<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Validating Process Re nement with Ontologies</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Yuan Ren</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gerd Groener</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jens Lemcke</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tirdad Rahmani</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andreas Friesen</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yuting Zhao</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Je Z. Pan</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ste en Staab</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Aberdeen</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Koblenz-Landau</institution>
        </aff>
      </contrib-group>
      <abstract>
        <p>A crucial task in process management is the validation of process re nements. A process re nement is a process description in a more ne-grained representation. The re nement is either with respect to an abstract model or with respect to component's principle behaviour model. We de ne process re nement based on the execution set semantics. Predecessor and successor relations of the activities are described in an ontology in which the re nement is represented and validated by concept satis ability checking.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>The re nement of processes is a common task in process development. A generic
process describes the core functionality of an application. A re nement is a
transformation of a process into a more speci c process description which is
developed for a more concrete application and based on more detailed process
behaviour knowledge. A key question is whether a process re nement is valid, i.e.
the re ned process refers to the intended behaviour of the abstract process.</p>
      <p>We distinguish between horizontal and vertical re nement. A horizontal
re nement is a transformation from an abstract to a more speci c model. A
vertical re nement is a transformation from a principle behaviour model of a
software component to a concrete process model of business. Once a re ned
process model describes a concrete application process, the relationship to the
original generic process is not always obvious due to a number of possibly
complex re nement steps. A re nement step includes customisation, extensions
and compositions of processes. Therefore it is quite di cult to validate the
re nement of a process with respect to an abstract process model.</p>
      <p>The validation of a process re nement consists of checking model constraints
like execution order constraints. Modelling constraints for the re ned process has
to cover the constraints of the generic process behaviour and also constraints
which emerged during the re nement steps.</p>
      <p>In this paper, we use execution set semantics to analyse process re nements.
This set-based formalism accounts for a comparison of the process executions
of di erent processes. The comparison of process execution sets is then reduced
to the comparison of nite sets of predecessor and successor relations which
is realized by subsumption checking. We further use ALC ontologies to model
processes and process constraints, concerning the execution order conditions
and binding of tasks. Finally the re nement checking is reduced to concept
satis ability checking.</p>
      <p>In Section 2 we de ne the problem of process re nement with its graphical
syntax, semantics and mathematical foundation. The modelling of processes with
the corresponding execution constraints is demonstrated in Section 3, followed
by the re nement validation.
2
2.1</p>
    </sec>
    <sec id="sec-2">
      <title>Process Re nement</title>
      <sec id="sec-2-1">
        <title>Execution Set Semantics</title>
        <p>A process is a non-simple directed graph without multiple edges between two
vertices. A vertex is either an activity, a gateway, a start, or an end event.
As a graphical process syntax, we use the business process modelling notation
(BPMN)1 due to its wide industry adoption. As an example, in Fig. 1, (a) shows a
BPMN diagram of a simple ow which consists of two activities between the Start
and End nodes; (b) shows the usage of exclusive gateway ( ) indicating that
the ow can go through one and only one of its branches, and parallel gateway
( ) indicating that the ow should go through all of its branches; (c) shows
the usage of a loop indicating that the ow can go back to previous gateways
or activities. In block-based process modelling, gateways always appear in pairs.
Thus in this work we consider only pairwise gateways to comply such convention.
Also, we assume all the process models are valid by their own.</p>
        <p>
          As a prerequisite to validating, we de ne the correctness of process re nement
based on the execution set semantics [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. Brie y, the execution set of a process
P , denoted by ESP , is made up of all the valid paths between the Start and
the End in P . ESAbstract in Fig. 1a is f[AB]g: rst A, then B. Any two branches
behind an exclusive gateway ( ) cannot occur together in the same path, thus
ESComponent2 is f[E]; [EF]g (see Fig. 1d). When they are behind a parallel gateway
( ), any ordering between activities of the branches are valid, thus [a1a2b1b2],
[a1b1a2b2] and [a1b1b2a2] 2 ESSpecific (see Fig. 1b). The execution set of a process
containing a loop is in nite, e. g., ESComponent1 = f[C]; [CDCD]; : : :g (see Fig. 1c).
