<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Probabilistic Compliance in Declarative Process Mining</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Michela</forename><surname>Vespa</surname></persName>
							<email>michela.vespa@unife.it</email>
							<affiliation key="aff0">
								<orgName type="department">Dipartimento di Ingegneria</orgName>
								<orgName type="institution">Università di Ferrara</orgName>
								<address>
									<addrLine>Via Saragat 1</addrLine>
									<settlement>Ferrara</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Elena</forename><surname>Bellodi</surname></persName>
							<email>elena.bellodi@unife.it</email>
							<affiliation key="aff0">
								<orgName type="department">Dipartimento di Ingegneria</orgName>
								<orgName type="institution">Università di Ferrara</orgName>
								<address>
									<addrLine>Via Saragat 1</addrLine>
									<settlement>Ferrara</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Federico</forename><surname>Chesani</surname></persName>
							<email>federico.chesani@unibo.it</email>
							<affiliation key="aff1">
								<orgName type="department">Dipartimento di Informatica -Scienza e Ingegneria</orgName>
								<address>
									<addrLine>Viale Risorgimento 2</addrLine>
									<settlement>Bologna</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Daniela</forename><surname>Loreti</surname></persName>
							<email>daniela.loreti@unibo.it</email>
							<affiliation key="aff1">
								<orgName type="department">Dipartimento di Informatica -Scienza e Ingegneria</orgName>
								<address>
									<addrLine>Viale Risorgimento 2</addrLine>
									<settlement>Bologna</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Paola</forename><surname>Mello</surname></persName>
							<email>paola.mello@unibo.it</email>
							<affiliation key="aff1">
								<orgName type="department">Dipartimento di Informatica -Scienza e Ingegneria</orgName>
								<address>
									<addrLine>Viale Risorgimento 2</addrLine>
									<settlement>Bologna</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Evelina</forename><surname>Lamma</surname></persName>
							<email>evelina.lamma@unife.it</email>
							<affiliation key="aff0">
								<orgName type="department">Dipartimento di Ingegneria</orgName>
								<orgName type="institution">Università di Ferrara</orgName>
								<address>
									<addrLine>Via Saragat 1</addrLine>
									<settlement>Ferrara</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Anna</forename><surname>Ciampolini</surname></persName>
							<email>anna.ciampolini@unibo.it</email>
							<affiliation key="aff1">
								<orgName type="department">Dipartimento di Informatica -Scienza e Ingegneria</orgName>
								<address>
									<addrLine>Viale Risorgimento 2</addrLine>
									<settlement>Bologna</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Probabilistic Compliance in Declarative Process Mining</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">17CD9C6BF5B513AAA949FB37FE89CEF4</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T19:25+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Process Mining, Declarative language, Compliance, Distribution Semantics, Probabilistic Logic Programs (A. Ciampolini) 0009-0004-4350-8151 (M. Vespa)</term>
					<term>0000-0002-3717-3779 (E. Bellodi)</term>
					<term>0000-0003-1664-9632 (F. Chesani)</term>
					<term>0000-0002-6507-7565 (D. Loreti)</term>
					<term>0000-0002-5929-8193 (P. Mello)</term>
					<term>0000-0003-2747-4292 (E. Lamma)</term>
					<term>0000-0002-9314-1958 (A. Ciampolini)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>When addressing real-world processes, it is crucial to account for their intrinsic uncertainty to better reflect the nature of such processes. In this work, we introduce the concept of Probabilistic Declarative Process Specification (PDS), which is based on the Distribution Semantics from Probabilistic Logic Programming, in order to describe declarative process models with both crisp and probabilistic constraints. The probability associated to a constraint represents its strength or importance in a specific process domain. From this, we propose a novel notion of probabilistic compliance of a process trace w.r.t. a PDS, and how to compute it with an existing algorithm. Preliminary experimental results on a healthcare protocol are presented to evaluate the feasibility of our proposed semantics on process conformance checking.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>In the Business Process Mining community, many different languages have been proposed to model/describe a process, capturing the many aspects of a work process, ranging from the resource perspective, to the artifact-based and data perspective, up to the control-flow aspects. The latter viewpoint in particular has been subject to intense research activity. Two families of process modeling languages emerged: procedural approaches, such as BPMN 1 , and declarative ones, such as Declare <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref> and DCR Graphs <ref type="bibr" target="#b2">[3]</ref>. Declarative approaches have been introduced to overcome some forms of rigidness derived by procedural ones, with the aim of finding a balance between flexibility and control. Declare in particular, was defined with this aim: allowing the specification of which properties a process instance should exhibit, without specifying the exact steps to achieve them. Since the initial proposal, Declare has been equipped with a formal semantics based on a strict subset of LTL 𝑓 . This enables a straightforward specification of process properties through the use of established formulas.</p><p>However, the adoption of a logic-based semantics has also raised a practical issue when dealing with the problem of evaluating if a log is compliant with a process specification. On one side, a log is composed of many traces; on the other side a Declare process specification is composed of many constraints. Typically, in real-world applications, different subsets of traces are compliant with different subsets of constraints. The direct consequence is that a logic-crisp notion of compliance might be difficult or unsatisfactory to identify. In turn, such difficulty could undermine the capacity of a process specification to properly describe the process. In a seminal work <ref type="bibr" target="#b3">[4]</ref>, the authors tackled the problem by introducing the notion of probabilities into the Declare formalism: each constraint is assigned a probability (and a relational operator). A probabilistic constraint is satisfied over the log if the number of traces satisfying the constraint over the log cardinality achieves the mathematical relation established by the relational operator and the probability assigned. As a practical example, a constraint c 1 with assigned probability (0.9, ≥) is satisfied if the number of traces complaint with c 1 is at least (≥) the 90% of the total traces. In summary, probabilities express the relative frequency of traces, and are employed with such a meaning for the tasks of discovering, monitoring and conformance checking. Nonetheless, when the available log does not represent the whole process domain, the application of the approach <ref type="bibr" target="#b3">[4]</ref> by domain expert might be challenging.