<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Scalable Approach to Probabilistic Compliance in Declarative Process Mining</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>MichelaVespa</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>ElenaBellod</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Engineering, University of Ferrara</institution>
          ,
          <addr-line>Via Saragat 1, Ferrara</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <fpage>9</fpage>
      <lpage>13</lpage>
      <abstract>
        <p>In the field of Process Mining, one of the main tasks is the assessment of compliance between actual process executions and a specific model, which is called compliance or conformance checking. Recently, a few works have started to propose probabilistic declarative process models, where the model is a set of constraints associated with a probability to model uncertainty, leading to the task of probabilistic conformance checking. In this paper, we propose to adopt PASCAL, an algorithm that learns Probabilistic Constraint Logic Theories in the learning from interpretation setting and that assigns to interpretations the probability of belonging to the positive class, for eficiently computing the probability of conformance of process traces against probabilistic declarative process models. We compare PASCAL with two other existing tools that perform probabilistic conformance checking. Results show that PASCAL achieves superior performance in terms of execution time, handling a much larger numbers of constraints and traces with a logarithmic computational complexity.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Declarative Process Mining</kwd>
        <kwd>Declare</kwd>
        <kwd>Probabilistic Integrity Constraints</kwd>
        <kwd>Probabilistic compliance</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Process Mining (PM) is a research field aimed at extracting structured knowledge from event logs
generated by information systems. It encompasses multiple activities, including the discovery of
process models from recorded event data, assessing compliance between actual process executions and
predefined models (calledconformance checking), and identifying opportunities for process improvement.
Procedural models, such as Petri net1s][or BPMN [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] diagrams, prescribe step-by-step sequences of
actions, explicitly defining the allowed paths and control flow of the process. On the other hand, when
a process model imposes constraints that must hold during process execution without enforcing a fixed
sequence of steps, it is calledeclarative. Declarative process modeling languages, suchDaesclare [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]
or Dynamic Condition Response (DCR) Graphs4[], focus on specifying rules and restriction, such as
which activities must eventually occur, which cannot occur together, or temporal dependencies, thus
enabling greater flexibility and adaptability in processes with high variability.
      </p>
      <p>Often, in real-world scenarios, process models do not capture rigid, deterministic behaviors but rather
describe guidelines or regulations that hold under uncertain conditions. For instance, if a patient is
admitted to an hospital to treat a specific condition, some guidelines might prescribe a counseling
session before undergoing surgery, but it is not strictly mandatory. This leads to a thorny issue for
the task of declarative conformance checkinhgo:w to evaluate compliance when the process model itself
is uncertain? Classical conformance checking techniques, which assume crisp constraints in process
models, are insuficient because they only produce a binary ”yes/no” answer: a trace is either complaint
or not with a given process model.</p>
      <p>To address the intrinsic uncertainty of processes, recent works have introduced the notion of
probability attached to process constraints into thDeeclare formalism, leading to the concept of probabilistic
conformance checking or probabilistic compliance.</p>
      <p>
        [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] and then [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] address this by introducing the ProbDeclare framework, which exteDndesclare
constraints with an associated probability. A probabilistic constraint is defined as a tri⟨p, l⋈e, ⟩ ,
where is an LTL formula representing a temporal constraint over tra⋈ceis,a comparison operator
(such as=, ≤, ≥), and  is a probability in the[
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ] interval. A log satisfies such a constraint if the total
probability mass of traces in the log that satis fyconforms to the condition⋈  . For instance, (, 0.7, ≥ )
means that a constraint is satisfied if the number of traces complaint with it is at leas≥t 70% of the
total traces in the log. This means the probability is interpreted witfhreaquentist meaning.
      </p>
      <p>
        Diferently from these works, in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] we introduced the concept of Probabilistic Declarative Process
Specification (PDS) starting from Probabilistic Logic Programming (PLP) and the Distribution Semantics
[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. A PLP program under that semantics defines a probability distribution over normal logic programs
called possible worlds. In a PLP program, logic formulas are assigned a probability, which is interpreted
as the probability of them appearing or not in a normal logic program. Similarly, the probability
of a Declare constraint is treated as the probability that such constraint will appear (or not) in a
possible process specification. The meaning of the probability attached to the constraint represehnotws
important or strong that constraint is.
