = {t1,t2, . . . , t11}. t1 is enabled at the
initial marking Minit = {start}, so {start}[t1⟩. Hence, t1 can be fired and produce new
marking M′ = {p1, p2} denoted by {start}[t1⟩{p1, p2}. One of the maximal step sequences is
σ = {t1,t3,t4,t5,t10}. The labelling function is dom(l) = {t1,t3,t4,t5,t8,t9,t10} (visible
transitions). with l(t1) = a, l(t3) = b, l(t4) = c, l(t5) = d, l(t8) = f , l(t9) = g, l(t10) = h such
that:
a = "register request"
d = "decide"
h = "send reject letter".
          </p>
          <p>b = "examine file" c = "check ticket"
f = "send acceptance letter" g = " pay compensation"
start
a
t1
p1
p2
t2
b
t3
c
t4
p3
p5</p>
          <p>end
t11</p>
          <p>Whereas, the invisible transitions are t2,t7,t11 which are unlabelled transitions (silent action).
Finally, for the sequence of activities σv = {a, b, c, d, f , g}, then {start}[σv {end} because there
is a step sequence σ = {t1,t3,t4,t5,t7,t8,t9,t11} where l(σ ) = σv</p>
          <p>Note that a labelled acyclic Petri net acnet with maximal step sequences (starting from the initial
marking and ending in final marking) is called system net and denoted by SN = (acnet, Minit, Mfin ).</p>
          <p>
            Event log are the key concept in the context of process mining. Basically, any event log,
denoted by L, consists of multiset of sequence of events called traces. A trace captures the
evolution (from start to end) of a case, which is a process instance, according to the executed
activities. Note that it is possible for different cases to have the same traces. Hence, one can say
that an event log is multiset of traces [
            <xref ref-type="bibr" rid="ref1">1</xref>
            ].
          </p>
          <p>As indicated earlier, conformance checking and process discovery are related process mining
problems. Conformance checking approaches examine to what extend an event log L and a
system acyclic net SN = (acnet, Minit, Mfin ) fit together. Basically, it quantifies the consistency
between observed behaviour stored in L and the modelled behaviour represented by SN. There
are different techniques of conformance checking and exploring them here is out of the scope of
this paper.</p>
          <p>
            Performing conformance checking may take long time as a lot of different traces need to be
conformed with a process model which might include an exponential number of traces. For
example, when an event log contains millions of events, the entire event log must be checked in
order to do conformance checking, which is in fact time consuming. To reduce time required for
conformance checking, Petri net and event log are decomposed into smaller fragments. Basically,
after generating a Petri net process model based on the activities in the event log, decomposing
the process model into smaller subnets and performing conformance checking for each subnet
locally reduces the computation time needed for the conformance checking [
            <xref ref-type="bibr" rid="ref1">1</xref>
            ]. There are some
work in the literature regarding decomposing process mining problems [
            <xref ref-type="bibr" rid="ref1 ref10 ref11 ref12 ref13">1, 10, 11, 12, 13</xref>
            ].
          </p>
          <p>
            More precisely, if there is a system net SN = (acnet, Minit, Mfin ), then it is decomposed into
set of subnets SN = {SN1, SN2, . . . , SNn} such that SNi = (acneti, Miinit, Mifni ) where acneti =
(Pi, T i, Fi, li)[
            <xref ref-type="bibr" rid="ref1">1</xref>
            ].
          </p>
          <p>
            The decomposition approach in [
            <xref ref-type="bibr" rid="ref1">1</xref>
            ] is valid if all the resulted subnets satisfy the original
labelling function. It means that each place belongs to only one subnet and each invisible
transition also belongs to only one subnet. Hence, only visible transitions can appear in different
subnets. However, if there are different visible transitions with the same label, then they must
belong to one subnet. Finally, each edge appears only in one subnet.
          </p>
          <p>
            Example 2. Figure 3.1 shows the decomposition of the net in Figure 1 based on the
decomposition approach in [
            <xref ref-type="bibr" rid="ref1">1</xref>
            ]. Basically, the net in Figure 1 is decomposed into six subnets,
SN = {SN1, SN2, . . . , SN6}. Their approach of the decomposition produces a maximal
partitioning of the overall process model. That means each subnet is as small as possible. Also, note that
only the visible transitions with unique labels appear in multiple subnets. Hence, their
decomposition approach is not only about the partitioning the edges, but it considered the transitions
labels.
          </p>
          <p>p2
SN3</p>
          <p>SN2
p5
end
p9
p10</p>
          <p>t11
SN6
p3
d
t5</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Communication Structured Acyclic Nets (csa-nets)</title>
      <p>
        Communication Structured Acyclic Nets (CSA-nets) are derived from Structured Occurrence Nets
(SON) which are a Petri net-based formalism and introduced in [
        <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
        ] and elaborated in [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
CSA-nets comprise of multiple acyclic nets that are linked through unique elements referred to
as buffer places. Buffer places are capable of modelling both asynchronous and synchronous
communication.
