<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>On the Behavioural Dimension of Correspondences between Process Models</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Matthias Weidlich</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mathias Weske</string-name>
          <email>weskeg@hpi.uni-potsdam.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Hasso-Plattner-Institute, University of Potsdam</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Enterprise-wide process harmonisation initiatives require the analysis of commonalities of existing business process models. That is, correspondences between activities are identified, such that the behavioural equivalence of the models can be assessed thereafter. Due to refinements, these correspondences can relate sets of activities to each other, i.e., there are complex 1:n or n:m correspondences. In this paper, we discuss how notions of behaviour inheritance can be applied in this context. In addition, we elaborate on how structural information can be leveraged to identify violations of behaviour inheritance.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>Enterprises model their business processes for various purposes, e.g.,
documentation of business operations, staff planning, or process automation. As a
consequence, process models might show deviations in terms of level of detail, control
flow, and activity labels, even if they capture a common real-world process.</p>
      <p>
        In order to detect inconsistencies between related process models, their
commonalities and differences have to be identified [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. As a first step, this requires
the identification of activities that correspond to each other. Note that this
might not imply semantic equivalence of the activities (e.g., ‘Get Quote’ might
correspond to ‘Enter Quote Details’ although both activities are not semantically
equivalent). Such correspondences can be elementary 1:1 matches between
activities, or complex 1:n (or even n:m) matches due to refinements of activities.
Correspondences may stem from a system analyst inspecting the models or from
automatic matching, cf., [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ]. As a second step, the behavioural equivalence of
process models aligned by correspondences is assessed to detect inconsistencies
and guide process harmonisation efforts.
      </p>
      <p>
        Although not in a straight-forward manner, existing notions of behaviour
inheritance might be applied for this purpose even in the presence of complex
correspondences between two process models. However, we argue that certain
violations of behaviour inheritance can be detected structurally. In this paper, we
show that a structural decomposition of a sound free-choice WF-system might
provide valuable hints at correspondences that violate behaviour inheritance. In
particular, we focus on the notion of projection inheritance in the context of
trace semantics, i.e., an adapted version of the trace equivalence criterion [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>Get Project
Details (A)</p>
      <p>C1
Enter Project
Class (1)</p>
      <p>Request Offer from</p>
      <p>Subcontractor (B)
Update Request for Offer (C)</p>
      <p>Sign Precontract with</p>
      <p>Subcontractor (D)</p>
      <p>Sign Internal Transfer Contract (E)
Create Project (G)</p>
      <p>Provide Technical Presentation (I)
Establish
Contact (F)</p>
      <p>Get Detailed
Requirements (H)</p>
      <p>ClarifIyssRueeqsu(irJe)ment</p>
      <p>Close Deal</p>
      <p>(K)
C2</p>
      <p>C3</p>
      <p>C4
Get Details from
Marketing Module (3)
Get Details from
PreSales Module (4)</p>
      <p>Load</p>
      <p>Template (5)
Enter Best Subcontractor</p>
      <p>Offer (2)</p>
      <p>Enter Project
Requirements (6)</p>
      <p>
        Attach
Contracts (7)
(a)
(b)
We recall basic definitions for workflow (WF-) systems based on [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ]. A net is a
tuple N = (P, T, F ) with P and T as finite disjoint sets of places and transitions,
and F ⊆ (P × T ) ∪ (T × P ) as the flow relation. We write X = (P ∪ T ) for all
nodes and F + for the transitive closure of F . For a node x ∈ X, •x := {y ∈
X | (y, x) ∈ F }, x• := {y ∈ X | (x, y) ∈ F }, inN (x) := {(n, x) | n ∈ •x}, and
outN (x) := {(x, n) | n ∈ x•}. A net N is free-choice, iff ∀ p ∈ P with |p • | &gt; 1
holds •(p•) = {p}. N is conntected, if ∀ x1, x2 ∈ X [ x1F +x2 ∧ x2F +x1 ]. A
workflow (WF-) net is a net N = (P, T, F ), such that there is exactly one place
i ∈ P with •i = ∅, exactly one place o ∈ P with o• = ∅, and the short-circuit net
N 0 = (P, T ∪ {tc}, F ∪ {(o, tc), (tc, i)}) is connected. M : P 7→ N is a marking of
N and Mp denotes the marking that puts a token on p and no token elsewhere
for a place p ∈ P . Given a WF-net N with Mi as its initial marking, we refer
to the tuple S = (N, Mi) as a WF-system and assume N to be defined always
as N = (P, T, F ). We do not recall semantics for WF-systems but refer to [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ].