</p><p>In this work, we also tackle the problem of probabilistic conformance checking with Declare constraints, but we propose a different semantics underlying the probabilistic constraints. We introduce the concept of Probabilistic Declarative Process Specification (PDS) starting from Probabilistic Logic Programming (PLP) and the Distribution Semantics <ref type="bibr" target="#b4">[5]</ref>. A PLP program under that semantics defines a probability distribution over normal logic programs called worlds. In a PLP program, logic formulas are equipped with a probability, which is interpreted as the probability of them appearing or not in a normal logic program. Similarly, the probability of a Declare constraint is treated as the probability that such constraint will appear (or not) in a possible process specification. The presence or not of a constraint in a process specification tells us how "important" or strong that constraint is. The stronger or more important the constraint, the greater its probability. According to the our semantics, all worlds including one such constraint "inherit" its probability, while those not including the constraint take into account the complement to 1 of its probability. Differently from <ref type="bibr" target="#b3">[4]</ref>, this probability does not represent a fraction of traces satisfying the constraint, but allows one to model uncertainty in the domain by means of the probability attached to the constraint.</p><p>To better clarify our proposal, let us consider the following university course scenario, described with two constraints: (𝑎) it is mildly advised that a student only take the final examination if she has attended all the classes; (𝑏) it is strongly advised that a student attend a practical session only if she attended the corresponding preparatory class. Declare provides the way for expressing such constraints; however, there is no way to specify that rule (𝑎) is "mildly advised", while rule (𝑏) is "strongly advised". Our proposal consists of attaching probabilities to constraints (𝑎) and (𝑏): such values would indicate the probability that each rule would end up in a possible model (process specification), and the probability attached to (𝑏) would be higher than the one attached to (𝑎). By making (𝑎) and (𝑏) probabilistic, we would find four possible process models, and we can formally define the compliance of the students' careers (process traces) towards these four models (i.e., worlds in the Distribution Semantics terminology).</p><p>The contribution of this work is the following: we introduce a semantics for probabilistic declarative process specifications, provide a novel notion of compliance, and ground its application on a health protocol. Then, we exploit previous results, and in particular (𝑖) the mapping provided to Declare in terms of the SCIFF modeling language <ref type="bibr" target="#b5">[6]</ref> and (𝑖𝑖) the extension of the Distribution Semantics to Abductive Logic Programming (ALP) in the SCIFF Framework <ref type="bibr" target="#b6">[7]</ref>. Thanks to the existing work, we can implement our proposed semantics and compute a compliance probability. In order to evaluate the feasibility of our approach, we report some preliminary experimentation over the clinical guideline.</p><p>The paper is organized as follows: Section 2 introduces background on Declare and the distribution semantics, Section 3 describes the proposed semantics, Section 4 describes how we perform probabilistic compliance. Section 5 presents first experimental results and Section 6 concludes the paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Background</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Traces, logs, and the Declare modeling language</head><p>In the BPM setting <ref type="bibr" target="#b7">[8]</ref> the starting point is the observation of a process execution in terms of the execution of the activities that compose the process. Each execution of the process is usually referred to as a process instance or trace, where the executions of the distinct activities are referred to as distinct activity instances or activity executions. Each activity is characterized by at least a name, and each activity instance is usually denoted with a temporal timestamp. The timestamp provides, within the  same trace, a relation order between the different activity executions: it is often the case that traces are represented directly as a sequence of activity names, ordered on the base of the timestamp. Depending on the specific context, the timestamp can be omitted: this is also our choice. Formally, we consider the existence of a finite alphabet of symbols Σ corresponding to the activity names. A trace and a log then are defined as follows:</p><p>Definition 1 (Trace 𝑡 and Log ℒ). Given a finite set Σ of symbols (i.e., activity names), a trace 𝑡 is a finite, ordered sequence of symbols over Σ, i.e. 𝑡 ∈ Σ * , where the latter is the infinite set of all the possible finite sentences over Σ. A log ℒ is a finite set of traces.</p><p>In a process log, each trace 𝑡 represents a different process instance. Different process instances may have the same trace, although referring to different executions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Example 1.</head><p>Let us suppose that a process is made of activities a, b, c, and d. Σ = {a, b, c, d}. An example of a log might be:</p><formula xml:id="formula_0">ℒ = {𝑡 1 = ⟨a, b, c⟩, 𝑡 2 = ⟨a, b, a, d⟩, 𝑡 3 = ⟨a, a, d⟩, 𝑡 4 = ⟨a, b, c⟩, 𝑡 5 = ⟨a, b, c⟩}.</formula><p>The Declare modeling language was initially introduced by <ref type="bibr" target="#b1">[2]</ref> and subsequently studied in <ref type="bibr" target="#b8">[9]</ref>. Aimed to overcome the "rigidness" of procedural modeling languages, it focuses on modeling processes by specifying what are the relevant properties that a process instance should exhibit, without specifying how these properties should be achieved. To this end, Declare models a process in terms of constraints, sort of rules about activities that can appear in a process execution (i.e., in a trace), with qualitative temporal relations among these activities. A simple example of a Declare constraint is response(a,b), meaning that every occurrence of (the execution of) activity a in a trace should be followed by the occurrence of an activity b.</p><p>Declare provides a finite set of constraint patterns, whose arguments should be properly instantiated with the activity names peculiar to the specific process to be modeled. For example, a common pattern is response(x,y) with x and y placeholders to be substituted with proper activities. Another pattern is init(x), that specifies that every process instance should always start with the execution of activity x. Another common pattern is precedence(x,y), that states that every occurrence of the execution of y should be preceded by the execution of x.</p><p>Declare provides a graphical representation for the patterns (see Figure <ref type="figure" target="#fig_1">1</ref> for a few examples), and has been equipped with two different formal semantics, both based on logic formalisms. In the original formulation in <ref type="bibr" target="#b1">[2]</ref> the semantics was given using the LTL temporal logic; subsequent works have shown the feasibility of adopting the LTL 𝑓 logic <ref type="bibr" target="#b9">[10]</ref>: for a recent recap see <ref type="bibr" target="#b10">[11]</ref>. A second formal semantics has been proposed in <ref type="bibr" target="#b5">[6]</ref>, where the SCIFF language and ALP <ref type="bibr" target="#b11">[12]</ref> has been exploited.