      </p>
      <p>
        In addition, in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] we compute the probability of compliance using the algorithm presented in
[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], which however shows an exponential trend in execution time as the number of either crisp or
probabilistic constraints increases, as it is based on the enumeration of all possible wor1l0d]sp.r[oposed
a solution to overcome this problem, leveraging an Answer Set Programming tool and the
inclusionexclusion principle1[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], a mathematical technique used to calculate the probability of the union of
multiple events, to compute the total compliance probability without explicit enumeration of all possible
worlds.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] we introduced the PASCAL algorithm, which both learns Probabilistic Constraint Logic
Theories (PCLTs) in a learning from interpretations setting, and performs probabilistic classification of
interpretations, computing their probability to belong to the positive class. PCLTs are sets of integrity
constraints annotated with a probability.
      </p>
      <p>In this paper we propose to exploit PASCAL’s capabilities of performing probabilistic classification in
the context of process mining, by using it to compute the probability that an observed process trace (an
interpretation) is compliant (positive) with respect to a PDS (which is seen as a PCLT).</p>
      <p>
        We perform an experimental validation based on the execution time for computing the probability
of compliance, by comparing PASCAL with the results already presented7i]na[nd with [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], on a
PDS generated from a real-world medical guideline: we demonstrate PASCAL’s superiority in handling
a much larger number of probabilistic process constraints, thanks to an execution time which is
logarithmic in the number of constraints that are violated by a process trace, both in static scenario (a
process trace is available at once) and in a run-time scenario (events of a trace arrive one at a time).
      </p>
      <p>The paper is organized as follows: Sectio2nintroduces background on probabilistic Declarative
PM and Probabilistic Constraint Logic Theories, Sectio3ndescribes the application of PASCAL for
probabilistic conformance checking, Sectio4nreports the experimental evaluation and Secti5on
concludes the paper.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Background</title>
      <sec id="sec-2-1">
        <title>2.1. (Probabilistic) Declarative Process Models</title>
        <p>In Process Mining, atrace is defined as a sequence of events representing one completed execution
of a process instance. Each event is associated with an activity label and a timestamp that imposes a
total order on the events in the trace. Formally, a t raiscexpressed as = ⟨ 1,  2, … ,   ⟩, where each
event   corresponds to an occurrence of an activity at a specific point in time, and the timestamps
satisfy (  ) ≤ ( +1 ) for 1 ≤  &lt;  . An event log ℒ is a collection (multiset) of traces,
capturing the recorded executions of multiple process instances.</p>
        <p>
          Declare [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] is a declarative process modeling language equipped with the formal semantics given by
the LTL logic [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ], and provides a set of (graphical) constraint templates. This language was developed
specifically for business process modeling and ofers high-level, parameterized constraint templates
based on common business rules patterns. This formalism allows for the specification of behavioral
constraints such as a“ctivity a must eventually be followed byb” (known as response(a,b)), “activitya
must be the first activity of the process” (known asinit(a)), “activity a and b cannot occur in the same
trace” (known as not-coexistence(a,b) or “activity a cannot be executed” (known as absence(a)).
Definition 1 (Declarative Process Specification, from [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]). A Declarative Process Specification is
a triple  = ( Rep, Σ, ) , where Rep is a finite set of constraint templates c( 1, … ,   ) (with arity  ∈ ℕ ),
Σ is a finite set of activity names, and  is a finite set of instantiated constraints c( 1, … ,   ) with   ∈  .
        </p>
        <p>Usually the constraintcs( 1, … ,   ) in a DS are considered as being in logical conjunction.</p>
        <p>EachDeclare template maps to one or more logical formula,asllowing logical entailment to define
the concept ofcomplianceof a trace with respect to a constraint. Formally, a tra ceis compliant
with a constraint if and only if ⊧  (trace models or satisfies  ).</p>
        <p>Definition 2 (Compliance of a trace versus a Declarative Process Specification). A trace t is
compliant with a DS if it entails the conjunction of the formula s  corresponding to the  ∈  :  ⊧  1 ∧ … ∧  
where  is the cardinality of .</p>
        <p>
          Definition 3 (Probabilistic Constraint, from [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]). Given a finite, non-empty set Rep of constraint
templates and a set Σ of activity names 1, … ,   , a probabilistic constrainits a constraint templatec ∈
Rep instantiated over Σ that is annotated with a real number ∈ [0..1] (the probabilityof the constraint).