      </p>
      <p>
        SON can be used as a framework for visualising and analysing behaviour of Complex Evolving
Systems (CESs). For example, in [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], SON were used to support the analysis of evidence related
to the activities of complex systems, including cybercrime and major accidents. The goal was to
indicate those responsible for cybercrime or identify the causes of accident. Also, SON were used
in [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] as a framework for modelling cybercrime investigation. Other work on SON are related to
events extraction [
        <xref ref-type="bibr" rid="ref19 ref20">19, 20</xref>
        ].
      </p>
      <p>
        A recently designed and implemented tool SONCraft [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] (based on the WORKCraft
platform [
        <xref ref-type="bibr" rid="ref22 ref23">22, 23</xref>
        ] which is a flexible common underpinning for graph based models) provides an
extensive and powerful support for dealing with models of complex evolving systems based
on SON, including visualisation and verification. Generalising SON as CSA-nets, [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] verifies
its behavioural properties using SAT solver. Moreover, improving its visualisation aspects was
discussed in [
        <xref ref-type="bibr" rid="ref25 ref26 ref27">25, 26, 27</xref>
        ]. Equipping CSA-nets with probabilities was introduced in [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ].
      </p>
      <p>Figure 3 depicts a simple CSA-net, which comprises two acyclic nets: acnet1 and acnet2.
Asynchronous communication between the two acyclic nets is represented by arrows, as seen
between the transitions c and a in different acyclic nets linked through a single buffer place q1.
Thus, transition a will never be executed before c in any execution sequence. A synchronous
communication is represented by arrows pointing in both directions, using buffer places q2 and
q3, as observed between transitions b and d. Thus, these two transitions have to be executed
simultaneously.</p>
      <p>Definition 1 ( CSA-net). A communication structured acyclic net (or CSA-net) is a tuple
csan = (acnet1, . . . , acnetn, Q,W )
1. acnet1, . . . , acnetn are acyclic nets with disjoint sets of nodes (i.e., places and transitions).</p>
      <p>We also denote:</p>
      <p>Pcsan = Pacnet1 ∪ · · · ∪ Pacnetn
Tcsan = Tacnet1 ∪ · · · ∪ Tacnetn</p>
      <p>Fcsan = Facnet1 ∪ · · · ∪ Facnetn .</p>
      <sec id="sec-4-1">
        <title>2. Q is a finite set of buffer places disjoint from Pcsan ∪ Tcsan.</title>
        <p>3. W ⊆ (Q × Tcsan) ∪ (Tcsan × Q) is a set of arcs.
4. For every buffer place q:
(i) there is at least one transition t such that tW q; and
(ii) if tW q and qWu then transitions t and u belong to different component acyclic nets. ♢
That is, in addition to requiring the disjointness of the component acyclic nets and the buffer
places, it is also required that buffer places pass tokens between different acyclic nets. To indicate
relationships between different nodes, for all x ∈ Pcsan ∪ Tcsan ∪ Qcsan and X ⊆ Pcsan ∪ Tcsan ∪ Qcsan,
we denote the directly preceding and directly following nodes as follows:
precsan (x) ≜
postcsan (x) ≜
{z | (z, x) ∈ Fcsan ∪ Wcsan}
{z | (x, z) ∈ Fcsan ∪ Wcsan}
preacnet (X ) ≜ ⋃︁{precsan (z) | z ∈ X }
postcsan (X ) ≜ ⋃︁{postcsan (z) | z ∈ X } .
acnet1
acnet2
p1
p5
a
c
e
p2
p3
p6</p>
        <sec id="sec-4-1-1">
          <title>4.1. Step sequence semantics</title>
          <p>
            Definition 2 (step and marking [
            <xref ref-type="bibr" rid="ref3">3</xref>
            ]). Let csan be a CSA-net.
1. markings(csan) ≜ 2Pcsan∪Qcsan are the markings.
          </p>
        </sec>
      </sec>
      <sec id="sec-4-2">
        <title>2. Mcinsaitn ≜ Pcisnaitn is the default initial marking.</title>
        <p>3. steps(csan) ≜ {U ∈ 2Tcsan \ {∅} | ∀t ̸= u ∈ U : precsan (t) ∩ precsan (u) = ∅} are the steps.</p>
        <p>♢</p>
        <p>The initial marking of a CSA-net is the union of the initial markings of all the component
acyclic nets. More precisely, Mcinsaitn = Maincintet1 ∪ Maincintet2 · · · ∪ Maincintetn with an assumption that the
buffer places are always excluded from the initial marking Mcinsaitn.</p>
        <p>
          Definition 3 (enabled and executed step [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]). Let M be a marking of csan.