</p><p>Both the semantics exploit the idea that each Declare template can be mapped onto one (or more) logic formula 𝜙, and that logical entailment can be used to define the notion of compliance/violation of a trace 𝑡 w.r.t. to a constraint formula 𝜙. With the aim of being the most general, we provide an intuitive definition of compliance/violation, where the meaning of the entailment symbol |= should be referred to the chosen semantics (LTL 𝑓 or ALP).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 2 (Compliance/violation of a trace versus a constraint).</head><p>A trace 𝑡 is compliant with a Declare constraint if, named 𝜙 the corresponding logic formula modelling that constraint, it holds: 𝑡 |= 𝜙.</p><p>A trace 𝑡 violates a Declare constraint if it does not entail the corresponding formula 𝜙, i.e. if 𝑡 ̸ |= 𝜙.</p><p>Definition 3 (Declarative Process Specification, from <ref type="bibr" target="#b10">[11]</ref>). A declarative process specification is a tuple DS=(Rep, Σ, 𝐶) where:</p><p>• Rep is a finite non-empty set of templates, where each template is a predicate c(𝑥 1 , . . . , 𝑥 𝑚 ) ∈ Rep on variables 𝑥 1 , . . . , 𝑥 𝑚 (with 𝑚 ∈ N the arity of c); • Σ is a finite non-empty set of activity names; • 𝐶 is a finite set of constraints, obtained by instantiating templates from Rep to Σ; we will compactly denote such constraints with c(𝑎 1 , . . . , 𝑎 𝑚 ), 𝑎 1 , . . . , 𝑎 𝑚 ∈ Σ.</p><p>Usually the constraints c(𝑎 1 , . . . , 𝑎 𝑚 ) in a DS are considered as being in logical conjunction. The notion of compliance can be then lifted from a trace vs. a constraint towards a trace vs. a DS as follows:</p><p>Definition 4 (Compliance of a trace versus a Declarative Process Specification). A trace is compliant with a DS if it entails the conjunction of the formulas 𝜙 𝑖 corresponding to the 𝑐 𝑖 ∈ 𝐶:</p><formula xml:id="formula_1">𝑡 |= 𝜙 1 ∧ . . . ∧ 𝜙 𝑚</formula><p>where 𝑚 is the cardinality of 𝐶.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Example 2. Let us consider the log introduced in Example 1, and the following DS (Rep and Σ are omitted for the sake of simplicity):</head><formula xml:id="formula_2">𝐶 = { c 1 = response(a,b) c 2 = init(a) }</formula><p>Even without considering the corresponding formal semantics, we can notice that:</p><p>• 𝑡 1 , 𝑡 4 , and 𝑡 5 are compliant with c 1 ;</p><p>• 𝑡 2 is not compliant with c 1 because the second occurrence of activity a is not followed by an occurrence of activity b; • 𝑡 3 is not compliant with c 1 because two occurrences of a are not followed by an occurrence of b;</p><p>• 𝑡 1 , . . . , 𝑡 5 are all compliant with c 2 .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Distribution Semantics and Probabilistic Logic Programming</head><p>Probabilistic Logic Programming has recently received an increasing attention for its ability to incorporate probability in logic programming. Among various proposals for PLP, the one based on the distribution semantics <ref type="bibr" target="#b4">[5]</ref> has gained popularity as being introduced for the PRISM language <ref type="bibr" target="#b4">[5]</ref> but is the basis for many other languages such as Probabilistic Logic Programs <ref type="bibr" target="#b12">[13]</ref>, Probabilistic Horn Abduction (PHA) <ref type="bibr" target="#b13">[14]</ref>, Independent Choice Logic (ICL) <ref type="bibr" target="#b14">[15]</ref>, pD <ref type="bibr" target="#b15">[16]</ref>, Logic Programs with Annotated Disjunctions (LPADs) <ref type="bibr" target="#b16">[17]</ref>, ProbLog <ref type="bibr" target="#b17">[18]</ref> and CP-logic <ref type="bibr" target="#b18">[19]</ref>. Such semantics is particularly appealing for its intuitiveness and because efficient inference algorithms were proposed. By combining probability with logic programming, PLP languages are a suitable framework to handle uncertain information.</p><p>A program in one of these languages defines a probability distribution over normal logic programs called worlds. The distribution semantics has been defined both for programs that do not contain function symbols, and thus have a finite set of worlds, and for programs that contain them, that have an infinite set of worlds. We consider here the first case for the sake of simplicity, for the treatment of function symbols see <ref type="bibr" target="#b19">[20]</ref>. A survey of the distribution semantics in PLP can be found in <ref type="bibr" target="#b20">[21]</ref>. In the following, the distribution semantics will be described with reference to LPADs. Formally, an LPAD consists of a finite set of "annotated disjunctive clauses", where the head is a disjunction in which each atom is annotated with a probability. If the body holds true, only one of the atoms in the head will be true with the associated probability. 𝑝 𝑖𝑘 . We denote by 𝑔𝑟𝑜𝑢𝑛𝑑(𝑇 ) the grounding of an LPAD 𝑇 . An atomic choice <ref type="bibr" target="#b14">[15]</ref> is a triple (𝑅 𝑖 , 𝜃 𝑗 , 𝑘) where 𝑅 𝑖 ∈ 𝑇 , 𝜃 𝑗 is a substitution that grounds 𝑅 𝑖 and 𝑘 ∈ {1, . . . , 𝑛 𝑖 } identifies one of the head atoms. (𝑅 𝑖 , 𝜃 𝑗 , 𝑘) means that, for the ground clause 𝑅 𝑖 𝜃 𝑗 , the head ℎ 𝑖𝑘 was chosen. A set of atomic choices 𝜅 is consistent if only one head is selected from the same ground clause; we assume independence between the different choices. A composite choice 𝜅 is a consistent set of atomic choices <ref type="bibr" target="#b14">[15]</ref>. The probability 𝑃 (𝜅) of a composite choice 𝜅 is the product of the probabilities of the independent atomic choices, i.e. 𝑃 (𝜅) = ∏︀ (𝑅 𝑖 ,𝜃 𝑗 ,𝑘)∈𝜅 𝑝 𝑖𝑘 . A selection 𝜎 is a composite choice that, for each clause 𝑅 𝑖 𝜃 𝑗 in 𝑔𝑟𝑜𝑢𝑛𝑑(𝑇 ), contains an atomic choice (𝑅 𝑖 , 𝜃 𝑗 , 𝑘). If somebody has the flu or hay fever, there is the possibility that he experiences sneezing symptoms with different intensity: if she has the flu, then she might show strong sneezing with probability 0.3, or moderate sneezing with probability 0.5; similarly for the second clause. She might not experience any symptom with probability 0.2 in both cases. We know for sure that Bob has both the flu and hay fever. 𝑇 has 3 • 3 = 9 worlds, as each probabilistic clause has one grounding 𝜃 1 = {𝑋/𝑏𝑜𝑏}. Worlds are shown in Table <ref type="table" target="#tab_1">1</ref>. Given a goal G, its probability 𝑃 (𝐺) can be defined by marginalizing the joint probability of the goal and the worlds:</p><formula xml:id="formula_3">𝑃 (𝐺) = ∑︁ 𝑤∈𝑊 𝑇 𝑃 (𝐺, 𝑤) = ∑︁ 𝑤∈𝑊 𝑇 𝑃 (𝐺|𝑤)𝑃 (𝑤) = ∑︁ 𝑤∈𝑊 𝑇 :𝑤|=𝐺 𝑃 (𝑤)<label>(1)</label></formula><p>The probability of a goal 𝐺 given a world 𝑤 is 𝑃 (𝐺|𝑤) = 1 if 𝑤 |= 𝐺 and 0 otherwise. 𝑃 (𝑤) = 𝑃 (𝑤 𝜎 ) = 𝑃 (𝜎), i.e. is the product of the annotations 𝑝 𝑖𝑘 of the atoms selected in 𝜎. Therefore, the probability of a goal G can be computed by summing the probability of the worlds where the goal is true. In practice, given a goal to solve, it is unfeasible to enumerate all the worlds where 𝐺 is entailed. Inference algorithms, instead, find explanations for a goal: a composite choice 𝜅 is an explanation for 𝐺 if 𝐺 is entailed by every world of 𝑤 𝜅 . In particular, algorithms find a covering set of explanations w.r.t. 𝐺, where a set of composite choices 𝐾 is covering with respect to 𝐺 if every program 𝑤 𝜎 ∈ 𝑊 𝑇 in which 𝐺 is entailed is in 𝑤 𝐾 .