Consequently, enumerating the execution set is infeasible.
2.2
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>Process Re nement</title>
        <p>1 http://www.bpmn.org/</p>
        <p>To facilitate horizontal validation, the process architect has to declare which
activities of Fig. 1b implement which activity of Fig. 1a: hori(a1) = hori(a2) =
hori(a3) = A, hori(b1) = B, hori(b2) = B. While for vertical validation, the
process architect needs to link activities of Fig. 1b to service endpoints given in
Fig. 1c and d: vert(a1) = E, vert(a2) = vert(a3) = D, vert(b1) = F, vert(b2) = C.
In case such originality relations characterise the re nement, we assume they are
always correct in this work.</p>
        <p>Correct horizontal re nement. We say that a process Q is a correct horizontal
re nement of a process P if ESQ ESP after the following transformations.
1. Renaming. Replace all activities in each execution of ESQ by their
originators (function hori()). Renaming the execution set f[a1a2b1b2]; [a1b1b2a2];
[a1b1a2b2]; [a1a3]g of Fig. 1b yields f[AABB]; [ABBA]; [ABAB]; [AA]g.
2. Decomposition. Replace all pairs of duplicate activities by a single activity
in each execution of ESQ. For Fig. 1b this yields f[AB]; [ABA]; [ABAB]; [A]g.
As f[AB]g 6 f[AB]; [ABA]; [ABAB]; [A]g, Fig. 1b is a wrong horizontal re nement
of Fig. 1a. The cause is the potentially inverted order of AB by b1a2 or b2a2 in
Fig. 1b and that a3 can be the last activity in Fig. 1b, whereas A must always be
followed by B in Fig. 1a.</p>
        <p>Correct vertical re nement. We say that a process Q is a correct vertical
re nement of a process P if ESQ ESP after the following transformations.
1. Renaming. Replace all activities in each execution of ESQ by their
grounds (function vert()). Renaming the execution set f[a1a2b1b2]; [a1b1b2a2];
[a1b1a2b2]; [a1a3]g of Fig. 1b yields f[EDFC]; [EFCD]; [EFDC]; [ED]g.
2. Reduction. Remove all activities in each execution of ESQ that do not
appear in P . For our example, reduction with respect to Component 1 yields
f[DC]; [CD]; [D]g. Reduction with respect to Component 2 yields f[EF]; [E]g.
As f[C]; [D]; [CC]; [CD]; [DC]; [DD]; : : :g f[DC]; [CD]; [D]g and f[EF]; [E]g f[EF];
[E]g, Fig. 1b is a correct vertical re nement of both Component 1 and 2.</p>
        <p>As enumerating the execution sets for validation is infeasible, our solution
works with descriptions in ontology instead of using the execution sets themselves.
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Validation with Ontologies</title>
      <p>In this section, we present our solution of validating process re nement with
ontologies in detail. We accomplish the transformations from the last section by
reductions on the process diagram and execution sets, represent the re nement
with an ontology, and validate the re nement by concept satis ability checking.
3.1</p>
      <sec id="sec-3-1">
        <title>Re nement reduction</title>
        <p>Because the execution set may contain in nite number of executions, e.g.
EScomponent1, it's di cult to directly compare them. Therefore we reduce the
subsumption between in nitely large execution sets into subsumption between
nite predecessor and successor sets that are also obtained from the process
diagram and show that the transformations on the execution sets are equivalent
to transformations on the process diagrams or the predecessor and successor sets.</p>
        <p>As we can see from ESSpecific, the execution ordering relations between
branches of a parallel gateway are implicit in the original process. In order to
make them explicit, we rst reduce a process diagram by the following operation:
A parallel gateway ([B1jP1]; : : : ; [BnjPn]) is reduced to an exclusive gateway
B1 (P1; [B2jP2]; : : : ; [BnjPn]) ; : : : ; Bn ([B1jP1]; : : : ; [Bn 1jPn 1]; Pn) ,
where the notation [BjP ] represents a path with B the head and a subpath P
the tail.</p>
        <p>We repeatedly apply above operation until there's no parallel gateway in
the diagram. Such an iteration will always terminate due to the nite size of
the process. The resulting BPMN graph is called the Execution Diagram of P ,
denoted by EDP (see Fig. 2). An activity a 2 P may have multiple appearance
in EDP . We use one more subscript j to di erentiate them, i.e. a21, a22 w.r.t.