        </p>
      </sec>
      <sec id="sec-4-3">
        <title>1. enabledcsan(M) ≜ {U ∈ steps(csan) | precsan (U ) ⊆ M ∪ (postcsan (U ) ∩ Q)} are the steps</title>
        <p>enabled at M.</p>
      </sec>
      <sec id="sec-4-4">
        <title>2. A step U enabled at M can be executed yielding a new marking M′ ≜ (M ∪ postcsan (U )) \ precsan (U ). This is denoted by M[U ⟩csan M′. ♢</title>
      </sec>
      <sec id="sec-4-5">
        <title>Definition 4 ( step sequence [3]). Let M0, . . . , Mk (k ≥ 0) be markings and U1, . . . ,Uk be steps</title>
        <p>of a CSA-net csan such that Mi− 1[Ui⟩csan Mi, for every 1 ≤ i ≤ k.</p>
        <p>1. σ = U1 . . .Uk is a step sequence from M0 to Mk, it is denoted by M0[σ ⟩csan Mk. Moreover,</p>
        <p>M0[⟩csan Mk denotes that Mk is reachable from M0.
2. sseq(csan) ≜ {σ | Maincintet[σ ⟩csan M} are the step sequences
3. maxsseq(csan) ≜ {σ ∈ sseq(csan) | ¬∃U : σU ∈ sseq(csan)} are the maximal step
sequences.
4. reachable(csan) ≜ {M | Mcinsaitn[⟩csan M} are the reachable markings.
5. finreachable (csan) ≜ {M | ∃σ ∈ maxsseq(csan) : Mcinsaitn[σ ⟩csan M} are the final reachable
markings.
If k = 0 then the corresponding step sequence σ is the empty sequence denoted by λ .</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Composing a csa-net model from a decomposed process model</title>
      <p>
        Composing a CSA-net model from the decomposed subnets is based on the technique of Petri
net model decomposition with distributed execution. This technique can tackle the difficulties
involved in the analysis and modelling of large-scale systems. That is because complex systems
can be decomposed into interconnected subsystems that can be analysed and executed
independently. [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] suggested establishing communication between decomposed sub-models. Basically,
they proposed an approach of composing a system model using the decomposed components.
Net Splitting operation was defined as a new Petri net operation. Using this operation, a Petri
net is split into several subnets. Then, directed synchronous communication channels are added
to represent the communication between the resulted components. Also, a Petri net model is
partitioned into disjoint sub-models using Split operation. These sub-models are associated with
component with independent execution. Then, the whole system model is composed by modelling
of communication channels among these components [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ]. In the same vein, we would like to
reuse the decomposed subnets to compose a CSA-net model.
      </p>
      <p>
        Next we introduce our approach of constructing a CSA-net model which is based on the result
of decomposing a system net defined in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Basically, composing a CSA-net model requires
identify the overlapped visible transitions between the subnets and link them using asynchronous
communication and buffer places. Recall that the decomposition approach in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] allows only
visible transitions to be shared between the subnets. These overlapped visible transitions are
always the last and first nodes of any two subnets. Basically, for two subnets SNi and SN j where
i &lt; j and their sets of transitions are T i and T j respectively, if t ∈ T i ∩ T j then it is the first node
of SN j and the last node of SNi. Hence, for any two subnets SNi, SN j, let IntersectTran be the
set of these overlapped visible transitions. Also, let T i = {t1i, . . . , tmi} be the set of transitions of
the subnet SNi. Similarly, let T j = {t1, . . . , trj} be the set of transitions of the subnet SN j. Then,
j
j
tmi = t1 ∈ IntersectTran. Then, to compose a CSA-net model from the decomposed subnets,
an asynchronous communication between the subnets using their overlapped visible transitions
is added. In this case, a buffer place q is added such that (tmi, q) , (q, (t• 1j )• ) ∈ W . Adding
asynchrounous communication and the buffer place q represents the global causality between the
subnets SNi and SN j.
      </p>
      <p>The steps of composing a CSA-net model from the decomposed subnets are as follows:
Let SN be a system net and the set {SN1, . . . , SNn} be its maximal decomposed subnets. Then its
composed CSA-net model can be constructed as follows:
1. for each subnet SNi, an initial marking is added where 1 &lt; i ⩽ n. Let the set of all new
initial markings be SN(Minit)
2. for each subnet SNi, a final marking is added where 1 ⩽ i &lt; n. Let the set of all new added
ifnal markings be SN(Mfin )
3. for each two subnets SNi, SN j where 1 ⩽ i &lt; j ⩽ n and T i = {t1i, . . . , tmi}, T j = {t1, . . . , trj}
j
are their set of transitions respectively. Let IntersecTran = T i ∩ T j be the set of their
overlapped visible transitions. Then, a buffer place q is added such that (tmi, q), (q, (t• 1j )• ) ∈
W where tmi = t1 ∈ IntersecTran. Finally, t1j ∈ T j is removed from T j.</p>
      <p>j</p>
      <p>In order to composing a CSA-net model from the decomposed subnets, we assume that each
subnet SNi is an acyclic net acnet.</p>
      <p>SN1</p>
      <p>start
SN3
q1
t1
a
p2</p>
      <p>Example 3. Figure 4 shows an example of our approach. Subnets SN1 and SN3 in Figure 2
both have visible transition t1, l(t1) = a. The presence of t1 in SN3 captured the local causality
between t1 and other transitions of SN3. This local causality can be represented globally at the
level of subnets. In this case, the buffer place q1 and asynchronous communication are added
between SN1 and SN3 such that (t1, q1) and (q1,t4). This asynchronous communication replaces
the local causality between t1 and t4 in SN3. Hence, t1 is removed from SN3, however its impact
is implicitly captured by the occurrence of t1 in SN1 and captured by buffer place q1 and its arcs.