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Probabilistic Declarative Process Specifications under the Distribution semantics</head><p>In this Section, we propose a semantics for Declarative Process Specifications that is highly inspired by the Distribution Semantics introduced in Section 2.2. First of all, we introduce the notion of probabilistic constraint. Please note that also in Definition 8 of <ref type="bibr" target="#b3">[4]</ref> it is adopted the term probabilistic constraint, but that definition includes also a relational operator that we do not need in our semantics. </p><formula xml:id="formula_4">𝑝 𝑖 :: c 𝑖 (𝑎 1 , . . . , 𝑎 𝑚 )</formula><p>The probability is to be interpreted as the strength or importance of c 𝑖 . The stronger or more important the constraint, the greater its probability. By applying the Distribution Semantics, a constraint c 𝑖 (. . .) will have a probability 𝑝 𝑖 of being part of a Probabilistic Declarative Process Specification, defined as follows:</p><p>Definition 6 (Probabilistic Declarative Process Specification). A Probabilistic Declarative Process Specification PDS is a Declarative Process Specification DS where each constraint c 𝑖 ∈ 𝐷𝑆 is a probabilistic constraint.</p><p>We will refer to constraints annotated with probability 𝑝 𝑖 = 1 as crisp constraints. If all the constraints have probability equal to 1, we simply end up having a Declarative Specification as in Def. 3. Probabilities will be omitted when they are equal to 1. We now propose to interpret the probability 𝑝 𝑖 of a constraint borrowing a few concepts from Section 2.2. Definition 7 (Atomic Choice, and its probability). An atomic choice over a probabilistic constraint 𝑝 𝑖 :: c 𝑖 is a couple (c 𝑖 , 𝑒) where 𝑒 ∈ {0, 1}. 𝑒 indicates whether c 𝑖 is chosen to be included in a PDS with probability 𝑝 𝑖 (e = 1), or not with probability 1 − 𝑝 𝑖 (e = 0).</p><p>Note that here we do not need the substitution 𝜃 as in the definition of atomic choice in subsection 2.2, since, according to Def. 5, the constraint c 𝑖 is ground.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 8 (Composite Choice, and its probability). A set of atomic choices 𝜅 is consistent if there is only one choice in 𝜅 for each probabilistic constraint c 𝑖 ; we assume independence between the different atomic choices. A composite choice 𝜅 is a consistent set of atomic choices.</head><p>The probability 𝑃 (𝜅) of a composite choice 𝜅 is 𝑃 (𝜅) = ∏︀ (c 𝑖 ,1)∈𝜅 𝑝 𝑖 ∏︀ (c 𝑖 ,0)∈𝜅 (1 − 𝑝 𝑖 ), where 𝑝 𝑖 is the probability associated with c 𝑖 . Definition 9 (Selection 𝜎 over a PDS, and its probability). A selection 𝜎 over a Probabilistic Declarative Process Specification is a composite choice that contains an atomic choice (c 𝑖 , 𝑒) for every probabilistic constraint of the PDS. A selection 𝜎 identifies a world in this way:</p><formula xml:id="formula_5">𝑤 𝜎 = {c 𝑖 |(c 𝑖 , 1) ∈ 𝜎}. The probability of a world 𝑤 𝜎 is 𝑃 (𝑤 𝜎 ) = 𝑃 (𝜎) = ∏︀ (c 𝑖 ,1)∈𝜎 𝑝 𝑖 ∏︀ (c 𝑖 ,0)∈𝜎 (1 − 𝑝 𝑖 ).</formula><p>Definition 10 (Probability of a DS). Given the set of all selections 𝑆 𝑇 over a Probabilistic Declarative Process Specification, every world 𝑤 𝜎 𝑖 identified by a selection 𝜎 𝑖 ∈ 𝑆 𝑇 is a different Declarative Process Specification 𝐷𝑆 𝑖 , and its probability is 𝑃 (𝐷𝑆 𝑖 ) = 𝑃 (𝑤 𝜎 𝑖 ) = 𝑃 (𝜎 𝑖 ).</p><p>A PDS defines a probability distribution over regular (non-probabilistic) DSs that correspond to worlds. Let us consider the following example to better illustrate this concept. The probability of c 1 indicates that the constraint response(a,b) is considered very strong therefore, the more traces satisfy it, the better. The probability of c 2 indicates that the fact that a trace starts with the execution of activity a is rather important, but less than the fact that a is followed by b. For each constraint there are 2 different choices, and this leads to 4 selections and 4 possible worlds; in turn, 4 different regular DS are possible, each one corresponding to a world:</p><formula xml:id="formula_6">Selection DS 𝑃 (𝐷𝑆 𝑖 ) 𝜎 1 = {(𝑘 1 , 1), (𝑘 2 , 1)} 𝐷𝑆 1 = {response(a,b), init(a)} 𝑃 (𝐷𝑆 1 ) = 0.9 × 0.8 = 0.72 𝜎 2 = {(𝑘 1 , 1), (𝑘 2 , 0)} 𝐷𝑆 2 = {response(a,b)} 𝑃 (𝐷𝑆 2 ) = 0.9 × 0.2 = 0.18 𝜎 3 = {(𝑘 1 , 0), (𝑘 2 , 1)} 𝐷𝑆 3 = {init(a)} 𝑃 (𝐷𝑆 3 ) = 0.1 × 0.8 = 0.08 𝜎 4 = {(𝑘 1 , 0), (𝑘 2 , 0)} 𝐷𝑆 4 = { } 𝑃 (𝐷𝑆 4 ) = 0.1 × 0.2 = 0.02</formula><p>Example 4 allows us to highlight some characteristics of the semantics proposed in this paper. First of all, we might notice that, thanks to the notion of world, we started from a probabilistic declarative specification, and ended up with a set of non-probabilistic declarative specifications. Secondly, we might notice that each different 𝐷𝑆 𝑖 has its own probability (i.e., the one obtained by the corresponding selection 𝜎 𝑖 ), and that the set of all the possible selections achieves a probability distribution over DSs, i.e.</p><p>∑︀ 𝑖 𝑃 (𝐷𝑆 𝑖 ) = 1.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Probabilistic Compliance</head><p>In this Section we will define the notion of compliance of a trace w.r.t. a Probabilistic Declarative Process Specification PDS. In doing so, we will heavily rely on the simpler notion of compliance of a trace vs. a DS as in Definition 4. Note that in turn Def. 4 builds upon Def. 2, that abstracts away from the formal Declare semantics (𝐿𝑇 𝐿 𝑓 or ALP). As a consequence, our definition of compliance towards a probabilistic specification is general, and is valid for both 𝐿𝑇 𝐿 𝑓 and ALP. Obviously, in order to compute the compliance, one semantics should be chosen: we will discuss such a choice and the implementation in the next Section.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 11 (Compliance of a trace versus a PDS). Given a a Probabilistic Declarative Process Specification PDS, let us consider all the possible selections 𝜎 𝑖 over PDS, and all the possible Declarative Specification</head><p>𝐷𝑆 𝑖 associated with 𝜎 𝑖 . A trace 𝑡 has a probability of compliance w.r.t. a PDS defined as follows:</p><formula xml:id="formula_7">𝑐𝑜𝑚𝑝(𝑡, 𝑃 𝐷𝑆) = ∑︁ 𝜎 𝑖 : 𝑡 is compliant with 𝐷𝑆 𝑖 𝑃 (𝐷𝑆 𝑖 )<label>(2)</label></formula><p>We might observe that, w.r.t. Def. 4, we move forward from a crisp boolean concept towards a degree of compliance: this is an expected consequence of introducing probabilities in the specification. Then, we might notice that the formula above indeed is simply an application of Equation 1 to the process specification domain. Let us apply the notion of compliance of a trace vs. a PDS by considering the following example:</p><p>Example 5 (continued from Ex. 4). Consider the PDS of Ex. 4 and the trace 𝑡 1 = ⟨a, b, c⟩: 𝑡 1 is compliant with all 4 𝐷𝑆 𝑖 and, as expected, its probability of compliance is: 𝑐𝑜𝑚𝑝(𝑡 1 , 𝑃 𝐷𝑆) = 𝑃 (𝐷𝑆 1 ) + 𝑃 (𝐷𝑆 2 ) + 𝑃 (𝐷𝑆 3 ) + 𝑃 (𝐷𝑆 4 ) = 0.72 + 0.18 + 0.08 + 0.02 = 1</p><p>Let us consider then a trace 𝑡 2 = ⟨c, a, b⟩ and suppose temporarily that c 1 and c 2 are crisp constraints: 𝑡 2 is compliant with c 1 since after a there is b; however it is not compliant with c 2 since 𝑡 2 does not start with a. By considering again the constraint as probabilistic, out of the four declarative specifications 𝐷𝑆 𝑖 , 𝑡 2 is compliant with 𝐷𝑆 2 and 𝐷𝑆 4 , i.e. those specifications that do not contain c 2 . 𝑡 2 probability of compliance is:</p><p>𝑐𝑜𝑚𝑝(𝑡 2 , 𝑃 𝐷𝑆) = 𝑃 (𝐷𝑆 2 ) + 𝑃 (𝐷𝑆 4 ) = 0.18 + 0.02 = 0.2 By violating c 2 , which was a rather important constraint as indicated by a probability value of 0.8, the trace has a low degree of compliance vs. the PDS.</p><p>Finally, let us consider the trace 𝑡 3 = ⟨c, a⟩. 𝑡 3 is not compliant with c 1 nor with c 2 , considered individually, however it is compliant with the empty specification 𝐷𝑆 4 , so its probability of compliance is not zero but is equal to 𝑃 (𝐷𝑆 4 ) = 0.02.