We will indicate a generic -th probabilistic constraint with the syntax:
        </p>
        <p>
          ∶∶ c ( 1, … ,   )
Definition 4 (Probabilistic Declarative Process Specification, from [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]). A Probabilistic
Declarative Process Specification PDS is a Declarative Process Specification DS where each constraintc ∈  is
a probabilistic constraint.
        </p>
        <p>We will refer to constraints annotated with probabi lity= 1 as crisp constraints.</p>
        <p>
          Definition 5 (Compliance of a trace versus a PDS [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]). Given a PDS, the probability of compliance
of a trace w.r.t. a PDS is defined as:
(, ) =
∑ (  ),
⊧ 
(1)
where   represents each deterministic process specification induced by the selection (or not) of probabilistic
constraints over the PDS, and(  ) is the probability associated with each deterministic specification.
        </p>
        <p>Taking inspiration from the Distribution Semantics, the idea in De5f. is to interpret the PDS as
defining a probability distribution over a set of standard (i.e., non-probabilistic) Declarative Specifications
(DS), each representing a possible world. These worlds are generated by selecting or excluding the
probabilistic constraintcs , and always keeping the crisp constraints in the DS. Each selection identifies a
specific DS, and its probability is computed as the product of the probabilities of the included constraints
and the complements (i.e.1, −   ) of the excluded ones. For a more detailed description of the connection
with the Distribution Semantics, see 7[].</p>
        <p>Example 1. Consider the PDS modeling a customer support process with the following constraints:
 = {
0.75 ∶∶ response(ticket_opened, ticket_resolved)
0.80 ∶∶ precedence(ticket_opened, assign_agent)
(c1)
(c2)
}
Constraint c1 requires that every opened ticket is eventually resolved (with probability 0.75), and constraint
c2 requires that the ticket’s assignment to an agent is preceded by the ticket opening (with probability 0.8).</p>
        <p>Consider the trace</p>
        <p>= ⟨ ticket_opened, assign_agent⟩,
which complies with the precedence constrainct2 since assignment happens after ticket opening, but violates
the response constraintc1 because the trace does not containticket_resolved.</p>
        <p>Therefore, after generating all DSs shown in Table 1, trace is compliant with 
3 and 
4, which do not
include constraintc1, and not compliant with  1 and  2. According to Def.5, the compliance probability
of  versus the PDS is:
(, ) = (</p>
        <p>Note that the probability distribution over the  is such that the sum of all probabilities(  ) always
equals 1.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Probabilistic Constraint Logic Theories</title>
        <p>
          [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] introduced Probabilistic Constraint Logic Theories (PCLTs), sets of integrity constraints annotated
with a probability that assign a probability of being positive to logical interpretations. Specifically, a
Probabilistic Integrity Constraint (PIC)   is of the form:
        </p>
        <p>
          ∶∶  1, … ,   → ∃( 1); … ; ∃(  ); ∀¬( 1); … ; ∀¬(  )
where  ∈ [
          <xref ref-type="bibr" rid="ref1">0, 1</xref>
          ] is a probability, each is a literal, and eac h and   is a conjunction of literals. We
call each∃(  ) a P disjunct and each∀¬(  ) an N disjunct.  1, … ,   is called the body of (()
) and
∃( 1); … ; ∃(  ); ∀¬( 1); … ; ∀¬(  ) is called the head o f ( ()
). The semicolon here represents a
disjunction. The variables that occur in the body are quantified universally with scope the PIC. The
variables in the head that do not occur in the body are quantified existentially if they occur in a P
disjunct and universally if they occur in an N disjunct, with scope the disjunct they occur in.