(N, Mi) is sound, iff the short-circuit system (N 0, Mi) is live and bounded [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>A
P5
C P7</p>
      <p>P8 D</p>
      <p>P9 E
G P10</p>
      <p>R1 P12
F</p>
      <p>P11 H</p>
      <p>I</p>
      <p>P14 J
B1
(b)
P4</p>
      <p>P5
B2</p>
      <p>B3</p>
      <p>P10 R1 P14
P6 P7 P8 P9 P11 P12 P13</p>
      <p>
        We apply the structural decomposition technique introduced as the RPST
in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] to parse a WF-system into a hierarchy of fragments with a single entry node
and a single exit node. Then, the RPST is a containment hierarchy of canonical
fragments of the system that can be computed in linear time.
      </p>
      <p>Definition 1 (Fragments, RPST). Let N = (P, T, F ) be a WF-net with initial
place i and final place o.</p>
      <p>
        – A node x ∈ X0 of a connected subnet N 0 = (P 0, T 0, F 0) of a net N is a
boundary node, if ∃ e ∈ inN (x) ∪ outN (x) [ e ∈/ F 0 ]. If x is a boundary node,
it is an entry of N 0, if inN (x) ∩ F 0 = ∅ or outN (x) ⊆ F 0, or an exit of N 0,
if outN (x) ∩ F 0 = ∅ or inN (x) ⊆ F 0.
– Any connected subnet ω of N , is a fragment, if it has exactly two boundary
nodes, one entry and one exit.
– A fragment ω = (Pω, Tω, Fω) is canonical in a set of fragments Ω of N , iff
∀ γ = (Pγ, Tγ, Fγ) ∈ Ω [ ω 6= γ ⇒ (Fω ∩ Fγ = ∅) ∨ (Fω ⊂ Fγ) ∨ (Fγ ⊂ Fω) ].
The RPST of N is a tuple RN = (Ω, χ, t), where:
– Ω is a set of all canonical fragments of N ,
– χ : Ω → P(Ω) is a function that assigns to fragment its child fragments,
– t : Ω → {T, P, B, R} is a function that assigns a type to a fragment.
This section clarifies the notion of a correspondence between two WF-systems.
Following on the terminology known from the domain of schema matching or
ontology matching [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], a correspondence is defined by two sets of transitions of
the WF-systems.
      </p>
      <p>Definition 2 (Correspondence). Let (N 0, Mi0) and (N 00, Mi00) be two
WFsystems. The correspondence relation ∼ ⊆ ℘(T 0)×℘(T 00) associates corresponding
transitions of both systems to each other. Let T1 ⊆ T 0 and T2 ⊆ T 00. If T1 ∼ T2
then (T1, T2) is referred to as a correspondence. (T1, T2) is called elementary, iff
|T1| = |T2| = 1, and complex otherwise.</p>
      <p>Further on, we discuss the structural relation between multiple correspondences
between two systems by means of two structural properties. First, correspondences
might be overlapping, i.e., they share a transition in at least one of the
WFsystems.</p>
      <p>Definition 3 (Overlapping Correspondences). Let (N 0, Mi0) and (N 00, Mi00)
be two WF-systems and C1 = (T1, T2) and C2 = (T3, T4) two correspondences
between them, such that T1, T3 ⊆ T 0 and T2, T4 ⊆ T 00. C1 and C2 are called
overlapping, iff T1 ∩ T3 6= ∅ or T2 ∩ T4 6= ∅.</p>
      <p>Regarding the example in Fig. 1, we see that all
correspondences are non-overlapping.</p>
      <p>Second, we provide an additional property for the
structural relation between two correspondences, which
is based on the RPST. Here, we have the assumption Fig. 3. Pre-processing
that all transitions that are part of a correspondence have a single incoming and
single outgoing flow arc. If not, a behaviour preserving pre-processing is done, cf.,
Fig. 3. Note that the systems in Fig. 1 are pre-processed. The property requires
that two correspondences are not overlapping in terms of their lowest enclosing
fragments in the RPST.</p>
      <p>Definition 4 (Structurally Independent Correspondences). Let (N 0, Mi0)
and (N 00, Mi00) be two WF-systems, RN0 = (Ω0, χ0, t0) the RPST of N 0, and C1 =
0
(T1, T2) and C2 = (T3, T4) with T1, T3 ⊆ T 0 and T2, T4 ⊆ T 00 two correspondences.