</p><p>Example 5 illustrates the intuition behind the idea, proposed in this work, of interpreting the probability of a constraint as its strength or, in other words, how much important it is to satisfy such constraint. In the aforementioned example, trace 𝑡 1 is compliant with both the constraints, hence its degree of compliance is the maximum possible. Trace 𝑡 2 instead is compliant with only one of the two constraints, hence its degree is lower in relation to the strength/importance we have associated to the violated constraint. We might finally notice that trace 𝑡 3 , even if it does not comply with any constraints, still achieves a score. This is a direct consequence of the interpretation of the probability of a constraint as its strength: if the strength 𝑝 𝑖 is lower than 1, then we are saying that we will admit non-compliant traces with a degree (1 − 𝑝 𝑖 ).</p><p>In more formal terms, if all the constraints in a PDS have the attached probabilities 𝑝 𝑖 &lt; 1, then there is always a selection 𝜎 * corresponding to including no constraint in the 𝐷𝑆 * (the empty specification), and whose probability is 𝑃 (𝜎 * ) &gt; 0. In Example 4, such a special selection is 𝜎 4 . Every possible trace will be always compliant with 𝐷𝑆 * , since it's empty. Similarly, all the constraints annotated with probability 𝑝 𝑖 = 1 will appear in all the corresponding non-probabilistic DS, as shown in the following example: Example 6. Let us consider the following PDS:</p><formula xml:id="formula_8">𝐶 = { 0.8 :: response(a,b) (c 1 ) init(a) (c 2 ) }</formula><p>The corresponding selections and specifications would be:</p><formula xml:id="formula_9">Selection DS 𝑃 (𝐷𝑆 𝑖 ) 𝜎 1 = {(c 1 , 1)} 𝐷𝑆 1 = {response(a,b), init(a)} 𝑃 (𝐷𝑆 1 ) = 0.8 𝜎 2 = {(c 1 , 0)} 𝐷𝑆 2 = {init(a)} 𝑃 (𝐷𝑆 2 ) = 0.2</formula><p>Example 6 clearly illustrates how our proposed semantics for PDS accommodates for both probabilistic and non-probabilistic constraints: the latter are treated as mandatory constraints as usual in Process Mining, and the derived specifications 𝐷𝑆 𝑖 will always contain them.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Implementation and Evaluation</head><p>For computing the probabilistic compliance of a trace vs a PDS we leveraged on the implementation presented in <ref type="bibr" target="#b21">[22]</ref>. This implementation supports reasoning on ALP programs featuring "integrity constraints" similar to those offered by IFF <ref type="bibr" target="#b22">[23]</ref>, extended with the possibility of annotating them with a probability value. The semantics of these programs, called IFF Prob programs, defines a probability distribution over IFF programs inspired by the distribution semantics, so the IFF Prob implementation could be directly used for our goals. IFF Prob is based on the implementation of the SCIFF proof-procedure. SCIFF <ref type="bibr" target="#b11">[12]</ref> is an extension of the IFF proof procedure that also features constraints (à la CLP) and universally quantified abducibles. In <ref type="bibr" target="#b21">[22]</ref>, the IFF sub-language is extended to the probabilistic case with a new CHR constraint that represents the current explanation (𝑒𝑥𝑝𝑙, 𝑃 ) meaning that, in the current derivation branch, the explanation is 𝑒𝑥𝑝𝑙 and has probability 𝑃 . 𝐸𝑥𝑝𝑙 is a collection of couples (c 𝑖 , 𝑒), holding the constraint c 𝑖 and the Boolean value 𝑒 indicating whether c 1 belongs to 𝑒𝑥𝑝𝑙 or not.</p><p>In <ref type="bibr" target="#b8">[9]</ref> declare constraints were mapped into a rule-based language known as CLIMB (Computational Logic for the verIfication and Modeling of Business constraints), a specialized subset of the SCIFF language that is based on abductive semantics. This mapping allows declarative models to be converted into sets of executable, logic-based rules. These rules are referred to as integrity constraints since they constrain the courses of interaction to ensure their integrity and compliance with interaction protocols. Each atomic Declare activity can be expressed in CLIMB as a term and is linked to a single time point, allowing its execution to be represented as either happened (H), expected (E), or forbidden. For example, the fact that an atomic activity 𝑎 has happened at time 𝑇 can be denoted by 𝐻(exec(𝑎), 𝑇 ), while 𝐸(exec(𝑎), 𝑇 ) states that 𝑎 is expected to occur at time 𝑇 . We do not consider here forbidden activities. Integrity constraints are of the form 𝐵𝑜𝑑𝑦 → 𝐻𝑒𝑎𝑑, where 𝐵𝑜𝑑𝑦 contains (a conjunction of) happened events, together with constraints on their variables, as well as Prolog predicates; 𝐻𝑒𝑎𝑑 contains (a disjunction of conjunctions of) positive and negative expectations, together with constraints and Prolog predicates, applied on their variables and/or on variables contained in the 𝐵𝑜𝑑𝑦.</p><p>We created a Declare process model for elective colorectal surgery based on the ERAS ® (Enhanced Recovery After Surgery) Society guidelines for perioperative care <ref type="bibr" target="#b23">[24]</ref>, as shown in Figure <ref type="figure" target="#fig_4">2</ref>. The model is a PDS written in the CLIMB language, where the protocol activities are subject to both crisp and probabilistic constraints: the former represent strongly recommended practices according to the guidelines, reflecting critical, evidence-supported activities that must be adhered to rigorously, while the latter represent weakly recommended practices, whose associated probability states the importance to apply them in the healthcare flow. Weakly recommended practices may have some degree of flexibility in their implementation due to individual patient needs, local variations in resources and demographics, advancements in medical research, institutional policies, and cultural considerations. The model includes 21 constraints capturing essential perioperative events, from patient admission to post-surgery recovery. Of these, 14 constraints were identified as crisp (𝑝 𝑖 = 1) and 7 as probabilistic. An excerpt of the PDS is: true → 𝐸(exec(program_admission), 0).</p><p>( Here, the integrity constraint 𝑐 1 represents the init constraint. It specifies that the process must always start with the event program admission of the patient, occurring at time 0. Obviously, it is a mandatory constraint. Constraint 𝑐 2 represents the response constraint, indicating that whenever the event program admission happens, the pre-operative patient counseling and education must eventually follow at a time T2 later than T1. It's strongly recommended to begin patient counseling after admission into the program and prior to surgical procedures, thus constraints 𝑐 2 and 𝑐 3 are treated as crisp. Instead, 𝑐 4 and 𝑐 5 are modeled as probabilistic precedence constraints since, in the guidelines, preanesthesia and fasting before surgery could sometimes be skipped. The relatively low probability assigned to them derives from the consensus around those specific perioperative practices, suggesting they are generally not enforced for optimal postoperative outcomes. Each event trace was then adapted to the format required by the algorithm, transforming each trace into an interpretation. Every fact has two arguments: the first one is a ground term that records the event name, and the second one is an integer that indicates the timestamp. An example of an interpretation is the following: ℎ𝑎𝑝(𝑒𝑥𝑒𝑐(𝑝𝑟𝑜𝑔𝑟𝑎𝑚_𝑎𝑑𝑚𝑖𝑠𝑠𝑖𝑜𝑛), 0). ℎ𝑎𝑝(𝑒𝑥𝑒𝑐(𝑐𝑜𝑢𝑛𝑠𝑒𝑙𝑖𝑛𝑔), 5). ℎ𝑎𝑝(𝑒𝑥𝑒𝑐(𝑓 𝑎𝑠𝑡𝑖𝑛𝑔), 80).</p><p>To perform our experiments we wrote one synthetic trace composed of 21 events, one for each activity of the protocol. The process trace satisfied all the model constraints.</p><p>We provide two preliminary scalability tests in order to show how both crisp and probabilistic constraints influence the execution time in computing the probability of compliance of that trace. Experiments were carried out on a Linux machine with Intel ® Xeon ® E5-2630v3 running at 2.40 GHz with 20 GB of RAM and a time limit of 8 hours. In the first test, the number of crisp constraints was kept fixed respectively to 3, 6, 9, and 14 and the number of probabilistic constraints was increased from 1 to 7 at steps of 1. In the second test, the number of probabilistic constraints was kept fixed at 2, 4, and 7 and the number of crisp constraints was increased from 1 to 14 at steps of 1.     , showing an exponential trend in execution times as the number of either crisp or probabilistic constraints increases. The impact on the time is higher when using probabilistic constraints: we obtain an exponential trend with 7 probabilistic constraints compared to 14 crisp ones.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusions and Future Work</head><p>In this paper, we presented a new semantics for Declare process model specifications which allows one to specify probabilistic constraints representing their strength/importance in a specific process domain. In this way, we can model domains where some constraints are stronger (or weaker) than others. Such models are called Probabilistic Declarative Process Specifications. The underlying semantics is inspired by the distribution semantics from Probabilistic Logic Programming, and abstracts away from the formal Declare semantics (LTL 𝑓 or ALP), aiming at computing the probability of compliance of a trace versus the model. The computation of the compliance relies on an existing algorithm. Preliminary tests show that the time taken for computing the probability has an exponential trend by increasing the number of both crisp and probabilistic constraints. Future work includes: extending experimental evaluation, defining the compliance of a set of traces (log) vs. a PDS; extending the new semantics to manage uncertainty at the level of events, traces or the log itself; studying the profiles of energy consumption when computing the probability of compliance.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>(a) The response template. (b) The init template.(c) The precedence template.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Examples of the Declare graphical notation: x and y are placeholders that should be substituted with proper activity names.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head></head><label></label><figDesc>Let us indicate with 𝑆 𝑇 the set of all selections. A selection 𝜎 identifies a normal logic program 𝑤 𝜎 defined as 𝑤 𝜎 = {(ℎ 𝑖𝑘 ← 𝑏𝑜𝑑𝑦(𝑅 𝑖 ))𝜃 𝑗 |(𝑅 𝑖 , 𝜃 𝑗 , 𝑘) ∈ 𝜎}. 𝑤 𝜎 is called a (possible) world of 𝑇 . Since selections are composite choices, we can assign a probability to worlds: 𝑃 (𝑤 𝜎 ) = 𝑃 (𝜎) = ∏︀ (𝑅 𝑖 ,𝜃 𝑗 ,𝑘)∈𝜎 𝑝 𝑖𝑘 . We denote the set of all worlds of 𝑇 by 𝑊 𝑇 . 𝑃 (𝑊 𝑇 ) is a probability distribution over worlds, i.e., ∑︀ 𝑤∈𝑊 𝑇 𝑃 (𝑤) = 1. A composite choice 𝜅 identifies a set of worlds 𝑤 𝜅 = {𝑤 𝜎 |𝜎 ∈ 𝑆 𝑇 , 𝜎 ⊇ 𝜅}. Similarly we can define the set of possible worlds associated to a set of composite choices 𝐾: 𝑊 𝐾 = ⋃︀ 𝜅∈𝐾 𝑤 𝜅 . Example 3. Consider the following LPAD T encoding the effect of flu and hay fever on the sneezing symptom. (𝑅 1 ) 𝑠𝑡𝑟𝑜𝑛𝑔_𝑠𝑛𝑒𝑒𝑧𝑖𝑛𝑔(𝑋) : 0.3; 𝑚𝑜𝑑𝑒𝑟𝑎𝑡𝑒_𝑠𝑛𝑒𝑒𝑧𝑖𝑛𝑔(𝑋) : 0.5 : −𝑓 𝑙𝑢(𝑋). (𝑅 2 ) 𝑠𝑡𝑟𝑜𝑛𝑔_𝑠𝑛𝑒𝑒𝑧𝑖𝑛𝑔(𝑋) : 0.2; 𝑚𝑜𝑑𝑒𝑟𝑎𝑡𝑒_𝑠𝑛𝑒𝑒𝑧𝑖𝑛𝑔(𝑋) : 0.6 : −ℎ𝑎𝑦_𝑓 𝑒𝑣𝑒𝑟(𝑋). (𝑅 3 ) 𝑓 𝑙𝑢(𝑏𝑜𝑏). (𝑅 4 ) ℎ𝑎𝑦_𝑓 𝑒𝑣𝑒𝑟(𝑏𝑜𝑏).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Example 4 .</head><label>4</label><figDesc>Let us consider the following PDS, obtained as an extension of the DS in Example 2: 𝐶 = { 0.9 :: response(a,b) (c 1 ) 0.8 :: init(a) (c 2 ) }</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: declare model of the ERAS ® protocol for colorectal surgery across the pre-operative (PRE-OP), intra-operative (INTRA-OP), and post-operative (POST-OP) phases. Strong recommendations are shown in black, while weak ones in gray.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head></head><label></label><figDesc>(a) Execution time as the number of probabilistic constraints varies, keeping the number of crisp constraints fixed.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head></head><label></label><figDesc>Execution time as the number of crisp constraints varies, keeping the number of probabilistic constraints fixed.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Scalability analysis of the computation of the probability of compliance of a trace vs. a PDS with varying numbers of crisp and probabilistic constraints.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_9"><head>Figure 3</head><label>3</label><figDesc>Figure3illustrates the results, showing an exponential trend in execution times as the number of either crisp or probabilistic constraints increases. The impact on the time is higher when using</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>An annotated disjunctive clause 𝑅 𝑖 is of the form ℎ 𝑖1 : 𝑝 𝑖1 ; . . . ; ℎ 𝑖𝑛 𝑖 : 𝑝 𝑖𝑛 𝑖 : − 𝑏 𝑖1 , . . . , 𝑏 𝑖𝑚 𝑖 , where ℎ 𝑖1 , . . . , ℎ 𝑖𝑛 𝑖 are logical atoms and {𝑝 𝑖1 , . . . , 𝑝 𝑖𝑛 𝑖 } are real numbers in the interval [0, 1] such that ∑︀ 𝑛 𝑖</figDesc><table /><note>𝑘=1 𝑝 𝑖𝑘 ≤ 1; 𝑏 𝑖1 , . . . , 𝑏 𝑖𝑚 𝑖 is indicated with 𝑏𝑜𝑑𝑦(𝑅 𝑖 ). If ∑︀ 𝑛 𝑖 𝑘=1 𝑝 𝑖𝑘 &lt; 1, the head implicitly contains an extra atom 𝑛𝑢𝑙𝑙 that does not appear in the body of any clause and whose annotation is 1 − ∑︀ 𝑛 𝑖 𝑘=1</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 1</head><label>1</label><figDesc>Worlds for Example 3. The probabilities of the worlds sum up to 1.</figDesc><table><row><cell>World id</cell><cell>World</cell><cell>𝑃 (𝑤)</cell></row><row><cell></cell><cell>strong_sneezing(bob):-flu(bob).</cell><cell></cell></row><row><cell>𝑤 1</cell><cell>strong_sneezing(bob):-hay_fever(bob).</cell><cell>0.3×0.2 = 0.06</cell></row><row><cell></cell><cell>flu(bob). hay_fever(bob).</cell><cell></cell></row><row><cell></cell><cell>strong_sneezing(bob):-flu(bob).</cell><cell></cell></row><row><cell>𝑤 2</cell><cell>moderate_sneezing(bob):-hay_fever(bob).</cell><cell>0.3×0.6=0.18</cell></row><row><cell></cell><cell>flu(bob). hay_fever(bob).</cell><cell></cell></row><row><cell>𝑤 3</cell><cell>strong_sneezing(bob):-flu(bob). flu(bob). hay_fever(bob).</cell><cell>0.3×0.2=0.06</cell></row><row><cell></cell><cell>moderate_sneezing(bob):-flu(bob).</cell><cell></cell></row><row><cell>𝑤 4</cell><cell>strong_sneezing(bob):-hay_fever(bob).</cell><cell>0.5×0.2=0.1</cell></row><row><cell></cell><cell>flu(bob). hay_fever(bob).</cell><cell></cell></row><row><cell></cell><cell>moderate_sneezing(bob):-flu(bob).</cell><cell></cell></row><row><cell>𝑤 5</cell><cell>moderate_sneezing(bob):-hay_fever(bob).</cell><cell>0.5×0.6=0.3</cell></row><row><cell></cell><cell>flu(bob). hay_fever(bob).</cell><cell></cell></row><row><cell>𝑤 6</cell><cell>moderate_sneezing(bob):-flu(bob). flu(bob). hay_fever(bob).</cell><cell>0.5×0.2=0.1</cell></row><row><cell>𝑤 7</cell><cell>strong_sneezing(bob):-hay_fever(bob). flu(bob). hay_fever(bob).</cell><cell>0.2×0.2=0.04</cell></row><row><cell>𝑤 8</cell><cell>moderate_sneezing(bob):-hay_fever(bob). flu(bob). hay_fever(bob).</cell><cell>0.2×0.6=0.12</cell></row><row><cell>𝑤 9</cell><cell>flu(bob). hay_fever(bob).</cell><cell>0.2×0.2=0.04</cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">Acknowledgments</head><p>Research funded by the Italian Ministerial grant PRIN 2022 "Probabilistic Declarative Process Mining (PRODE)", n. 20224C9HXA -CUP F53D23004240006, funded by European Union -Next Generation EU. Research partly funded by the Italian Ministry of University and Research through PNRR -M4C2 -Investimento 1.3 (Decreto Direttoriale MUR n. 341 del 15/03/2022), Partenariato Esteso PE00000013 -"FAIR -Future Artificial Intelligence Research" -Spoke 8 "Pervasive AI" -CUP J33C22002830006, funded by the European Union under the NextGeneration EU programme". This work was realized by Daniela Loreti with a research contract co-financed by the European Union (PON Ricerca e Innovazione 2014-2020 art. 24, comma 3, lett. a), della Legge 30/12/2010, n. 240 e s.m.i. e del D.M. 10/08/2021 n. 1062).</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Declare: Full support for loosely-structured processes</title>