        </p>
        <p>A set of PICs is called a PCL T= { 1 ∶∶  1, … ,   ∶∶   }.</p>
        <p>The approach for assigning a semantics to PCLTs is inspired by the distribution semanti8c]s:[a PCLT
 defines a probability distribution on non-probabilistic ground constraint logic theories calwloerdlds,
such that for each grounding of the body of each IC, we include the IC in a world with probabil itaynd
we assume all groundings to be independent. The probability is to be interpreted as the strength of the
IC: a probability  means that the sum of the probabilities of the possible theories where a grounding
of the constraint is present i s  .</p>
        <p>
          [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] also presents an algorithm, PASCAL, for “ProbAbiliStic inductive ConstrAint Logic”, for learning
a PCLT according to the learning from interpretation setting of IL1P5][: while the latter learns a
theory that discriminates the positive from the negative interpretations, PASCAL learns a PCLT able to
compute the probability of the positive class given an interpretatioannd a background knowledgBeG.
This corresponds to the probability of a PCLTsatisfying  given BG, and is referred to as(⊕| ) . [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]
demonstrated that the computation of(⊕| ) depends only on the PICs that arenot satified in  , i.e.:
(⊕| ) =
∏(1 −   ) 

=1
where  is the number of groundings of the integrity constraint s  that are not satisfied in  . So,
computing the probability of the positive class given an interpretation(is log ) , where is the
maximum number of groundings, and computin g is polynomial in the database size.
(2)
(3)
3. Probabilistic Compliance Computation with PASCAL
In this paper we are interested in using the inference module of PASCAL that, given an intepretati,on
allows one to comput e(⊕| ) . In fact, computing the probability of compliance of a trace to a PDS is
equivalent to computing the probability of being positive of an interpretati own.r.t a PCLT: a set of
events in a trace can be seen as a logical interpretation of ground facts, while a PDS and a PCLT are
both composed of probabilistic constraints.
        </p>
        <p>The motivation behind the use of PASCAL is given by the fact that, as shown in Exampl1e, the
enumeration of all possibile DSs is exponential in the number of probabilistic constraints in the PDS,
hence the computation of the compliance probability is impractical with large PDSs.</p>
        <p>PASCAL is distributed as a SWI-Prolog pac1k. We show that a Prolog predicate of PASCAL can be
easily exploited to return the probability of compliance.</p>
        <p>In fact, the test_prob_pascal/6 predicate with the following interfac e : _ _(+ ∶
, + _ _  ∶ , −  ∶ , −   ∶ , − ∶  , − ∶ ) can be used to
compute (⊕| ) where is the input PCLT and  _ _  is the list of all interpretations that we
want to test against the PCLT.</p>
        <p>At the end of the execution, the predicatetest_prob_pascal/6 yields:  /   (numbers of
positive/negative traces resp.), the global log-likelihood of the test exampl e,sand the list
containing pairsProbability–Example: Example is a for a positive examplea, and \+(a) for a negative
example\+(a), and Prob is the probability ofa being positive.</p>
        <p>The PCLT  is given as a list of probabilistic integrity constraints written in the form:
rule(([(Sign, [Head])] ∶ −[Body]),Probability).
where[(Sign, [Head])] represents a list of disjuncts in the head of the rule, each annotated with a
sign (+ for positive,− for negative).[Body] is a list of literals. This corresponds to E2q..</p>
        <p>Note that a PCLT should perform discriminative learning, as its goal is to assign a probability of being
positive to interpretations by encoding a distribution on the class variable. This means the process
trace, represented as an interpretation, must include an extrapfoasc(tid) or neg(pos(id)) (whereid
is the identifier of the interpretation) to specify the class (positive or negative) of the interpretation. In
our case, a process trace is labeledpaoss, because the PASCAL algorithm returns the probability that a
given interpretation belongs to the positive class. By giving as input a Probabilistic Declarative Process
Specification ( PDS) in the  parameter and one process traceLinist_of_folds, we can directly obtain
the probability of the trace being positive from , which corresponds to its probability of
compliancecomp(, ) to the PDS.</p>
        <p>Example 2. Suppose we have to compute the probability of compliance as in Example1, but with the
inference module of PASCAL.</p>
        <p>The PDS  given as input is:
pclt([rule(([((+),[ticket_resolved(T2),T2&gt;T1])]:-[ticket_opened(T1)]), 0.75),</p>
        <p>rule(([((+),[(ticket_opened(T1),T1&lt;T2])]:-[assign_agent(T2)]), 0.8)]).</p>
        <p>
          The computation can be executed this way:
:- pclt(T),test_prob_pascal(T,[
          <xref ref-type="bibr" rid="ref1">1</xref>
          ],NPos,NNeg,LL,ExampleList).
where the second argument contains the trace’s identifier.