a2. This transformation may increase the size of the process model exponentially,
e.g. a pair of parallel gateways containing n branches of one activity will be
transformed into a pair of exclusive gateway containing n! branches of n activity.</p>
        <p>Obviously, given a process P , its execution set ESP is the set of all routes
between Start and End in its execution diagram EDP after replacing duplicated
activities with their original names.</p>
        <p>We further reduce EDP from a local perspective. For each activity appearance
a in EDP , its Predecessor Set P SP (a) is the set of all the activities going to a
through a direct link or a sequence containing only gateways. And its Successor
Set SSP (a) is the set of all the activities going from a through a direct link or a
sequence containing only gateways.</p>
        <p>Obviously, according to the de nition, for each x; y such that x 2 P SP (aj ),
y 2 SSP (aj ), [x; aj ; y] is a valid subpath of activities in EDP and thus [x; a; y]
is a valid subpath of activities in P . Because the EDP is nite, P SP (aj ) and
SSP (aj ) are also nite for any aj 2 P . Follow our example, P S(a31) = fa11g
and SS(a31) = fEndg.</p>
        <p>By obtaining these two sets for all the activities, the relation between two
execution sets can be characterised by the following theorem:</p>
        <sec id="sec-3-1-1">
          <title>Theorem 1. ESQ</title>
          <p>SSP (a).</p>
          <p>ESP i
8a 2 Q, P SQ(a)</p>
          <p>P SP (a) and SSQ(a)
Proof. (1) For the ! direction the lhs ESQ ESP holds. Given a 2 Q and
b 2 P SQ(a), we demonstrate that b 2 P SP (a) holds: [b; a] is a subpath of some
X 2 ESQ, from precondition it follows [b; a] is a subpath of X 2 ESP and the
de nition of P S leads to b 2 P SP (a). Correspondingly for c 2 SSQ(a), it follows
from de nition [a; c] is a subpath of some Y 2 ESQ and from precondition follows
[a; c] is a subpath of Y 2 ESP . The de nition of SS leads to c 2 SSP (a).
(2) For the direction the rhs holds and we demonstrate that ESQ ESP
follows. Consider an execution s 2 ESQ, s = a1; : : : ; an. Activity ai 1 is predecessor
of ai. For i = 2; : : : ; n the following implication holds: P SQ(ai) P SP (ai) )
[ai 1; ai] is a subpath of some X 2 ESP . For i = 1; : : : ; n 1 the following
implication holds: SSQ(ai) SSP (ai) ) [ai; ai+1] is a subpath of some Y 2 ESP ,
therefore sequentially connect the subpathes [a1; : : : ; an] 2 ESP holds.</p>
          <p>Therefore, we reduce the process re nement w.r.t. execution set semantics
into the subsumption checking of nite predecessor and successor sets. We then
show that the transformation operations of execution sets can be equivalently
performed on the original process diagrams and the predecessor and successor
sets obtained from them:
{ Reduction on the process diagrams has the same e ect on the execution
sets. That means, given a component model P and a process model Q, if we
reduce Q into Q0 by removing all the activities that do not appear in P , and
link their predecessors and successors directly, the resulting ESQ0 will be the
same as the reduction of ESQ with respect to P .
{ Renaming can also be directly performed on the process diagram, i.e.</p>
          <p>ESP [a ! A] = ESP [a!A]. Thus, the renaming can be performed on the
predecessor and successor sets as well, i.e. P SP (x)[a ! A] = P SP [a!A](x)
(SSP (x)[a ! A] = SSP [a!A](x)).
