=Paper= {{Paper |id=None |storemode=property |title=On the behavioural dimension of correspondences between process models |pdfUrl=https://ceur-ws.org/Vol-563/paper8.pdf |volume=Vol-563 |dblpUrl=https://dblp.org/rec/conf/zeus/WeidlichW10a }} ==On the behavioural dimension of correspondences between process models== https://ceur-ws.org/Vol-563/paper8.pdf
         On the Behavioural Dimension of
     Correspondences between Process Models

                     Matthias Weidlich and Mathias Weske

             Hasso-Plattner-Institute, University of Potsdam, Germany
                {matthias.weidlich,weske}@hpi.uni-potsdam.de



      Abstract. Enterprise-wide process harmonisation initiatives require the
      analysis of commonalities of existing business process models. That is, cor-
      respondences between activities are identified, such that the behavioural
      equivalence of the models can be assessed thereafter. Due to refinements,
      these correspondences can relate sets of activities to each other, i.e.,
      there are complex 1:n or n:m correspondences. In this paper, we discuss
      how notions of behaviour inheritance can be applied in this context. In
      addition, we elaborate on how structural information can be leveraged to
      identify violations of behaviour inheritance.


1   Introduction

Enterprises model their business processes for various purposes, e.g., documenta-
tion of business operations, staff planning, or process automation. As a conse-
quence, process models might show deviations in terms of level of detail, control
flow, and activity labels, even if they capture a common real-world process.
    In order to detect inconsistencies between related process models, their com-
monalities and differences have to be identified [1]. As a first step, this requires
the identification of activities that correspond to each other. Note that this
might not imply semantic equivalence of the activities (e.g., ‘Get Quote’ might
correspond to ‘Enter Quote Details’ although both activities are not semantically
equivalent). Such correspondences can be elementary 1:1 matches between ac-
tivities, or complex 1:n (or even n:m) matches due to refinements of activities.
Correspondences may stem from a system analyst inspecting the models or from
automatic matching, cf., [2, 3]. As a second step, the behavioural equivalence of
process models aligned by correspondences is assessed to detect inconsistencies
and guide process harmonisation efforts.
    Although not in a straight-forward manner, existing notions of behaviour
inheritance might be applied for this purpose even in the presence of complex
correspondences between two process models. However, we argue that certain
violations of behaviour inheritance can be detected structurally. In this paper, we
show that a structural decomposition of a sound free-choice WF-system might
provide valuable hints at correspondences that violate behaviour inheritance. In
particular, we focus on the notion of projection inheritance in the context of
trace semantics, i.e., an adapted version of the trace equivalence criterion [4].
                                  Request Offer from                                 Sign Precontract with
                                  Subcontractor (B)                                    Subcontractor (D)

                              Update Request for Offer (C)                  Sign Internal Transfer Contract (E)


                                             Create Project (G)             Provide Technical Presentation (I)


          Get Project      Establish                 Get Detailed                          Clarify Requirement         Close Deal
          Details (A)     Contact (F)              Requirements (H)                              Issues (J)                (K)         (a)

                 C1                          C2                                  C3                               C4

                             Get Details from
                           Marketing Module (3)

          Enter Project    Get Details from Pre-                         Load                 Enter Project              Attach
           Class (1)        Sales Module (4)                          Template (5)           Requirements (6)          Contracts (7)   (b)

                                               Enter Best Subcontractor
                                                       Offer (2)




Fig. 1. Two exemplary process models, (a) focussing on the organisational perspective,
(b) depicting the respective technical process, along with complex correspondences

    Fig. 1 illustrates the problem addressed by this paper using two Petri nets
that model a project planning process. Model (a) assumes an organisational
perspective, whereas (b) shows the processing according to a supporting IT system.
There are four complex correspondences highlighted using dash-dotted lines. Note
that τ -transitions are never considered to be part of any correspondence. Clearly,
the execution dependencies for transitions that are part of correspondences are
not always consistent in both models. For instance, transitions D and H might
be enabled concurrently in model (a), whereas their corresponding transitions,
e.g., 5 and 7, are causally related in model (b). The question of whether and how
such inconsistencies can be detected structurally is addressed in this paper.
    The remainder of this paper is structured as follows. Section 2 gives pre-
liminaries for our work. We discuss structural properties of correspondences
in Section 3. Section 4 elaborates on behavioural analysis of correspondences.
Finally, Section 5 reviews related work, before Section 6 concludes the paper.