C1 and C2 are structurally independent in N 0, iff |T1| = |T3| = 1 or ∀ ω =
(Pω, Tω, Fω) ∈ Ω0 [ T1 ∩ Tω 6= ∅ ∧ T3 ∩ Tω 6= ∅ ⇒ T1 ⊆ Tω ∧ T3 ⊆ Tω ].
Our example in Fig. 1 illustrates correspondences that are structurally
independent in one or both systems. For instance, the pair of correspondences C1
and C2 is independent in model (a), as every fragment containing transition A
and either B or C contains all three transitions, cf., Fig. 2. However, the very
same pair of correspondences is not independent in model (b), as there is a bond
fragment that represents a subnet comprising transitions 3, 4, and 5, but which
does not contain transition 1. In contrast, C1 and C4 are an example for a pair
of correspondences that are structurally independent in both models (a) and (b).
4</p>
    </sec>
    <sec id="sec-2">
      <title>Behavioural Analysis of Correspondences</title>
      <p>Based on the structural properties of correspondences introduced in the previous
section, this section discusses behavioural analysis of correspondences. First, we
elaborate on the behavioural ambiguity of overlapping correspondences. Second,
the application of common notions of behaviour inheritance in the context of
complex correspondences is discussed. Subsequently, we introduce heuristics to detect
violations of behaviour inheritance for structurally independent correspondences.</p>
      <p>Overlapping Correspondences. Overlapping
correspondences raise various questions regarding their A B
intended meaning. That is, it is unclear whether an
occurrence of a transition that is part of both overlap- A1 X
ping correspondences should be considered for one or
for both correspondences. For instance, consider the Fig. 4. Overlapping
systems depicted in Fig. 4. Here, the trace A1, X in the Correspondences
lower system might correspond to both, the occurrence
of transition A only, or the occurrence of both transitions, A and B, in the upper
system. Thus, the semantic ambiguity of such overlapping correspondences has
to be addressed as a prerequisite for any behavioural analysis.</p>
      <p>
        Behaviour Inheritance. In order to judge about behaviour equivalence
in the context of correspondences between process models, first and foremost,
the treatment of transitions without counterparts has to be addressed. To this
end, two notions of behaviour inheritance can be distinguished, i.e., protocol
inheritance or projection inheritance, cf., [
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ]. That is, transitions in one model
that are without counterpart in the second model are either blocked (protocol
inheritance) or hidden (projection inheritance). Although these notions have
been defined based on branching bisimulation, they can easily be transferred to
trace-based behaviour analysis. It is worth to mention that the term inheritance
is slightly misleading in our context as it implies a directed relation between two
models (one model is a subclass of the other model). As illustrated by our example
in Fig. 4, such a directed relation might not exist between aligned models.