        </p>
        <p>The result is: ExampleList = [0.25-1], which indicates that trace1 has probability 0.25 of being
compliant to the PDS.</p>
        <p>This coincides with the result that we would obtain from Equation3, with interpretation  corresponding
to trace 1,  = 1,   = 1: the probability of compliance is 1 − 0.75 = 0.25, with   = 0.75 being the
probability of the violated constraintc1.
1https://eu.swi-prolog.org/pack/list?p=pascal</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>4. Experimental Results</title>
      <p>
        We conduct here a thorough comparison with our prior compliance evaluation based on t h e IFF
framework 9[] and with the solution presented in1[0] based on the inclusion-exclusion principle. Our
experiments assess the PASCAL and IFF across two scenarios, static (all events in a trace available
at once) and run-time (events arrive incrementally one at a time). We record the execution time for
computing the probability of compliance against probabilistic declarative process specifications with
IFF and PASCAL in subsections4.1 and 4.2. In subsection 4.3 we compare PASCAL with the results
published in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] in the static scenario.
      </p>
      <p>The testing environment was set up on a Linux machine equipped with an Int®elXeon® E5-2630v3
processor running at 2.40 GHz, with 250 GB of RAM. The Prolog stack was allocated the same amount
of memory to maximize performance and handle a large number of worlds. Each job was allowed a
maximum execution time of 8 hours.</p>
      <sec id="sec-3-1">
        <title>4.1. Static Compliance Evaluation</title>
        <p>To conduct the tests we generated several synthetic PDSs modeled on a healthcare guideline f1r6o]m. [
These PDSs always include 21 constraints (examples of which can be found 7in]),[but with a varying
proportion of crisp and probabilistic ones (for instance, 3 crisp constraints and 18 probabilistic). For
each test we used a single trace of 21 events corresponding to a patient, that was kept constant across
runs. Figure1 illustrates the comparison in execution times between IFF and PASCAL.</p>
        <p>The left graph shows the impact of increasing the number of probabilistic constraints from 1 to 7,
while keeping the number of crisp constraints fixed at 3, 6, 9, and 14 for diferent runs. The right graph
shows the execution time when increasing crisp constraints from 1 to 14, while keeping the number of
probabilistic constraints fixed at 2, 4, and 7.</p>
        <p>Results show that, in both cases, IFF execution time grows exponentially as more probabilistic
or crisp constraints are added (note the logarithmic scale on the graph). Each time the body of a
probabilistic integrity constraint is satisfied, two possible worlds are generated, one including the
constraint, one excluding it, causing an exponential enumeration equal2 towith  the number of
probabilistic constraints. In contrast, PASCAL shows constant execution times.</p>
      </sec>
      <sec id="sec-3-2">
        <title>4.2. Run-time Compliance Evaluation</title>
        <p>For this experiment we adapted PASCAL’s inference module to compute probabilistic compliance
incrementally, as new events arrive one at a time, by updating the trace and invoktiensgt_prob_pascal/6
after each event.</p>
        <p>Figure2 presents execution times of IF F and PASCAL when we test the compliance of a trace (from
the same medical domain) that grows up to 21 events at run-time, against the PDS of 21 probabilistic
constraints of the previous experiment. Again, I F F exhibits a rapid increase in memory usage beyond
14 probabilistic constraints, eventually exceeding the available memory. PASCAL shows a constant
behaviour. Table2 reports detailed execution times.</p>
        <p>Despite these limitations, IF F successfully handles up to 3,188,646 worlds within the available
memory. It can generate 209,952 explanations in approximately 88 seconds when testing compliance
against a model with 14 probabilistic constraints and no crisp constraints.</p>
      </sec>
      <sec id="sec-3-3">
        <title>4.3. Comparison with the inclusion-exclusion principle</title>
        <p>This section compares PASCAL performance with an alternative compliance checker based on Answer
Set Programming (ASP) presented in1[0] in a static scenario. Both tools take as input a probabilistic
declarative process specification and a collection of execution traces; each trace will be assigned a
probability that represents its degree of conformance with the specification.</p>
        <p>PASCAL’s computational cost is primarily influenced by the number of input traces rather than the