2    Preliminaries
We recall basic definitions for workflow (WF-) systems based on [5, 6]. A net is a
tuple N = (P, T, F ) with P and T as finite disjoint sets of places and transitions,
and F ⊆ (P × T ) ∪ (T × P ) as the flow relation. We write X = (P ∪ T ) for all
nodes and F + for the transitive closure of F . For a node x ∈ X, •x := {y ∈
X | (y, x) ∈ F }, x• := {y ∈ X | (x, y) ∈ F }, inN (x) := {(n, x) | n ∈ •x}, and
outN (x) := {(x, n) | n ∈ x•}. A net N is free-choice, iff ∀ p ∈ P with |p • | > 1
holds •(p•) = {p}. N is conntected, if ∀ x1 , x2 ∈ X [ x1 F + x2 ∧ x2 F + x1 ]. A
workflow (WF-) net is a net N = (P, T, F ), such that there is exactly one place
i ∈ P with •i = ∅, exactly one place o ∈ P with o• = ∅, and the short-circuit net
N 0 = (P, T ∪ {tc }, F ∪ {(o, tc ), (tc , i)}) is connected. M : P 7→ N is a marking of
N and Mp denotes the marking that puts a token on p and no token elsewhere
for a place p ∈ P . Given a WF-net N with Mi as its initial marking, we refer
to the tuple S = (N, Mi ) as a WF-system and assume N to be defined always
as N = (P, T, F ). We do not recall semantics for WF-systems but refer to [5, 6].
(N, Mi ) is sound, iff the short-circuit system (N 0 , Mi ) is live and bounded [7].
                                                              B1       P1
            P4            B2                           B3
                     B P6             P8   D
                                                                                                       P1
                     C                     E
                         P7           P9
                                                                                                       B1
    A                                                              K
            P5                                                                             P4                     P5
                         G                     I
                                 P10                        P13

                 F         R1    P12
                                                                                 B2              B3        P10    R1    P14
                     P11                   P14
                           H                       J
                                                                                                            P11         P13
                                                                            P6        P7        P8    P9          P12

                                (a)                                                                   (b)

Fig. 2. (a) WF-system and its canonical fragments, (b) its RPST (without T -fragments)

    We apply the structural decomposition technique introduced as the RPST
in [8] to parse a WF-system into a hierarchy of fragments with a single entry node
and a single exit node. Then, the RPST is a containment hierarchy of canonical
fragments of the system that can be computed in linear time.

Definition 1 (Fragments, RPST). Let N = (P, T, F ) be a WF-net with initial
place i and final place o.
 – A node x ∈ X 0 of a connected subnet N 0 = (P 0 , T 0 , F 0 ) of a net N is a
                                                   / F 0 ]. If x is a boundary node,
    boundary node, if ∃ e ∈ inN (x) ∪ outN (x) [ e ∈
    it is an entry of N , if inN (x) ∩ F = ∅ or outN (x) ⊆ F 0 , or an exit of N 0 ,
                          0               0

    if outN (x) ∩ F 0 = ∅ or inN (x) ⊆ F 0 .
 – Any connected subnet ω of N , is a fragment, if it has exactly two boundary
    nodes, one entry and one exit.
 – A fragment ω = (Pω , Tω , Fω ) is canonical in a set of fragments Ω of N , iff
    ∀ γ = (Pγ , Tγ , Fγ ) ∈ Ω [ ω 6= γ ⇒ (Fω ∩ Fγ = ∅) ∨ (Fω ⊂ Fγ ) ∨ (Fγ ⊂ Fω ) ].
The RPST of N is a tuple RN = (Ω, χ, t), where:
 – Ω is a set of all canonical fragments of N ,
 – χ : Ω → P(Ω) is a function that assigns to fragment its child fragments,
 – t : Ω → {T, P, B, R} is a function that assigns a type to a fragment.