{ Decomposition can be done on the predecessor and successor sets as well.</p>
          <p>Particularly, ESQ0 ESP , where ESQ0 is ESQ after decomposition of all
the sequential x grouped into a single x, i 8a 6= x, P SQ(a) P SP (a),
SSQ(a) SSP (a) and 8x, P SQ(x) [ fxg P SP (x) and SSQ(x) [ fxg
SSP (x). This interprets the decomposition as, any x that should be grouped,
can go not only from predecessors of x, but also another appearance of x,
and can go not only to successors of x, but also another appearance of x.</p>
          <p>Thus, above analysis implies that:
{ For horizontal re nement, we can rst obtain the predecessor and successor
sets of activities, and then perform the Renaming and Decomposition on
these sets, and then check the validity.
{ For vertical re nement, we can rst perform the Reduction on processes,
then obtain the predecessor and successor sets and perform the Renaming
on these sets, and nally check the validity.</p>
          <p>In this paper, we perform Reduction directly on the process diagram and
obtain the predecessor and successor sets from its execution diagram, then
perform Renaming and Decomposition with ontologies and check the validity
with reasoning.
3.2</p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>Re nement representation</title>
        <p>In this section we represent the predecessor and successor sets of activities
with ontologies. In such ontologies, activities are represented by concepts. The
predecessors and successors relations are described by two roles from and to,
respectively. Composition of activities in horizontal re nement is described by
role compose. Grounding of activities in vertical re nement is described by role
groundedTo. The last two don't have essential logic di erence in the problem of
process re nement but have di erent semantics in the process model, so that we
distinguish between them. Then, for a set S containing predecessors or successors,
we de ne four operators for translations as follows:
De nition 1. :</p>
        <p>Pre-re nement-from operator Prfrom(S) = 8f rom: Fx2S x
Pre-re nement-to operator Prto(S) = 8to: Fy2S y
Post-re nement-from operator Psfrom(S) = dx2S 9f rom:x
Post-re nement-to operator Psto(S) = dy2S 9to:y</p>
        <p>The e ect of the above operators in re nement checking can be characterised
by the following theorem:</p>
        <sec id="sec-3-2-1">
          <title>Theorem 2. P SQ(a) P SP (a) i</title>
          <p>Disjoint(xjx 2 P [ Q) infers that Prfrom(P SP (a))uPsfrom(P SQ(a)) is satis
able.</p>
          <p>SSQ(a) SSP (a) i
Disjoint(xjx 2 P [ Q) infers that Prto(SSP (a))uPsto(SSQ(a)) is satis able.</p>
          <p>For sake of a shorter presentation, we only prove the rst part of the theorem.
The proof for the second part is appropriate to the rst part.</p>
          <p>Proof. (1) We demonstrate ! direction with a proof by contraposition.
The disjointness of activities holds. Supposed the rhs is unsatis able, i.e.
Prfrom(P SP (a))uPsfrom(P SQ(a)) is unsatis able. Obviously, both concept
definitions on its own are satis able, since Prfrom(P SP (a)) is just a de nition with
one all-quanti ed role followed by a union of (disjoint) concepts. The concept
de nition behind this expression is 8f rom: Fx2P SP (a) x which restricts the range
of f rom to all concepts (activities) of P SP (a). Psfrom(P SQ(a)) is a concept
intersection which only consists of existential quanti ers and the same f rom
role. This de nition is also satis able. Therefore the unsatis ability is caused by
the intersection of both de nitions. In Psfrom(P SQ(a)) the same role f rom is
used and the range is restricted by Prfrom(P SP (a)). Therefore the contradiction
is caused by one activity b 2 P SQ(a) which is not in P SP (a), but this is a
contradiction to the precondition P SQ(a) P SP (a).
(2) For the direction we assume that the rhs
Disjoint(xjx 2 P [ Q) infers that Prfrom(P SP (a))uPsfrom(P SQ(a)) is satis
able. For each activity b 2 P SQ(a) we show that b is also in P SP (a): b 2 P SQ(a)
and Psfrom(P SQ(a)) is satis able, the intersection contains the term 9f rom:b.