As in CSA-net each acyclic net is independent and it has its own initial and final places, therefore
initial and final markings are added for each subnet. In particular, for subnet SN1 only final
marking is added, however, subnet SN3 initial marking and final marking are added, which are
the gray shaded nodes as depicted in Figure 4
♢</p>
      <p>
        Therefore, we would like to redefine Definition 1 to be based on the decomposition approach
defined in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Definition 5 ( CCSA-net). Let SN be a system net , and its maximal decomposition is the set of
the subnets {SN1, . . . , SNn} as defined in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. A composed communication structured acyclic net
(or CCSA-net) is a tuple
ccsan = (SN1, . . . , SNn, Q,W )
1. SN1, . . . , SNn are subnets. We also denote:
      </p>
      <p>Pcsan
Tcsan
Fcsan
=
=
=</p>
      <p>P1 ∪ · · · ∪
T 1 ∪ · · · ∪
F1 ∪ · · · ∪</p>
      <p>Pn ∪ SN(Minit) ∪ SN(Mfin )
T n</p>
      <p>Fn .
2. Q is a finite set of buffer places defined as in Definition 1.
3. for each two subnets SNi, SNj where 1 ⩽ i &lt; j ⩽ n and T i = {t1i, . . . , tmi}, T j = {t1, . . . , trj}
j
are their set of transitions respectively. Let IntersecTran = T i ∩ T j be the set of their
overlapped transitions which carry the same label. Then, a buffer place q is created such
that (tmi, q), (q,t1j) where tmi, t1 ∈ IntersecTran and they carry the same label.</p>
      <p>j
4. W ⊆ (Q × Tcsan) ∪ (Tcsan × Q) is a set of arcs.
♢
Example 4. Figure 5 shows the result of the CSA-net model composition. Basically, all the
decomposed subnets in Figure 2 are reused with additional buffer places between the subnets
connecting them using their overlapped visible transitions. For instance, in Figure 2 the subnets
SN1 and SN2 both include transition t1 with a label. Note that t1 is only transition in SN1, so
it is the last node. However, it is first node in SN2. So, buffer place q2 is added such that
(t1, q2) ∪ (q2,t2) ∪ (q2,t3) ∈ W . The rest of the subnets are treated similarly. Worth noticing that
in the composed CSA-net model in Figure 5 the initial markings with auxiliary transitions are
added for the subnets SNi where 1 &lt; i ≤ 6 (which are the gray shaded nodes). Similarly, final
markings are added for the subnets SNi where 1 ≤ i &lt; 6.
♢</p>
      <p>Worth to notice that the decomposed subnets in Figure 2 have no initial nor final markings.
However, initial and final markings are added when composing them together in the composed
CSA-net in Figure 5. Hence, they become system nets. More precisely, the new added initial
markings are for the subnets SNi where 1 &lt; i ≤ 6. Also, the new added final markings are for
the subnets SNi where 1 ≤ i &lt; 6. The initial and final markings for SN1 and SN6 are those of
the original net in Figure 1 respectively. Hence, even though the subnets SN2, ..., SN6 become
system nets, non of their visible transitions are fireable, their visible transitions are fireable when
the transitions of SN1 are fired. In fact, by removing all the added initial and final markings, we
obtain the decomposed subnets in Figure 2. More important, adding the initial and final markings
does not change the original behaviour.</p>
      <p>Regarding the behaviour preservation of the original net, we would like to point that the
composed csan in Definition 5 and the original acyclic net have closely related behaviour. This is
formulated in the next result.</p>
      <p>Theorem 5.1. Let acnet = (P, T, F, l) be a labelled acyclic net and ccsan be as in Definition 5.</p>
      <sec id="sec-5-1">
        <title>Then, for every maximal step sequence σ in ccsan, σ ∈ maxsseq(ccsan) there is a maximal step sequence σ ′ in acnet, σ ′ ∈ maxsseq(acnet) such that σ ∩ T = σ ′.</title>
        <p>
          Our compositional approach and the compositional proposed in [
          <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
          ] are different in several
aspects. In [
          <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
          ], identifying a common subnet between two independent nets is required to
compose them into a new net. As the open places were classified into open and output, they were
SN2
q2
p1
        </p>
        <p>SN5
t2
b
t3</p>
        <p>SN1
start
p3</p>
        <p>q4
p4
SN6
t1
a
t5
d
t10
h
t7</p>
        <p>
          p7
p10
p9
t11
p6
q7
end
q1
p2
p5
q3
q5
t4
c
t5
d
used as interfaces between the net and the environment whereas in our compositional approach
the transitions are the interfaces. Also, in our case, there is no need to define the common subnets
between the components to be able to construct the compositional model. Instead, we connect
the subnets which shared the same visible transitions via buffer places. Hence, there is no need to
define a composition operation as we utilise the buffer places to connect the subnets and compose
the CSA-net which is similar to the composition in [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. Finally, the proposed compositional
technique is introduced in the context of process mining.