		<author>
			<persName><forename type="first">M</forename><surname>Pesic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Schonenberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<idno type="DOI">10.1109/EDOC.2007.14</idno>
	</analytic>
	<monogr>
		<title level="m">11th IEEE International Enterprise Distributed Object Computing Conference</title>
				<imprint>
			<publisher>EDOC</publisher>
			<date type="published" when="2007">2007. 2007</date>
			<biblScope unit="page" from="287" to="287" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Pesic</surname></persName>
		</author>
		<idno type="DOI">10.6100/IR638413</idno>
		<title level="m">Constraint-based workflow management systems : shifting control to users</title>
				<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
		<respStmt>
			<orgName>Industrial Engineering and Innovation Sciences</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Phd thesis 1</note>
	<note>research tu/e / graduation tu/e. proefschrift</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Declarative event-based workflow as distributed dynamic condition response graphs</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">T</forename><surname>Hildebrandt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">R</forename><surname>Mukkamala</surname></persName>
		</author>
		<idno type="DOI">10.4204/EPTCS.69.5</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings Third Workshop on Programming Language Approaches to Concurrency and communication-cEntric Software, PLACES 2010</title>
				<editor>
			<persName><forename type="first">K</forename><surname>Honda</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Mycroft</surname></persName>
		</editor>
		<meeting>Third Workshop on Programming Language Approaches to Concurrency and communication-cEntric Software, PLACES 2010<address><addrLine>Paphos, Cyprus</addrLine></address></meeting>
		<imprint>
			<publisher>EPTCS</publisher>
			<date type="published" when="2010-03-21">21st March 2010. 2010</date>
			<biblScope unit="volume">69</biblScope>
			<biblScope unit="page" from="59" to="73" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Probabilistic declarative process mining</title>
		<author>
			<persName><forename type="first">A</forename><surname>Alman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">M</forename><surname>Maggi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Montali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Peñaloza</surname></persName>
		</author>
		<idno type="DOI">10.1016/J.IS.2022.102033</idno>
	</analytic>
	<monogr>
		<title level="j">Inf. Syst</title>
		<imprint>
			<biblScope unit="volume">109</biblScope>
			<biblScope unit="page">102033</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A statistical learning method for logic programs with distribution semantics</title>
		<author>
			<persName><forename type="first">T</forename><surname>Sato</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Logic Programming, Proceedings of the Twelfth International Conference on Logic Programming</title>
				<editor>
			<persName><forename type="first">L</forename><surname>Sterling</surname></persName>
		</editor>
		<meeting><address><addrLine>Tokyo, Japan</addrLine></address></meeting>
		<imprint>
			<publisher>MIT Press</publisher>
			<date type="published" when="1995">June 13-16, 1995. 1995</date>
			<biblScope unit="page" from="715" to="729" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">Specification and Verification of Declarative Open Interaction Models -A Logic-Based Approach</title>
		<author>
			<persName><forename type="first">M</forename><surname>Montali</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-642-14538-4</idno>
		<imprint>
			<date type="published" when="2010">2010</date>
			<publisher>Springer</publisher>
			<biblScope unit="volume">56</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Abduction with probabilistic logic programming under the distribution semantics</title>
		<author>
			<persName><forename type="first">D</forename><surname>Azzolini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Bellodi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ferilli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Riguzzi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Zese</surname></persName>
		</author>
		<idno type="DOI">10.1016/J.IJAR.2021.11.003</idno>
	</analytic>
	<monogr>
		<title level="j">Int. J. Approx. Reason</title>
		<imprint>
			<biblScope unit="volume">142</biblScope>
			<biblScope unit="page" from="41" to="63" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Process mining manifesto</title>
		<author>
			<persName><surname>Van Der Aalst</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-642-28108-2_19</idno>
	</analytic>
	<monogr>
		<title level="m">Business Process Management Workshops -BPM 2011 International Workshops</title>
				<editor>
			<persName><forename type="first">F</forename><surname>Daniel</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><surname>Barkaoui</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Dustdar</surname></persName>
		</editor>
		<meeting><address><addrLine>Clermont-Ferrand, France</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2011-08-29">August 29, 2011. 2011</date>
			<biblScope unit="volume">99</biblScope>
			<biblScope unit="page" from="169" to="194" />
		</imprint>
	</monogr>
	<note>Revised Selected Papers, Part I</note>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">Specification and Verification of Declarative Open Interaction Models -A Logic-based framework</title>
		<author>
			<persName><forename type="first">M</forename><surname>Montali</surname></persName>
		</author>
		<ptr target="http://amsdottorato.unibo.it/1829/" />
		<imprint>
			<date type="published" when="2009">2009</date>
			<pubPlace>alma</pubPlace>
		</imprint>
	</monogr>
	<note type="report_type">Ph.D. thesis</note>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Linear temporal logic and linear dynamic logic on finite traces</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">D</forename><surname>Giacomo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">Y</forename><surname>Vardi</surname></persName>
		</author>
		<ptr target="http://www.aaai.org/ocs/index.php/IJCAI/IJCAI13/paper/view/6997" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 23rd International Joint Conference on Artificial Intelligence</title>
				<editor>
			<persName><forename type="first">F</forename><surname>Rossi</surname></persName>
		</editor>
		<meeting>the 23rd International Joint Conference on Artificial Intelligence<address><addrLine>Beijing, China</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">August 3-9, 2013. 2013</date>
			<biblScope unit="page" from="854" to="860" />
		</imprint>
	</monogr>
	<note>IJCAI/AAAI</note>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Declarative process specifications: Reasoning, discovery, monitoring</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">D</forename><surname>Ciccio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Montali</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-031-08848-3_4</idno>
	</analytic>
	<monogr>
		<title level="m">Process Mining Handbook</title>