Since Prfrom(P SP (a)) is satis able and is also the range restriction of f rom, it
follows that b 2 P SP (a).</p>
          <p>This theorem indicates that the re nement checking of processes can be
reduced to the satis ability checking of concepts in an ontology. In the following,
we present the representation of horizontal re nement and vertical re nement.
Horizontal Re nement For conciseness of presentation, we always have a
pre-re nement process and a post-re nement process and we re ne one
activity in each step (this activity may have multiple appearance after conversion
to the execution diagram). We assume P the pre-re nement process, Q the
post-re nement process and z the activity being re ned. For each zj we de ne
component zj 9compose:zj. The simultaneous re nement of multiple activities
can be done in a similar manner of single re nement. Then we construct an
ontology OP !Q with following axioms:
1. for each activity a 2 Q and hori(a) = zj, a v 9compose:zj</p>
          <p>These axioms represent the composition of activities with concept
subsumptions, which realise Renaming in horizontal re nement. For example,
b11 v 9compose:B and a31 v 9compose:A.
2. for each a 2 Q and a is not re ned from any zj
a vPrfrom(P SP (a))[zj ! component zj],
a vPrto(SSP (a))[zj ! componennt zj],
These axioms represent the predecessor and successor sets of all the
unrened activities in the pre-re nement process. Because in the post-re nement
process, any activity re ned from zj will be considered as a subconcept
of component zj, we replace the appearance of each zj by corresponding
component zj. For example, Start v 8to:component A.
3. for each zj 2 P ,
component zj vPrfrom(P SP (zj) [ fcomponent zjg)[zj ! componennt zj],
component zj vPrto(SSP (zj) [ fcomponent zjg)[zj ! componennt zj],
These axioms represent the predecessor and successor sets of all the re ned
activities in the pre-re nement process. Due to the mechanism of
Decomposing, we add the corresponding component zj to their predecessor and
successor sets, and replace the zj with component zj for the same reason
as before. For example, component A v 8f rom:(Start t component A),
component A v 8to:(component B t component A), component B v
8f rom:(component A t component B) and component B v 8to:(End u
component B).
4. for each a 2 Q, a vPsfrom(P SQ(a)) and a vPsto(SSQ(a)),</p>
          <p>These axioms represent the predecessor and successor sets of all the activities
in the post-re nement process. For example, a31 v 9to:End, b11 v 9to:a21 u
9to:b22
5. for each zj 2 P , Disjoint(aja 2 Q and Hori(a) = zj)</p>
          <p>These axioms represent the uniqueness of all the sibling activities re ned
from the same zj. For example, Disjoint(a11; a21; a22; a23; a31).
6. Disjoint( all the activity in P , and all the component zj).</p>
          <p>This axiom represents the uniqueness of all the activities before re nement.
For example, Disjoint(Start; End; A; B; component A; component B).</p>
          <p>With above axioms, ontology OP !Q is a representation of the horizontal
re nement from P to Q by describing the predecessor and successor sets of
corresponding activities with axioms.</p>
          <p>Vertical Re nement Similar as horizontal re nement, assume we have principle
behaviour model P and a concrete process model Q, which is reduced w.r.t
P to eliminate ungrounded activities. Any activity in Q can be grounded to
some activity in P . Thus, after reduction, 8a 2 P; 9b 2 Q that b is grounded
to a, and vice versa. Therefore for each xj 2 P , we de ne grounded xj
9groundedT o:xj.Then we construct an ontology OP !Q with following axioms:
1. for each activity a 2 Q and vert(a) = xj, a v 9groundedT o:xj
These axioms represent the grounding of activities by concept subsumptions,
which realise the Renaming in vertical re nement. For example, a11 v
9groundedT o:E, b11 v 9groundedT o:F .