Fig. 2 shows the canonical fragments for one of the WF-systems of our example
along with the corresponding RPST. Note that each canonical fragment can
be classified as being either a trivial (T ) fragment (a single edge), a polygon
(P ) fragment (a sequence of fragments), a bond (B) (fragment collection with
common boundary nodes), or a rigid (R) fragment (any other structure).


3    Structural Properties of Correspondences
This section clarifies the notion of a correspondence between two WF-systems.
Following on the terminology known from the domain of schema matching or
ontology matching [9], a correspondence is defined by two sets of transitions of
the WF-systems.

Definition 2 (Correspondence). Let (N 0 , Mi0 ) and (N 00 , Mi00 ) be two WF-
systems. The correspondence relation ∼ ⊆ ℘(T 0 )×℘(T 00 ) associates corresponding
transitions of both systems to each other. Let T1 ⊆ T 0 and T2 ⊆ T 00 . If T1 ∼ T2
then (T1 , T2 ) is referred to as a correspondence. (T1 , T2 ) is called elementary, iff
|T1 | = |T2 | = 1, and complex otherwise.
Further on, we discuss the structural relation between multiple correspondences
between two systems by means of two structural properties. First, correspondences
might be overlapping, i.e., they share a transition in at least one of the WF-
systems.
Definition 3 (Overlapping Correspondences). Let (N 0 , Mi0 ) and (N 00 , Mi00 )
be two WF-systems and C1 = (T1 , T2 ) and C2 = (T3 , T4 ) two correspondences
between them, such that T1 , T3 ⊆ T 0 and T2 , T4 ⊆ T 00 . C1 and C2 are called
overlapping, iff T1 ∩ T3 6= ∅ or T2 ∩ T4 6= ∅.
Regarding the example in Fig. 1, we see that all cor-
respondences are non-overlapping.
    Second, we provide an additional property for the
structural relation between two correspondences, which
is based on the RPST. Here, we have the assumption Fig. 3. Pre-processing
that all transitions that are part of a correspondence have a single incoming and
single outgoing flow arc. If not, a behaviour preserving pre-processing is done, cf.,
Fig. 3. Note that the systems in Fig. 1 are pre-processed. The property requires
that two correspondences are not overlapping in terms of their lowest enclosing
fragments in the RPST.
Definition 4 (Structurally Independent Correspondences). Let (N 0 , Mi0 )
and (N 00 , Mi00 ) be two WF-systems, R0N 0 = (Ω 0 , χ0 , t0 ) the RPST of N 0 , and C1 =
(T1 , T2 ) and C2 = (T3 , T4 ) with T1 , T3 ⊆ T 0 and T2 , T4 ⊆ T 00 two correspondences.
C1 and C2 are structurally independent in N 0 , iff |T1 | = |T3 | = 1 or ∀ ω =
(Pω , Tω , Fω ) ∈ Ω 0 [ T1 ∩ Tω 6= ∅ ∧ T3 ∩ Tω 6= ∅ ⇒ T1 ⊆ Tω ∧ T3 ⊆ Tω ].
Our example in Fig. 1 illustrates correspondences that are structurally inde-
pendent in one or both systems. For instance, the pair of correspondences C1
and C2 is independent in model (a), as every fragment containing transition A
and either B or C contains all three transitions, cf., Fig. 2. However, the very
same pair of correspondences is not independent in model (b), as there is a bond
fragment that represents a subnet comprising transitions 3, 4, and 5, but which
does not contain transition 1. In contrast, C1 and C4 are an example for a pair
of correspondences that are structurally independent in both models (a) and (b).

4    Behavioural Analysis of Correspondences
Based on the structural properties of correspondences introduced in the previous
section, this section discusses behavioural analysis of correspondences. First, we
elaborate on the behavioural ambiguity of overlapping correspondences. Second,
the application of common notions of behaviour inheritance in the context of com-
plex correspondences is discussed. Subsequently, we introduce heuristics to detect
violations of behaviour inheritance for structurally independent correspondences.
    Overlapping Correspondences. Overlapping
                                                                 A        B
correspondences raise various questions regarding their
intended meaning. That is, it is unclear whether an
occurrence of a transition that is part of both overlap-         A1       X