      </p>
      <p>The choice between protocol inheritance or projection inheritance is
independent of the structural characteristics of the correspondences. However, we focus
on projection inheritance in the context of this paper. In particular, this notions
seems to be more appropriate when comparing models that focus on different
modelling perspectives (e.g., organisational vs. technical) as intermediate process
steps that are mandatory in one perspective may be without counterpart in the
other model. For instance, transition F of model (a) in Fig. 1 is not part of any
correspondence even though its execution is required for completion of process
(a). Thus, any notion of protocol inheritance would be bound to failure.</p>
      <p>In the general case, projection inheritance in terms of trace semantics between
two models is assessed as follows. The language of both process models is
checked for equivalence, when all correspondences are resolved. In case of 1:1
elementary correspondences this resolution is straightforward as an occurrence of
one transition in one model corresponds to the occurrence of another transition in
the other model. For the case of complex correspondences, this resolution involves
a replacement of all valid subtraces involving the transitions of the correspondence
in the one model with all valid subtraces comprising the corresponding transitions
in the other model. Consider the example in Fig. 1 and neglect correspondence
C2 and C3 for the time being. Then, the traces A, D and A, E in model (a) (all
other transitions are hidden) would be rewritten as follows. According to the
correspondences, an occurrence of A is replaced by the subtraces 1, 3, 4 or 1, 4, 3,
while the subtraces D and E are replaced by an occurrence of transition 7. That
yields the two traces 1, 3, 4, 7 and 1, 4, 3, 7. As both traces described the language of
model (b) when taking only transitions of correspondences C1 and C4 into account,
we conclude that both correspondences do not violate projection inheritance. Note
that during this analysis, the interleaving of transitions belonging to different
correspondences has to be considered. Based thereon, each pair of correspondences
can be assessed. If all correspondences show pairwise projection inheritance,
projection inheritance for the two models and their alignment in terms of a set
of correspondences can be concluded.</p>
      <p>
        Structural Characterisation of Violations. While the aforementioned
approach of comparing the set of all resolved traces can always be taken, violations
of projection inheritance may already be discovered using a heuristic approach. It
uses the RPST decomposition technique for sound free-choice WF-systems and is
applicable for correspondences that are structurally independent in both systems
(cf., Section 3). In previous work, we showed that the RPST of sound free-choice
WF-systems can be annotated with behavioural details. That is, bond fragments
are either transition bordered or place bordered, but there cannot be a mix of
place and transition boundary nodes [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. The former represents a parallel block,
whereas the latter represents either an exclusive block or a loop fragment.
      </p>
      <p>This information, in turn, can be leveraged to identify violations of projection
inheritance that are induced by correspondences. Given two correspondences we
proceed as follows.
1. Determine the lowest common ancestor (LCA) in the respective RPST of all
trivial T fragments for which the entry node is a transition aligned by one of
the two correspondences. Derive the LCA in both models.
2. Compare the type of the LCA fragments.</p>
      <p>– If one LCA fragment is of type P , the other LCA fragment has to be of
type P as well and the order of the respective child fragments (transitively)
containing all T fragments of the correspondences has to coincide in both
LCA fragments.
– If one LCA fragment is of type B and not cyclic, the other LCA fragment
has to be of type B and acyclic as well. In addition, the fragments are
either both place bordered or both transition bordered.
– If one LCA fragment is of type B and cyclic, the other LCA fragment
has to be of type B and cyclic as well.</p>
      <p>This observation can be explained as follows. As both correspondences are
structurally independent, the LCA of all T fragments that are related to the
transitions of the correspondence must have at least two children, one (transitively)
containing all T fragments related to one correspondence and the other one
(transitively) containing all T fragments related to the other correspondence.
Therefore, the type of the LCA induces a constraint on the potential order of
occurrence between all transitions of one correspondence and all transitions of the
other correspondence. This constraint has to hold in the second model as well. For
instance, if there is a sequential order (LCA is P fragment) between the respective
T fragments (and, therefore, the transitions) of the two correspondences in one
model, there cannot be a potential concurrent enabling (LCA is B fragment
that is transition bordered) of the corresponding transitions in the other model.