number of constraints (probabilistic or crisp) in the PDS or the trace length.</p>
        <p>The ASP-based approach relies on the inclusion-exclusion principle and requires considering subsets
of probabilistic constraints that are either satisfiedSA(T set) or violatedV(IO set) by the trace. These
subsets are used to calculate the probability of compliance because VIO and SAT are defined as the
union of non-disjoint events, so their probabilities can be computed by applying the inclusion-exclusion
principle. The computational complexity of this method is primarily determined by the number and
size of the subsets considered. Specifically, the complexity grows exponentially with respect to the
minimum between the VIO and SAT sets’ size, which represents the number of ”efective constraints”.</p>
        <p>We tried to make the comparison as fair as possible with the results presented in Table 10o]f, [
that we report in Table3 together with the execution times of PASCAL. As indicated in1[0], in the
worst case, the number of efective constraints is half of the number of probabilistic constraints so,
ifrstly, we doubled the number of constraints in our PDSs. Secondly, we conducted the experiments
on a laptop equipped with an AMD Ryzen 7 5800H processor running at 3.2 GHz; as we do not have
this information from 1[0], we decided to increase the number of probabilistic constraints in our PDSs
beyond 54 to clearly show that PASCAL has a constant execution time, slightly increasing when scaling
up at 200 constraints. The total number of diferent PDS generated was 11, composed of a number of
PIC in the range 42 - 200 as shown in Table3.</p>
        <p>Thirdly, as done in 1[0], we performed 50 runs of compliance verification for each PDS. However, we
did not change the constraints across the runs as changing tthyepe of constraints does not influence
PASCAL’s execution time, that only depends on the number of constraints. In each run, compliance for
a set of 10 diferent traces was verified 50 times. These traces are composed of a diferent number of
events, chosen arbitrarily, with length ranging from 2 to 14 events. As previously noted, trace length
(number of events per trace) does not impact inference time; instead, the only variable that afects
PASCAL’s performance is the number of traces in the log. The very low standard deviation observed is
likely due to minimal CPU fluctuations.</p>
        <p>
          [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] show that, in the worst case, complexity is of the order of(2 2 ), which explains why the
method can perform significantly better than a complete enumeration2o f subsets. However, PASCAL
has a lower complexity of the order (of log )
        </p>
        <p>with respect to the number of constraint s.
# Efective
Constraints
# Probabilistic</p>
        <p>Constraints</p>
        <p>Incl-Excl. Principle</p>
        <p>PASCAL
Avg Runtime</p>
        <p>Std Dev Avg Runtime</p>
        <p>Std Dev
21
22
23
24
25
26
27
42
44
46
48
50
52
54
60
80
100
200</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>5. Conclusions</title>
      <p>In this work we proposed to apply the inference module of the PASCAL algorithm for performing
probabilistic conformance checking in declarative process mining. PASCAL was designed, in a previous
work, to handle Probabilistic Constraint Logic Theories in the learning from interpretation settings:
such theories are seen here as probabilistic declarative process specifications (PDS), while the probability
of an interpretation being positive corresponds to the probability that a process trace complies with
a PDS both in static and run-time scenarios. We compared PASCAL with two other algorithms for
computing the probability of compliance, the IFF framework and an ASP-based tool. The results
demonstrate that PASCAL scales much better as the number of probabilistic constraints grows.
Research funded by the Italian Ministerial grant PRIN 2022 “Probabilistic Declarative Process Mining (PRODE)”,
n. 20224C9HXA - CUP F53D23004240006, funded by European Union – Next Generation EU.</p>
      <p>Declaration on Generative AI
The authors declare that in the planning, drafting, and/or revision of the work have made no use of generative AI
tools.
[16] U. O. Gustafsson, et al., Guidelines for perioperative care in elective colorectal surgery: Enhanced recovery
after surgery (eras®) society recommendations: 2018, World Journal of Surgery 43 (2019) 659–695.1d0o.i:
1007/s00268-018-4844-y.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>J. L.</given-names>
            <surname>Peterson</surname>
          </string-name>
          ,
          <article-title>Petri nets</article-title>
          ,
          <source>ACM Comput. Surv</source>
          .