ping correspondences should be considered for one or
for both correspondences. For instance, consider the Fig. 4.         Overlapping
systems depicted in Fig. 4. Here, the trace A1, X in the Correspondences
lower system might correspond to both, the occurrence
of transition A only, or the occurrence of both transitions, A and B, in the upper
system. Thus, the semantic ambiguity of such overlapping correspondences has
to be addressed as a prerequisite for any behavioural analysis.
    Behaviour Inheritance. In order to judge about behaviour equivalence
in the context of correspondences between process models, first and foremost,
the treatment of transitions without counterparts has to be addressed. To this
end, two notions of behaviour inheritance can be distinguished, i.e., protocol
inheritance or projection inheritance, cf., [10, 11]. That is, transitions in one model
that are without counterpart in the second model are either blocked (protocol
inheritance) or hidden (projection inheritance). Although these notions have
been defined based on branching bisimulation, they can easily be transferred to
trace-based behaviour analysis. It is worth to mention that the term inheritance
is slightly misleading in our context as it implies a directed relation between two
models (one model is a subclass of the other model). As illustrated by our example
in Fig. 4, such a directed relation might not exist between aligned models.
    The choice between protocol inheritance or projection inheritance is indepen-
dent of the structural characteristics of the correspondences. However, we focus
on projection inheritance in the context of this paper. In particular, this notions
seems to be more appropriate when comparing models that focus on different
modelling perspectives (e.g., organisational vs. technical) as intermediate process
steps that are mandatory in one perspective may be without counterpart in the
other model. For instance, transition F of model (a) in Fig. 1 is not part of any
correspondence even though its execution is required for completion of process
(a). Thus, any notion of protocol inheritance would be bound to failure.
    In the general case, projection inheritance in terms of trace semantics between
two models is assessed as follows. The language of both process models is
checked for equivalence, when all correspondences are resolved. In case of 1:1
elementary correspondences this resolution is straightforward as an occurrence of
one transition in one model corresponds to the occurrence of another transition in
the other model. For the case of complex correspondences, this resolution involves
a replacement of all valid subtraces involving the transitions of the correspondence
in the one model with all valid subtraces comprising the corresponding transitions
in the other model. Consider the example in Fig. 1 and neglect correspondence
C2 and C3 for the time being. Then, the traces A, D and A, E in model (a) (all
other transitions are hidden) would be rewritten as follows. According to the
correspondences, an occurrence of A is replaced by the subtraces 1, 3, 4 or 1, 4, 3,
while the subtraces D and E are replaced by an occurrence of transition 7. That
yields the two traces 1, 3, 4, 7 and 1, 4, 3, 7. As both traces described the language of
model (b) when taking only transitions of correspondences C1 and C4 into account,
we conclude that both correspondences do not violate projection inheritance. Note
that during this analysis, the interleaving of transitions belonging to different
correspondences has to be considered. Based thereon, each pair of correspondences
can be assessed. If all correspondences show pairwise projection inheritance,
projection inheritance for the two models and their alignment in terms of a set
of correspondences can be concluded.
     Structural Characterisation of Violations. While the aforementioned
approach of comparing the set of all resolved traces can always be taken, violations
of projection inheritance may already be discovered using a heuristic approach. It
uses the RPST decomposition technique for sound free-choice WF-systems and is
applicable for correspondences that are structurally independent in both systems
(cf., Section 3). In previous work, we showed that the RPST of sound free-choice
WF-systems can be annotated with behavioural details. That is, bond fragments
are either transition bordered or place bordered, but there cannot be a mix of
place and transition boundary nodes [12]. The former represents a parallel block,
whereas the latter represents either an exclusive block or a loop fragment.
     This information, in turn, can be leveraged to identify violations of projection
inheritance that are induced by correspondences. Given two correspondences we
proceed as follows.
 1. Determine the lowest common ancestor (LCA) in the respective RPST of all
     trivial T fragments for which the entry node is a transition aligned by one of
     the two correspondences. Derive the LCA in both models.
 2. Compare the type of the LCA fragments.
       – If one LCA fragment is of type P , the other LCA fragment has to be of
          type P as well and the order of the respective child fragments (transitively)
          containing all T fragments of the correspondences has to coincide in both
          LCA fragments.
       – If one LCA fragment is of type B and not cyclic, the other LCA fragment
          has to be of type B and acyclic as well. In addition, the fragments are
          either both place bordered or both transition bordered.
       – If one LCA fragment is of type B and cyclic, the other LCA fragment
          has to be of type B and cyclic as well.
This observation can be explained as follows. As both correspondences are
structurally independent, the LCA of all T fragments that are related to the
transitions of the correspondence must have at least two children, one (transitively)
containing all T fragments related to one correspondence and the other one
(transitively) containing all T fragments related to the other correspondence.
Therefore, the type of the LCA induces a constraint on the potential order of
occurrence between all transitions of one correspondence and all transitions of the
other correspondence. This constraint has to hold in the second model as well. For
instance, if there is a sequential order (LCA is P fragment) between the respective
T fragments (and, therefore, the transitions) of the two correspondences in one
model, there cannot be a potential concurrent enabling (LCA is B fragment
that is transition bordered) of the corresponding transitions in the other model.
Such a setting will never show projection inheritance. It is important to see two
limitations of this approach. On the one hand, conclusions cannot be drawn, if
one of the two LCAs is a rigid (R) fragment, as the constraints on the order of
potential execution cannot be derived directly. On the other hand, this check
is solely a heuristic that formulates a necessary, but not a sufficient condition
for a violation of projection inheritance. Even if the type of the LCA is equal,
projection inheritance might be violated by the two correspondences. For instance,
if both LCAs are of type P , it might still be the case that the occurrence of
all transitions of one correspondence is optional in one model, whereas it is
mandatory in the other model.
    Besides (C1, C2) and (C1, C3), all pairs of correspondences in Fig. 1 are
structurally independent in both models, such that the types of the respective
LCA fragments can be compared. That, in turn, yields the following result. For
the pairs (C1, C4), (C2, C3), and (C2, C4) the LCA fragments show a consistent
type in both models. In contrast, for correspondence (C3, C4) the LCA fragment
is of type B (transition bordered) in model (a) and of type P in model (b).
Thus, the structural analysis revealed that correspondences C3 and C4 violate
projection inheritance between both models. Transitions of both correspondences
might be enabled concurrently in model (a), which is not possible in model (b).
    Regarding correspondences that are not structurally independent in both
systems, we already discussed the case of correspondences C1 and C2 of our
example in Fig. 1. These correspondences obviously violate projection inheritance.
However, our example also illustrates that correspondences that are structurally
dependent do not necessarily lead to violations. Consider, for instance, corre-
spondences C1 and C3, which are not structurally independent in model (b), due
to fragments that represent subnets containing transitions 3, 4, 5, 6, but not 1.
Nevertheless, the order between all transitions of correspondence C1 and C3 as
imposed by model (a) is also reflected in model (b). Albeit beyond the scope of
this discussion, we foresee that necessary conditions for violations can also be
specified for the case of correspondences that are not structurally independent.