2. for each a 2 P
grounded a vPrfrom(P SP (a))[xj ! grounded xj],
grounded a vPrto(SSP (a))[xj ! grounded xj],
These axioms represent the predecessor and successor sets of all the activities
in the pre-re nement process. Due the mechanism of Renaming we replace
all the xj 2 P by grounded xj. Because Decomposition is not needed in
vertical re nement, we stick to the original predecessor and successor sets.
These axioms become the constraints on the activities in Q. For example,
grounded E v 8f rom:Start, grounded E v 8to:(grounded F t End).
3. for each a 2 Q, a vPsfrom(P SQ(a)) and a vPsto(SSQ(a)),</p>
          <p>These axioms represent the predecessor and successor sets of all the activities
in the post-re nement process. For example, a11 v 9f rom:Start, a11 v
9to:b11 u 9to:End. Notice that the ungrounded activities such as a31 have
been removed from the process so that End becomes a directed successor of
a11 after reduction.
4. for each xj 2 P , Disjoint(aja 2 Q and vert(a) = xj)</p>
          <p>These axioms represent the uniqueness of all the sibling activities re ned
from the same xj.
5. Disjoint(all the grounded xj).</p>
          <p>This axiom represents the uniqueness of all the activities before re nement.
For example, Disjoint(Start; End; grounded E; grounded F ).</p>
          <p>Both the horizontal and vertical re nement can be represented in DL in a
linear complexity. The language is ALC. It's worth to mention that f rom and to
do not need to be inverse roles because the unsatis ability of activities is caused
by the contradiction of universal and existential restrictions.</p>
          <p>With above axioms, ontology OP !Q is a representation of the re nement
from P to Q by describing the predecessor and successor sets of corresponding
activities with axioms.
3.3</p>
        </sec>
      </sec>
      <sec id="sec-3-3">
        <title>Concept satis ability checking</title>
        <p>Follow from the theorems and de nitions presented before, the relation between
the ontology OP !Q and the validity of the re nement from P to Q is characterised
by the following theorem:
Theorem 3. The route contains activity a in Q is invalid in the re nement
from P to Q, i OP !Q j= a v ?.</p>
        <p>Proof. For each a in Q the ontology OP !Q contains the axioms
a vPsfrom(P SQ(a)) and a vPsto(SSQ(a)). The axioms a vPrfrom(P SQ(a))
and a vPrto(SSQ(a)) are derived from the axioms (item 1,2). Depending on
the re nement either the axioms a v 9groundedT o:xj and grounded xj
9groundedT o:xj or a v 9compose:zj and component zj 9compose:zj are in
the ontology. (1) For the ! direction the lhs holds, we demonstrate that a is
unsatis able. Since a is invalid either P SQ(a) 6 P SP (a) or SSQ(a) 6 SSP (a).
From Theorem 3 it follows that either Prfrom(P SP (a))uPsfrom(P SQ(a)) or
Prto(SSP (a))uPsto(SSQ(a)) is unsatis able and therefore a is unsatis able since
a is subsumed. (2) The direction is proved by contraposition. Given a is
unsatis able in OP !Q. Assumed a is valid in the re nement then P SQ(a) P SP (a)
and SSQ(a) SSP (a) holds. From Theorem 3 the satis ability of Prto(SSP (a)),
Prfrom(P SP (a)), Psfrom(P SQ(a)) and Psto(SSQ(a)) follows which leads to a
contradiction to the satis ability of a.</p>
        <p>This theorem has two implications:
1. The validity of a re nement can be checked by the satis ability of all the
name concepts in an ontology;
2. The activities represented by unsatis able concepts in the ontology are the
source of the invalid re nement.</p>
        <p>The complexity of such concept satis ability checking is, according to the
expressive power, ExpTime. we check the satis ability of the concepts to validate
the process re nement. Every unsatis able concept is either an invalid re nement
or relating to an invalid re nement.</p>
        <p>For example, in the horizontal re nement ontology, a31 v 9compose:A,
component A 9compose:A and component A v 8to:(component B t
component A) implies that a31 v 8to:(component B t component A). However
a31 v 9to:End, and Disjoint(End; component A; component B) indicates that
a31 is unsatis able. Therefore the top route [a11; a31] in the speci c process
model is invalid, so as the entire re nement.</p>
        <p>While in the vertical re nement ontology, it's easy to infer that all the
concepts are satis able. Therefore, the process model does comply to the principle
behaviour models.</p>
        <p>Helped by our analysis, the line of business manager and process architect
remodel their processes (Fig. 3). Now, the execution set of Fig. 3a is f[AB]; [A]g.