				<editor>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Carmona</surname></persName>
		</editor>
		<meeting>ess Mining Handbook</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="volume">448</biblScope>
			<biblScope unit="page" from="108" to="152" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Verifiable agent interaction in abductive logic programming: The SCIFF framework</title>
		<author>
			<persName><forename type="first">M</forename><surname>Alberti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Chesani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Gavanelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Lamma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Mello</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Torroni</surname></persName>
		</author>
		<idno type="DOI">10.1145/1380572.1380578</idno>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Comput. Log</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page">43</biblScope>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Probabilistic logic programs and their semantics</title>
		<author>
			<persName><forename type="first">E</forename><surname>Dantsin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Russian Conference on Logic Programming</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1991">1991</date>
			<biblScope unit="volume">592</biblScope>
			<biblScope unit="page" from="152" to="164" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Logic programming, abduction and probability -a top-down anytime algorithm for estimating prior and posterior probabilities</title>
		<author>
			<persName><forename type="first">D</forename><surname>Poole</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">New Generation Computing</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page" from="377" to="400" />
			<date type="published" when="1993">1993</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">The Independent Choice Logic for modelling multiple agents under uncertainty</title>
		<author>
			<persName><forename type="first">D</forename><surname>Poole</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">94</biblScope>
			<biblScope unit="page" from="7" to="56" />
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Probabilistic datalog: Implementing logical information retrieval for advanced applications</title>
		<author>
			<persName><forename type="first">N</forename><surname>Fuhr</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of the American Society for Information Science</title>
		<imprint>
			<biblScope unit="volume">51</biblScope>
			<biblScope unit="page" from="95" to="110" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Logic programs with annotated disjunctions</title>
		<author>
			<persName><forename type="first">J</forename><surname>Vennekens</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Verbaeten</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Bruynooghe</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-540-27775-0_30</idno>
	</analytic>
	<monogr>
		<title level="m">20th International Conference on Logic Programming (ICLP 2004)</title>
				<editor>
			<persName><forename type="first">B</forename><surname>Demoen</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">V</forename><surname>Lifschitz</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="volume">3131</biblScope>
			<biblScope unit="page" from="431" to="445" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">ProbLog: A probabilistic Prolog and its application in link discovery</title>
		<author>
			<persName><forename type="first">L</forename><surname>De Raedt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kimmig</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Toivonen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">20th International Joint Conference on Artificial Intelligence (IJCAI 2007)</title>
				<editor>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Veloso</surname></persName>
		</editor>
		<imprint>
			<publisher>AAAI Press</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="2462" to="2467" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">CP-logic: A language of causal probabilistic events and its relation to logic programming</title>
		<author>
			<persName><forename type="first">J</forename><surname>Vennekens</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Denecker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Bruynooghe</surname></persName>
		</author>
		<idno type="DOI">10.1017/S1471068409003767</idno>
	</analytic>
	<monogr>
		<title level="j">Theory and Practice of Logic Programming</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="245" to="308" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Well-definedness and efficient inference for probabilistic logic programming under the distribution semantics</title>
		<author>
			<persName><forename type="first">F</forename><surname>Riguzzi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Swift</surname></persName>
		</author>
		<idno type="DOI">10.1017/S1471068411000664</idno>
	</analytic>
	<monogr>
		<title level="j">Theory and Practice of Logic Programming</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page" from="279" to="302" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">The distribution semantics in probabilistic logic programming and probabilistic description logics: a survey</title>
		<author>
			<persName><forename type="first">E</forename><surname>Bellodi</surname></persName>
		</author>
		<idno type="DOI">10.3233/IA-221072</idno>
	</analytic>
	<monogr>
		<title level="j">Intelligenza Artificiale</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="page" from="143" to="156" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Nonground abductive logic programming with probabilistic integrity constraints</title>
		<author>
			<persName><forename type="first">E</forename><surname>Bellodi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Gavanelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Zese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Lamma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Riguzzi</surname></persName>
		</author>
		<idno type="DOI">10.1017/S1471068421000417</idno>
	</analytic>
	<monogr>
		<title level="j">Theory and Practice of Logic Programming</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="page" from="557" to="574" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">The IFF proof procedure for abductive logic programming</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">H</forename><surname>Fung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">A</forename><surname>Kowalski</surname></persName>
		</author>
		<idno type="DOI">10.1016/S0743-1066(97)00026-5</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Logic Programming</title>
		<imprint>
			<biblScope unit="volume">33</biblScope>
			<biblScope unit="page" from="151" to="165" />
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Guidelines for perioperative care in elective colorectal surgery: Enhanced recovery after surgery (eras®) society recommendations</title>
		<author>
			<persName><forename type="first">U</forename><forename type="middle">O</forename><surname>Gustafsson</surname></persName>
		</author>
		<idno type="DOI">10.1007/s00268-018-4844-y</idno>
	</analytic>
	<monogr>
		<title level="j">World Journal of Surgery</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="page" from="659" to="695" />
			<date type="published" when="2018">2018. 2019</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