        </p>
        <p>
          Composing a CSA-net using the decomposed subnets allows us to construct a CSA-net from
a database(i.e., an event log in this case), which has not been addressed so far. CSA-net in all
the previous work [
          <xref ref-type="bibr" rid="ref18 ref19 ref24 ref25 ref26 ref31 ref32">31, 18, 19, 24, 26, 25, 32</xref>
          ] was created manually. Our approach provides a
mechanism of constructing a CSA-net from an event log after decomposing the associated process
model. We believe that CSA-net is a suitable modelling representation for the context of process
mining. Due to the structure of CSA-net where each component is independent, employing it for
process mining would reduce the time computation for process mining related problems, specially
conformance checking and process discovery. In fact, performing conformance checking for a set
of small subnets is more efficient compared for a large model [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. The motivation for process
mining originates from the presence of event data. Although event records can accumulate to
terabytes in size, performance becomes an increasingly important factor to consider. In order
to effectively ensure satisfactory response times , distributed the analysis across a network of
computers is the most feasible strategy [
          <xref ref-type="bibr" rid="ref10 ref12">12, 10</xref>
          ]. Moreover, utilisation CSA-net for the purpose
of process mining would not only be useful in terms of performance, but also provide localised
diagnostics and improve the visualisation.
        </p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion</title>
      <p>In this work, we proposed a method to construct CSA-net from decomposed subnets. We argue
that CSA-net is a suitable representation for process mining analysis. That is because CSA-net
allows individually and locally diagnosis for each acyclic net. Hence, conformance checking
can be performed efficiently using CSA-net representation. In future, we plan to implement our
approach as a SONCraft plug-in. Furthermore, an experiment will be conducted for conformance
checking problem after constructing a CSA-net process model and compare the results with some
results exist in the literature. Related formal proofs will be discussed as well.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          ,
          <article-title>Decomposing petri nets for process mining: A generic approach</article-title>
          ,
          <source>Distributed Parallel Databases</source>
          <volume>31</volume>
          (
          <year>2013</year>
          )
          <fpage>471</fpage>
          -
          <lpage>507</lpage>
          . URL: https://doi.org/10.1007/s10619- 013-7127-5. doi:
          <volume>10</volume>
          .1007/S10619-013-7127-5.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>W. M. Van Der Aalst</surname>
            ,
            <given-names>B. F. Van Dongen</given-names>
          </string-name>
          ,
          <article-title>Discovering petri nets from event logs</article-title>
          ,
          <source>in: Transactions on Petri nets and other models of concurrency vii</source>
          , Springer,
          <year>2013</year>
          , pp.
          <fpage>372</fpage>
          -
          <lpage>422</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Alahmadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Alharbi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Alharbi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Almutairi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Alshammari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bhattacharyya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Koutny</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Randell</surname>
          </string-name>
          , Structured Acyclic Nets,
          <source>Technical Report</source>
          , School of Computing, University of Newcastle upon Tyne,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>J.</given-names>
            <surname>Carmona</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Cortadella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kishinevsky</surname>
          </string-name>
          ,
          <article-title>A region-based algorithm for discovering petri nets from event logs</article-title>
          ,
          <source>in: Business Process Management: 6th International Conference, BPM</source>
          <year>2008</year>
          , Milan, Italy, September 2-
          <issue>4</issue>
          ,
          <year>2008</year>
          . Proceedings 6, Springer,
          <year>2008</year>
          , pp.
          <fpage>358</fpage>
          -
          <lpage>373</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>W. van der</given-names>
            <surname>Aalst</surname>
          </string-name>
          , T. Weijters, L. Maruster,
          <article-title>Workflow mining: discovering process models from event logs</article-title>
          ,
          <source>IEEE Transactions on Knowledge and Data Engineering</source>
          <volume>16</volume>
          (
          <year>2004</year>
          )
          <fpage>1128</fpage>
          -
          <lpage>1142</lpage>
          . doi:
          <volume>10</volume>
          .1109/TKDE.
          <year>2004</year>
          .
          <volume>47</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>A. K. H. da Costa</surname>
          </string-name>
          ,
          <article-title>Petri net model decomposition - a model based approach supporting distributed execution</article-title>
          ,
          <source>Ph.D. thesis</source>
          , Universidade NOVA de Lisboa (Portugal),
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>P.</given-names>
            <surname>Baldan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Corradini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Ehrig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Heckel</surname>
          </string-name>
          ,
          <article-title>Compositional semantics for open petri nets based on deterministic processes</article-title>
          ,
          <source>Mathematical Structures in Computer Science</source>
          <volume>15</volume>
          (
          <year>2005</year>
          )
          <fpage>1</fpage>
          -
          <lpage>35</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>P.</given-names>
            <surname>Baldan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Corradini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Ehrig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>König</surname>
          </string-name>
          , Open petri nets:
          <article-title>Non-deterministic processes and compositionality</article-title>
          , in: H.