Renaming of Fig. 3b's execution set f[a1a2b1b2]; [a1a3]g yields f[AABB]; [AA]g.
After decomposition, we conclude that Fig. 3b correctly re nes the process in
Fig. 3a because f[AB]; [A]g f[AB]; [A]g. As for comparing with the component
models, renaming yields f[EDFC]; [ED]g. After reduction with respect to C1 and
C2, we conclude that Fig. 3b correctly grounds on C1 and C2 because f[C]; [D];
[CC]; [CD]; [DC]; [DD]; : : :g f[DC]; [D]g and f[EF]; [E]g f[EF]; [E]g.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Related Works and Conclusion</title>
      <p>
        Annotations to process models for service behaviour and interaction is described
in [
        <xref ref-type="bibr" rid="ref11 ref12 ref4">4, 12, 11</xref>
        ]. However, process re nement and model validation is not considered.
      </p>
      <p>
        Other models use mathematical formalisms to describe and compare
concurrent system behaviour. In [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] a process algebra is described in order to analyse
equivalence. The analysed equivalence (trace equivalence) does not distinguish
between deterministic and non-deterministic choices. Semantics for BPMN
models in process algebra and process re nements are outlined in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. The re nement
is validated with model checker.
      </p>
      <p>
        Calculus of communication systems and transition systems is used in other
works like in [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ]. The -calculus is a rst order calculus for concurrent systems.
The bisimulation (equivalence relationship between transition systems) for the
-calculus is described in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] and in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] higher-order process calculus is used
to analyse bisimulation. Some of these approaches also apply the execution set
semantics from [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], but without re nement validation.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] actions and services are described in DL. Actions contain pre- and
post-conditions. As inference problems, the realizability of a service, subsumption
relation between services and service e ect checking is analysed. Services are
also described with DL in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. The reasoning tasks are checking of pre- and
post-conditions. The focus of this work is the reasoning complexity.
      </p>
      <p>
        The DL DLR is extended with temporal operators in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Based on this
extension, query containment for speci ed (temporal) properties is analysed. In
[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] the DL ALC is extended with the temporal logics LTL and CTL. Still, neither
of them considers process modelling and re nements.
      </p>
      <p>
        In this paper, we have devised a method to checking process re nement w.r.t.
execution set semantics. We restricted our solution to a commonly used subset
of BPMN [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], which we may extend in the future. We perform a topological
transformation of process models and translate them into ALC ontologies. The
re nement checking can be reduced to concept unsatis ability checking. In the
future, we will implement and evaluate our approach, and extend it to deal with
more constraints.
      </p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgements</title>
      <p>This work has been supported by the European Project Marrying Ontologies
and Software Technologies (MOST ICT 2008-216691).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>A.</given-names>
            <surname>Artale</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Franconi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Wolter</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Zakharyaschev</surname>
          </string-name>
          .
          <article-title>A Temporal Description Logic for Reasoning over Conceptual Schemas and Queries</article-title>
          .
          <source>Lecture notes in computer science</source>
          , pages
          <volume>98</volume>
          {
          <fpage>110</fpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>F.</given-names>
            <surname>Baader</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Lutz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Milicic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Sattler</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Wolter</surname>
          </string-name>
          .
          <article-title>A Description Logic Based Approach to Reasoning about Web Services</article-title>
          .
          <source>In Proceedings of the WWW 2005 Workshop on Web Service Semantics (WSS2005)</source>
          , Chiba City, Japan,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>A.J.</given-names>
            <surname>Cowie</surname>
          </string-name>
          .