          <volume>9</volume>
          (
          <year>1977</year>
          )
          <fpage>223</fpage>
          -
          <lpage>252</lpage>
          . URLh:ttps://doi.org/10.1145/356698.356702. doi:
          <volume>10</volume>
          .1145/356698.356702.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>O. M.</given-names>
            <surname>Group</surname>
          </string-name>
          ,
          <article-title>Business Process Model and Notation (BPMN), Version 2</article-title>
          .0,
          <year>2011</year>
          . URLh:ttps://www.bpmn.org/.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Pesic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Schonenberg</surname>
          </string-name>
          , W. M. van der Aalst,
          <article-title>Declare: Full support for loosely-structured processes</article-title>
          ,
          <source>in: 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC</source>
          <year>2007</year>
          ),
          <year>2007</year>
          , pp.
          <fpage>287</fpage>
          -
          <lpage>287</lpage>
          . doi:
          <volume>10</volume>
          .1109/EDOC.
          <year>2007</year>
          .
          <volume>14</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>T. T.</given-names>
            <surname>Hildebrandt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. R.</given-names>
            <surname>Mukkamala</surname>
          </string-name>
          ,
          <article-title>Declarative event-based workflow as distributed dynamic condition response graphs</article-title>
          , in: K.
          <string-name>
            <surname>Honda</surname>
            ,
            <given-names>A</given-names>
          </string-name>
          . Mycroft (Eds.),
          <source>Proceedings Third Workshop on Programming Language Approaches to Concurrency and communication-cEntric Software, PLACES</source>
          <year>2010</year>
          , Paphos, Cyprus,
          <source>21st March</source>
          <year>2010</year>
          , volume
          <volume>69</volume>
          ofEPTCS,
          <year>2010</year>
          , pp.
          <fpage>59</fpage>
          -
          <lpage>73</lpage>
          . URL: https://doi.org/10.4204/EPTCS.69.5. doi:
          <volume>10</volume>
          .4204/ EPTCS.69.5.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>F. M.</given-names>
            <surname>Maggi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Montali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Peñaloza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Alman</surname>
          </string-name>
          ,
          <article-title>Extending temporal business constraints with uncertainty</article-title>
          ,
          <source>in: Business Process Management: 18th International Conference, BPM</source>
          <year>2020</year>
          , Seville, Spain,
          <source>September 13-18</source>
          ,
          <year>2020</year>
          , Proceedings 18, Springer,
          <year>2020</year>
          , pp.
          <fpage>35</fpage>
          -
          <lpage>54</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Alman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. M.</given-names>
            <surname>Maggi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Montali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Peñaloza</surname>
          </string-name>
          ,
          <article-title>Probabilistic declarative process mining</article-title>
          ,
          <source>Inf. Syst</source>
          .
          <volume>109</volume>
          (
          <year>2022</year>
          )
          <article-title>102033</article-title>
          . doi:
          <volume>10</volume>
          .1016/J.IS.
          <year>2022</year>
          .
          <volume>102033</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Vespa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Bellodi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Chesani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Loreti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Mello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Lamma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ciampolini</surname>
          </string-name>
          ,
          <article-title>Probabilistic compliance in declarative process mining</article-title>
          , in: G. D.
          <string-name>
            <surname>Giacomo</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Fionda</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Fournier</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Ielo</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Limonad</surname>
          </string-name>
          , M. Montali (Eds.),
          <source>Proceedings of the 3rd International Workshop on Process Management in the AI Era (PMAI</source>
          <year>2024</year>
          )
          <article-title>co-located with 27th</article-title>
          <source>European Conference on Artificial Intelligence (ECAI</source>
          <year>2024</year>
          ), Santiago de Compostela, Spain, October
          <volume>19</volume>
          ,
          <year>2024</year>
          , volume
          <volume>3779</volume>
          ofCEUR Workshop Proceedings, CEUR-WS.org,
          <year>2024</year>
          , pp.
          <fpage>11</fpage>
          -
          <lpage>22</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3779</volume>
          /paper1.pd.f
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>T.</given-names>
            <surname>Sato</surname>
          </string-name>
          ,
          <article-title>A statistical learning method for logic programs with distribution semantics</article-title>
          , in: L.