          <string-name>
            <surname>Ehrig</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Heckel</surname>
          </string-name>
          , G. Rozenberg, G. Taentzer (Eds.), Graph Transformations, 4th International Conference, ICGT 2008, Leicester,
          <source>United Kingdom, September</source>
          <volume>7</volume>
          -
          <issue>13</issue>
          ,
          <year>2008</year>
          . Proceedings, volume
          <volume>5214</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2008</year>
          , pp.
          <fpage>257</fpage>
          -
          <lpage>273</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>540</fpage>
          -87405-8_
          <fpage>18</fpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>540</fpage>
          -87405-8\_
          <fpage>18</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Haddad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Hennicker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. H.</given-names>
            <surname>Møller</surname>
          </string-name>
          ,
          <article-title>Specification of asynchronous component systems with modal i/o-petri nets</article-title>
          , in: M.
          <string-name>
            <surname>Abadi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Lluch-Lafuente</surname>
          </string-name>
          (Eds.),
          <source>Trustworthy Global Computing - 8th International Symposium, TGC</source>
          <year>2013</year>
          ,
          <string-name>
            <given-names>Buenos</given-names>
            <surname>Aires</surname>
          </string-name>
          , Argentina,
          <source>August 30-31</source>
          ,
          <year>2013</year>
          , Revised Selected Papers, volume
          <volume>8358</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2013</year>
          , pp.
          <fpage>219</fpage>
          -
          <lpage>234</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -05119-2_
          <fpage>13</fpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -05119-2\_
          <fpage>13</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          ,
          <article-title>Decomposing process mining problems using passages</article-title>
          , in: S. Haddad, L. Pomello (Eds.),
          <source>Application and Theory of Petri Nets - 33rd International Conference, PETRI NETS</source>
          <year>2012</year>
          , Hamburg, Germany, June 25-29,
          <year>2012</year>
          . Proceedings, volume
          <volume>7347</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2012</year>
          , pp.
          <fpage>72</fpage>
          -
          <lpage>91</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>642</fpage>
          -31131-
          <issue>4</issue>
          _5. doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          -31131-4\_5.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          ,
          <article-title>Distributed process discovery and conformance checking</article-title>
          , in: J.
          <string-name>
            <surname>de Lara</surname>
          </string-name>
          , A. Zisman (Eds.), Fundamental Approaches to Software Engineering - 15th International Conference, FASE 2012,
          <article-title>Held as Part of the European Joint Conferences on Theory and Practice of Software</article-title>
          ,
          <source>ETAPS</source>
          <year>2012</year>
          , Tallinn, Estonia, March 24 - April 1,
          <year>2012</year>
          . Proceedings, volume
          <volume>7212</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2012</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>25</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>642</fpage>
          -28872-
          <issue>2</issue>
          _1. doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          -28872- 2\_1.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>C.</given-names>
            <surname>Bratosin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Sidorova</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          ,
          <article-title>Distributed genetic process mining</article-title>
          ,
          <source>in: Proceedings of the IEEE Congress on Evolutionary Computation, CEC</source>
          <year>2010</year>
          , Barcelona, Spain,
          <fpage>18</fpage>
          -
          <issue>23</issue>
          <year>July 2010</year>
          , IEEE,
          <year>2010</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          . URL: https://doi.org/10.1109/CEC.
          <year>2010</year>
          .
          <volume>5586250</volume>
          . doi:
          <volume>10</volume>
          .1109/CEC.
          <year>2010</year>
          .
          <volume>5586250</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J.</given-names>
            <surname>Carmona</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Cortadella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kishinevsky</surname>
          </string-name>
          ,
          <string-name>
            <surname>Divide-</surname>
          </string-name>
          and
          <article-title>-conquer strategies for process mining</article-title>
          , in: U. Dayal,
          <string-name>
            <given-names>J.</given-names>
            <surname>Eder</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Koehler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. A.</given-names>
            <surname>Reijers</surname>
          </string-name>
          (Eds.),
          <source>Business Process Management, 7th International Conference, BPM</source>
          <year>2009</year>
          , Ulm, Germany, September 8-
          <issue>10</issue>
          ,
          <year>2009</year>
          . Proceedings, volume
          <volume>5701</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2009</year>
          , pp.
          <fpage>327</fpage>
          -
          <lpage>343</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>642</fpage>
          -03848-8_
          <fpage>22</fpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          -03848- 8\_
          <fpage>22</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>B.</given-names>
            <surname>Randell</surname>
          </string-name>
          ,
          <article-title>Occurrence nets then and now: The path to structured occurrence nets</article-title>
          , in: L.
          <string-name>
            <surname>M. Kristensen</surname>
          </string-name>
          , L. Petrucci (Eds.),
          <source>Applications and Theory of Petri Nets - 32nd International Conference, PETRI NETS</source>
          <year>2011</year>
          ,
          <article-title>Newcastle</article-title>
          ,
          <string-name>
            <surname>UK</surname>
          </string-name>
          , June 20-24,
          <year>2011</year>
          . Proceedings, volume
          <volume>6709</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2011</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>16</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>B.</given-names>
            <surname>Randell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Koutny</surname>
          </string-name>
          ,
          <article-title>Failures: Their definition, modelling and analysis</article-title>
          , in: C. B.