          <article-title>The Modelling of Temporal Properties in a Process Algebra Framework</article-title>
          .
          <source>PhD thesis</source>
          , University of South Australia,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>Markus</given-names>
            <surname>Fronk</surname>
          </string-name>
          and
          <string-name>
            <given-names>Jens</given-names>
            <surname>Lemcke</surname>
          </string-name>
          .
          <article-title>Expressing semantic Web service behavior with description logics</article-title>
          .
          <source>In Semantics for Business Process Management Workshop at ESWC</source>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>C.</given-names>
            <surname>Lutz</surname>
          </string-name>
          and
          <string-name>
            <given-names>U.</given-names>
            <surname>Sattler</surname>
          </string-name>
          .
          <article-title>A Proposal for Describing Services with DLs</article-title>
          .
          <source>In Proceedings of the 2002 International Workshop on Description Logics</source>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>C.</given-names>
            <surname>Lutz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Wolter</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Zakharyaschev</surname>
          </string-name>
          .
          <article-title>Temporal description logics: A survey</article-title>
          .
          <source>In Temporal Representation and Reasoning</source>
          ,
          <year>2008</year>
          . TIME'
          <volume>08</volume>
          . 15th International Symposium on, pages
          <volume>3</volume>
          {
          <fpage>14</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>R.</given-names>
            <surname>Milner</surname>
          </string-name>
          .
          <source>A Calculus of Communicating Systems</source>
          . Springer LNCS,
          <year>1980</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>R.</given-names>
            <surname>Milner</surname>
          </string-name>
          . Communication and Concurrency. Prentice Hall,
          <year>1989</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>R.</given-names>
            <surname>Milner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Parrow</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Walker</surname>
          </string-name>
          .
          <source>A Calculus of Mobile Processes. Information and Computation</source>
          , pages
          <volume>41</volume>
          {
          <fpage>77</fpage>
          ,
          <year>1992</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>Davide</given-names>
            <surname>Sangiorgi</surname>
          </string-name>
          .
          <article-title>Bisimulation for Higher-Order Process Calculi</article-title>
          .
          <source>Information and Computation</source>
          ,
          <volume>131</volume>
          :
          <fpage>141</fpage>
          {
          <fpage>178</fpage>
          ,
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. I.
          <string-name>
            <surname>Weber</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <article-title>Ho mann, and</article-title>
          <string-name>
            <given-names>J.</given-names>
            <surname>Mendling</surname>
          </string-name>
          .
          <article-title>Semantic Business Process Validation</article-title>
          .
          <source>In Proc. of International workshop on Semantic Business Process Management</source>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. I. Weber, Joerg Ho mann, and Jan Mendling. Beyond Soundness:
          <article-title>On the Correctness of Executable Process Models</article-title>
          .
          <source>In Proc. of European Conference on Web Services (ECOWS)</source>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>P.Y.H. Wong</surname>
            and
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Gibbons</surname>
          </string-name>
          .
          <article-title>A process-algebraic approach to work ow speci cation and re nement</article-title>
          .
          <source>Lecture Notes in Computer Science</source>
          ,
          <volume>4829</volume>
          :
          <fpage>51</fpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>George</surname>
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Wyner</surname>
            and
            <given-names>Jintae</given-names>
          </string-name>
          <string-name>
            <surname>Lee</surname>
          </string-name>
          .
          <article-title>De ning specialization for process models</article-title>
          .
          <source>In Organizing Business Knowledge: The MIT Process Handbook, chapter 5</source>
          , pages
          <fpage>131</fpage>
          {
          <fpage>174</fpage>
          . MIT Press,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <article-title>Michael zur Muehlen and Jan Recker. How much language is enough? Theoretical and practical use of the Business Process Modeling Notation</article-title>
          . In Zohra Bellahsene and Michel Leonard, editors,
          <source>CAiSE</source>
          , volume
          <volume>5074</volume>
          of Lecture Notes in Computer Science, pages
          <volume>465</volume>
          {
          <fpage>479</fpage>
          . Springer,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>