          <string-name>
            <surname>Sterling</surname>
          </string-name>
          (Ed.),
          <string-name>
            <surname>Logic</surname>
            <given-names>Programming</given-names>
          </string-name>
          ,
          <source>Proceedings of the Twelfth International Conference on Logic Programming</source>
          , Tokyo, Japan, June 13-16,
          <year>1995</year>
          , MIT Press,
          <year>1995</year>
          , pp.
          <fpage>715</fpage>
          -
          <lpage>729</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>E.</given-names>
            <surname>Bellodi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gavanelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Zese</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Lamma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Riguzzi</surname>
          </string-name>
          ,
          <article-title>Nonground abductive logic programming with probabilistic integrity constraints</article-title>
          ,
          <source>Theory and Practice of Logic Programming</source>
          <volume>21</volume>
          (
          <year>2021</year>
          )
          <fpage>557</fpage>
          -
          <lpage>5741</lpage>
          .
          <year>0d</year>
          .oi: 1017/S1471068421000417.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Alviano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ielo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Ricca</surname>
          </string-name>
          ,
          <article-title>Eficient compliance computation in probabilistic declarative specifications</article-title>
          , volume
          <volume>3799</volume>
          ,
          <string-name>
            <surname>CEUR-WS</surname>
          </string-name>
          ,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S. S.</given-names>
            <surname>Sane</surname>
          </string-name>
          ,
          <article-title>The inclusion-exclusion principle</article-title>
          ,
          <source>Hindustan Book Agency, Gurgaon</source>
          ,
          <year>2013</year>
          , pp.
          <fpage>57</fpage>
          -
          <lpage>79</lpage>
          .
          <year>d1o0i</year>
          .:
          <volume>1007</volume>
          /
          <fpage>978</fpage>
          -93-86279-55-
          <issue>2</issue>
          _
          <fpage>4</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>F.</given-names>
            <surname>Riguzzi</surname>
          </string-name>
          , E. Bellodi,
          <string-name>
            <given-names>R.</given-names>
            <surname>Zese</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Alberti</surname>
          </string-name>
          , E. Lamma,
          <article-title>Probabilistic inductive constraint logic</article-title>
          ,
          <source>Machine Learning</source>
          <volume>110</volume>
          (
          <year>2021</year>
          )
          <fpage>723</fpage>
          -
          <lpage>754</lpage>
          .
          <year>doi1</year>
          :
          <fpage>0</fpage>
          .1007/s10994-020-05911-6.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>G. D.</given-names>
            <surname>Giacomo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. Y.</given-names>
            <surname>Vardi</surname>
          </string-name>
          ,
          <article-title>Linear temporal logic and linear dynamic logic on finite traces</article-title>
          , in: F. Rossi (Ed.),
          <source>IJCAI 2013, Proceedings of the 23rd International Joint Conference on Artificial Intelligence</source>
          , Beijing, China,
          <source>August 3-9</source>
          ,
          <year>2013</year>
          , IJCAI/AAAI,
          <year>2013</year>
          , pp.
          <fpage>854</fpage>
          -
          <lpage>860</lpage>
          . URL: http://www.aaai.org/ocs/index.php/IJCAI/ IJCAI13/paper/view/6997.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>C. D. Ciccio</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Montali</surname>
          </string-name>
          ,
          <article-title>Declarative process specifications: Reasoning, discovery, monitoring</article-title>
          , in: W.
          <string-name>
            <surname>M. P. van der Aalst</surname>
          </string-name>
          , J. Carmona (Eds.),
          <source>Process Mining Handbook, volume 448LoNf BIP</source>
          , Springer,
          <year>2022</year>
          , pp.
          <fpage>108</fpage>
          -
          <lpage>152</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -08848-3\_4.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>L. De Raedt</surname>
            ,
            <given-names>W. Van Laer</given-names>
          </string-name>
          ,
          <article-title>Inductive constraint logic</article-title>
          ,
          <source>in: Proceedings of the 6th International Conference on Algorithmic Learning Theory, ALT '95</source>
          , Springer-Verlag, Berlin, Heidelberg,
          <year>1995</year>
          , p.
          <fpage>80</fpage>
          -
          <lpage>94</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>