          <string-name>
            <surname>Jones</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          <string-name>
            <surname>Liu</surname>
          </string-name>
          , J. Woodcock (Eds.),
          <source>Theoretical Aspects of Computing - ICTAC</source>
          <year>2007</year>
          , 4th International Colloquium, Macau, China,
          <source>September 26-28</source>
          ,
          <year>2007</year>
          , Proceedings, volume
          <volume>4711</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2007</year>
          , pp.
          <fpage>260</fpage>
          -
          <lpage>274</lpage>
          . URL: https: //doi.org/10.1007/978-3-
          <fpage>540</fpage>
          -75292-9_
          <fpage>18</fpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>540</fpage>
          -75292-9\_
          <fpage>18</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>M.</given-names>
            <surname>Koutny</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Randell</surname>
          </string-name>
          ,
          <article-title>Structured occurrence nets: A formalism for aiding system failure prevention and analysis techniques</article-title>
          ,
          <source>Fundam. Informaticae</source>
          <volume>97</volume>
          (
          <year>2009</year>
          )
          <fpage>41</fpage>
          -
          <lpage>91</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>B.</given-names>
            <surname>Randell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Koutny</surname>
          </string-name>
          , Structured Occurrence Nets:
          <article-title>Incomplete, contradictory and uncertain failure evidence</article-title>
          ,
          <source>Technical Report 1170</source>
          , School of Computing Science, University of Newcastle upon Tyne,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>T.</given-names>
            <surname>Alharbi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Koutny</surname>
          </string-name>
          ,
          <article-title>Domain name system (DNS) tunneling detection using structured occurrence nets (sons)</article-title>
          , in: D.
          <string-name>
            <surname>Moldt</surname>
          </string-name>
          , E. Kindler, M. Wimmer (Eds.),
          <source>Proceedings of the International Workshop on Petri Nets and Software Engineering (PNSE</source>
          <year>2019</year>
          ), volume
          <volume>2424</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>93</fpage>
          -
          <lpage>108</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>T.</given-names>
            <surname>Alshammari</surname>
          </string-name>
          ,
          <article-title>Towards Automatic Extraction of Events for SON Modelling</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          <volume>3170</volume>
          (
          <year>2022</year>
          )
          <fpage>188</fpage>
          -
          <lpage>201</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>T.</given-names>
            <surname>Alshammari</surname>
          </string-name>
          ,
          <article-title>Integrating nlp and structured occurrence nets for crime modelling: A pattern-based approach</article-title>
          , in: M.
          <string-name>
            <surname>Köhler-Bussmeier</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Moldt</surname>
          </string-name>
          , H. Rölke (Eds.),
          <source>Petri Nets and Software Engineering</source>
          <year>2023</year>
          co
          <article-title>-located with the 44rd International Conference on Application and Theory of Petri Nets and Concurrency (PETRI NETS</article-title>
          <year>2023</year>
          ), Lisbon, Portugal, June 27th,
          <year>2023</year>
          , volume
          <volume>3430</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2023</year>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3430</volume>
          /poster2.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>B.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Randell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bhattacharyya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Alharbi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Koutny</surname>
          </string-name>
          ,
          <article-title>Soncraft: A tool for construction, simulation, and analysis of structured occurrence nets</article-title>
          ,
          <source>in: 18th International Conference on Application of Concurrency to System Design, ACSD</source>
          <year>2018</year>
          , Bratislava, Slovakia, June 25-29,
          <year>2018</year>
          , IEEE Computer Society,
          <year>2018</year>
          , pp.
          <fpage>70</fpage>
          -
          <lpage>74</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Workcraft</surname>
          </string-name>
          , https://workcraft.org/,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>I.</given-names>
            <surname>Poliakov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Khomenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Yakovlev</surname>
          </string-name>
          ,
          <article-title>Workcraft - A framework for interpreted graph models</article-title>
          , in: G. Franceschinis,
          <string-name>
            <surname>K.</surname>
          </string-name>
          Wolf (Eds.),
          <source>Applications and Theory of Petri Nets</source>
          , 30th International Conference,
          <source>PETRI NETS</source>
          <year>2009</year>
          , Paris, France, June 22-26,
          <year>2009</year>
          . Proceedings, volume
          <volume>5606</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2009</year>
          , pp.
          <fpage>333</fpage>
          -
          <lpage>342</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>N.</given-names>
            <surname>Almutairi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Koutny</surname>
          </string-name>
          ,
          <article-title>Verification of communication structured acyclic nets using SAT</article-title>
          , in: M.
          <string-name>
            <surname>Köhler-Bussmeier</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Kindler</surname>
          </string-name>
          , H. Rölke (Eds.),
          <source>Proceedings of the International Workshop on Petri Nets and Software Engineering</source>
          <year>2021</year>
          co
          <article-title>-located with the 42nd International Conference on Application and Theory of Petri Nets and Concurrency (PETRI NETS</article-title>
          <year>2021</year>
          ), Paris, France, June 25th,
          <year>2021</year>
          (due to COVID-19
          <source>: virtual conference)</source>
          , volume
          <volume>2907</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>175</fpage>
          -
          <lpage>194</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>M.</given-names>
            <surname>Alahmadi</surname>
          </string-name>
          ,
          <article-title>Master channel places for communication structured acyclic nets</article-title>
          , in: M.