Such a setting will never show projection inheritance. It is important to see two
limitations of this approach. On the one hand, conclusions cannot be drawn, if
one of the two LCAs is a rigid (R) fragment, as the constraints on the order of
potential execution cannot be derived directly. On the other hand, this check
is solely a heuristic that formulates a necessary, but not a sufficient condition
for a violation of projection inheritance. Even if the type of the LCA is equal,
projection inheritance might be violated by the two correspondences. For instance,
if both LCAs are of type P , it might still be the case that the occurrence of
all transitions of one correspondence is optional in one model, whereas it is
mandatory in the other model.</p>
      <p>Besides (C1, C2) and (C1, C3), all pairs of correspondences in Fig. 1 are
structurally independent in both models, such that the types of the respective
LCA fragments can be compared. That, in turn, yields the following result. For
the pairs (C1, C4), (C2, C3), and (C2, C4) the LCA fragments show a consistent
type in both models. In contrast, for correspondence (C3, C4) the LCA fragment
is of type B (transition bordered) in model (a) and of type P in model (b).
Thus, the structural analysis revealed that correspondences C3 and C4 violate
projection inheritance between both models. Transitions of both correspondences
might be enabled concurrently in model (a), which is not possible in model (b).</p>
      <p>Regarding correspondences that are not structurally independent in both
systems, we already discussed the case of correspondences C1 and C2 of our
example in Fig. 1. These correspondences obviously violate projection inheritance.
However, our example also illustrates that correspondences that are structurally
dependent do not necessarily lead to violations. Consider, for instance,
correspondences C1 and C3, which are not structurally independent in model (b), due
to fragments that represent subnets containing transitions 3, 4, 5, 6, but not 1.
Nevertheless, the order between all transitions of correspondence C1 and C3 as
imposed by model (a) is also reflected in model (b). Albeit beyond the scope of
this discussion, we foresee that necessary conditions for violations can also be
specified for the case of correspondences that are not structurally independent.
5</p>
    </sec>
    <sec id="sec-3">
      <title>Related Work</title>
      <p>
        We already discussed related work in the field of behaviour equivalence [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and
behaviour inheritance [
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ]. Further on, work on trace-based assessment of
similarity is related to our work. For instance, the set n-grams of possible traces
two models can be compared [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. In other work, a trace is replayed in a model
and the number of valid replay steps is leveraged for measuring similarity [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>
        Moreover, the assessment of behaviour inheritance in the presence of complex
correspondences is related to work on behaviour preserving model refinements,
see [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] for a thorough survey. A transition refinement is defined by replacing a
transition with a block-structured refinement net with a dedicated set of initial
and final transitions. However, other approaches allow refinement nets to also
show so-called distributed input or distributed output places [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
    </sec>
    <sec id="sec-4">
      <title>Conclusion</title>
      <p>In this paper, we addressed the challenge of assessing behaviour equivalence for
process models aligned by complex correspondences. In particular, we discussed
how the notion of behaviour inheritance can be applied for complex
correspondences and also introduced necessary conditions for violations of this notion by a
pair of correspondences based on structural decomposition techniques for sound
free-choice workflow systems.</p>
      <p>As a next step, the discussed application of behaviour inheritance in the
context of complex correspondences needs to be formalised. In addition, we want
to further investigate the structural characterisation of correspondences and their
relation to the notions of behaviour inheritance. Here, the goal would be the
specification of structural characterisations that are not only a necessary, but
also a sufficient condition for a violation of behaviour inheritance.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Dijkman</surname>
            ,
            <given-names>R.M.:</given-names>
          </string-name>
          <article-title>Diagnosing differences between business process models</article-title>
          .
          <source>In: BPM</source>
          . Volume
          <volume>5240</volume>
          of LNCS., Springer (
          <year>2008</year>
          )
          <fpage>261</fpage>
          -
          <lpage>277</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Dijkman</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dumas</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Garc´</surname>
          </string-name>
          ıa-Ban˜uelos, L.,
          <article-title>Ka¨a¨rik</article-title>
          , R.:
          <article-title>Aligning business process models</article-title>
          .