          <string-name>
            <surname>Köhler-Bussmeier</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Kindler</surname>
          </string-name>
          , H. Rölke (Eds.),
          <source>Proceedings of the International Workshop on Petri Nets and Software Engineering</source>
          <year>2021</year>
          co
          <article-title>-located with the 42nd International Conference on Application and Theory of Petri Nets and Concurrency (PETRI NETS</article-title>
          <year>2021</year>
          ), Paris, France, June 25th,
          <year>2021</year>
          (due to COVID-19
          <source>: virtual conference)</source>
          , volume
          <volume>2907</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>233</fpage>
          -
          <lpage>240</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2907</volume>
          /paper13.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>M.</given-names>
            <surname>Alahmadi</surname>
          </string-name>
          ,
          <article-title>Parametrisation of csa-nets</article-title>
          , in: M.
          <string-name>
            <surname>Köhler-Bussmeier</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Moldt</surname>
          </string-name>
          , H. Rölke (Eds.),
          <source>Petri Nets and Software Engineering</source>
          <year>2022</year>
          co
          <article-title>-located with the 43rd International Conference on Application and Theory of Petri Nets and Concurrency (PETRI NETS</article-title>
          <year>2022</year>
          ), Bergen, Norway, June 20th,
          <year>2022</year>
          , volume
          <volume>3170</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>215</fpage>
          -
          <lpage>216</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3170</volume>
          /poster3.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>M.</given-names>
            <surname>Alahmadi</surname>
          </string-name>
          ,
          <string-name>
            <surname>Parameterised</surname>
          </string-name>
          csa-nets, in: M.
          <string-name>
            <surname>Köhler-Bussmeier</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Moldt</surname>
          </string-name>
          , H. Rölke (Eds.),
          <source>Petri Nets and Software Engineering</source>
          <year>2023</year>
          co
          <article-title>-located with the 44rd International Conference on Application and Theory of Petri Nets and Concurrency (PETRI NETS</article-title>
          <year>2023</year>
          ), Lisbon, Portugal, June 27th,
          <year>2023</year>
          , volume
          <volume>3430</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>167</fpage>
          -
          <lpage>182</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3430</volume>
          /paper10.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>N.</given-names>
            <surname>Almutairi</surname>
          </string-name>
          ,
          <article-title>Probabilistic communication structured acyclic nets</article-title>
          , in: M.
          <string-name>
            <surname>Köhler-Bussmeier</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Moldt</surname>
          </string-name>
          , H. Rölke (Eds.),
          <source>Petri Nets and Software Engineering</source>
          <year>2022</year>
          co
          <article-title>-located with the 43rd International Conference on Application and Theory of Petri Nets and Concurrency (PETRI NETS</article-title>
          <year>2022</year>
          ), Bergen, Norway, June 20th,
          <year>2022</year>
          , volume
          <volume>3170</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>168</fpage>
          -
          <lpage>187</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <surname>A. K. H. da Costa</surname>
          </string-name>
          ,
          <article-title>Petri net model decomposition-a model based approach supporting distributed execution</article-title>
          ,
          <source>Ph.D. thesis</source>
          , Universidade NOVA de Lisboa (Portugal),
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>A.</given-names>
            <surname>Costa</surname>
          </string-name>
          , L. Gomes,
          <article-title>Partitioning of petri net models amenable for distributed execution</article-title>
          ,
          <source>in: 2006 IEEE Conference on Emerging Technologies and Factory Automation</source>
          ,
          <year>2006</year>
          , pp.
          <fpage>1129</fpage>
          -
          <lpage>1132</lpage>
          . doi:
          <volume>10</volume>
          .1109/ETFA.
          <year>2006</year>
          .
          <volume>355253</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>B.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <article-title>Visualisation and Analysis of Complex Behaviours using Structured Occurrence Nets</article-title>
          ,
          <source>Ph.D. thesis</source>
          , School of Computing, Newcastle University,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>S.</given-names>
            <surname>Alharbi</surname>
          </string-name>
          ,
          <article-title>Hierarchical simulation of timed behaviours of structured occurrence nets</article-title>
          , in: M.
          <string-name>
            <surname>Köhler-Bussmeier</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Moldt</surname>
          </string-name>
          , H. Rölke (Eds.),
          <source>Petri Nets and Software Engineering</source>
          <year>2023</year>
          co
          <article-title>-located with the 44rd International Conference on Application and Theory of Petri Nets and Concurrency (PETRI NETS</article-title>
          <year>2023</year>
          ), Lisbon, Portugal, June 27th,
          <year>2023</year>
          , volume
          <volume>3430</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>143</fpage>
          -
          <lpage>165</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3430</volume>
          /paper9.pdf.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>