          <source>In: EDOC</source>
          . (
          <year>2009</year>
          )
          <fpage>45</fpage>
          -
          <lpage>53</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Nejati</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sabetzadeh</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chechik</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Easterbrook</surname>
            ,
            <given-names>S.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zave</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Matching and merging of statecharts specifications</article-title>
          . In: ICSE, IEEE Computer Society (
          <year>2007</year>
          )
          <fpage>54</fpage>
          -
          <lpage>64</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4. van Glabbeek,
          <string-name>
            <surname>R.:</surname>
          </string-name>
          <article-title>The linear time - brancing time spectrum I. The semantics of concrete, sequential processes</article-title>
          .
          <source>In: Handbook of Process Algebra. Elsevier</source>
          (
          <year>2001</year>
          )
          <fpage>3</fpage>
          -
          <lpage>99</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Aalst</surname>
            ,
            <given-names>W.:</given-names>
          </string-name>
          <article-title>The application of Petri nets to workflow management</article-title>
          .
          <source>Journal of Circuits, Systems, and Computers</source>
          <volume>8</volume>
          (
          <issue>1</issue>
          ) (
          <year>1998</year>
          )
          <fpage>21</fpage>
          -
          <lpage>66</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Desel</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Esparza</surname>
          </string-name>
          , J.:
          <source>Free Choice Petri Nets</source>
          . Cambridge University Press (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Aalst</surname>
          </string-name>
          , W.:
          <article-title>Verification of workflow nets</article-title>
          .
          <source>In: ICATPN. Volume 1248 of LNCS</source>
          . (
          <year>1997</year>
          )
          <fpage>407</fpage>
          -
          <lpage>426</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Vanhatalo</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , Vo¨lzer, H.,
          <string-name>
            <surname>Koehler</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>The refined process structure tree</article-title>
          .
          <source>In: BPM. Volume 5240 of LNCS</source>
          . (
          <year>2008</year>
          )
          <fpage>100</fpage>
          -
          <lpage>115</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Euzenat</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shvaiko</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          : Ontology Matching. Springer-Verlag (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Basten</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aalst</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          :
          <article-title>Inheritance of Behavior</article-title>
          .
          <source>Journal of Logic and Algebraic Programming</source>
          <volume>47</volume>
          (
          <issue>2</issue>
          ) (
          <year>2001</year>
          )
          <fpage>47</fpage>
          -
          <lpage>145</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Schrefl</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stumptner</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Behavior-consistent specialization of object life cycles</article-title>
          .
          <source>ACM Trans. Softw. Eng. Methodol</source>
          .
          <volume>11</volume>
          (
          <issue>1</issue>
          ) (
          <year>2002</year>
          )
          <fpage>92</fpage>
          -
          <lpage>148</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Weidlich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Polyvyanyy</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mendling</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weske</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Efficient computation of causal behavioural profiles using structural decomposition</article-title>
          .
          <source>In: ICATPN</source>
          . (
          <year>2010</year>
          )
          <article-title>accepted for publication.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Wombacher</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Evaluation of technical measures for workflow similarity based on a pilot study</article-title>
          .
          <source>In: OTM (1)</source>
          . Volume 4275 of LNCS., Springer (
          <year>2006</year>
          )
          <fpage>255</fpage>
          -
          <lpage>272</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>de Medeiros</surname>
          </string-name>
          , A.K.A.,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weijters</surname>
            ,
            <given-names>A.J.M.M.:</given-names>
          </string-name>
          <article-title>Quantifying process equivalence based on observed behavior</article-title>
          .
          <source>Data Knowl. Eng</source>
          .
          <volume>64</volume>
          (
          <issue>1</issue>
          ) (
          <year>2008</year>
          )
          <fpage>55</fpage>
          -
          <lpage>74</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Brauer</surname>
            , W., Gold,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vogler</surname>
            ,
            <given-names>W.:</given-names>
          </string-name>
          <article-title>A survey of behaviour and equivalence preserving refinements of petri nets</article-title>
          .
          <source>In: ICATPN</source>
          . Volume
          <volume>483</volume>
          of LNCS., Springer (
          <year>1989</year>
          )
          <fpage>1</fpage>
          -
          <lpage>46</lpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>