5   Related Work

We already discussed related work in the field of behaviour equivalence [4] and
behaviour inheritance [10, 11]. Further on, work on trace-based assessment of
similarity is related to our work. For instance, the set n-grams of possible traces
two models can be compared [13]. In other work, a trace is replayed in a model
and the number of valid replay steps is leveraged for measuring similarity [14].
    Moreover, the assessment of behaviour inheritance in the presence of complex
correspondences is related to work on behaviour preserving model refinements,
see [15] for a thorough survey. A transition refinement is defined by replacing a
transition with a block-structured refinement net with a dedicated set of initial
and final transitions. However, other approaches allow refinement nets to also
show so-called distributed input or distributed output places [15].
6    Conclusion
In this paper, we addressed the challenge of assessing behaviour equivalence for
process models aligned by complex correspondences. In particular, we discussed
how the notion of behaviour inheritance can be applied for complex correspon-
dences and also introduced necessary conditions for violations of this notion by a
pair of correspondences based on structural decomposition techniques for sound
free-choice workflow systems.
    As a next step, the discussed application of behaviour inheritance in the
context of complex correspondences needs to be formalised. In addition, we want
to further investigate the structural characterisation of correspondences and their
relation to the notions of behaviour inheritance. Here, the goal would be the
specification of structural characterisations that are not only a necessary, but
also a sufficient condition for a violation of behaviour inheritance.

References
 1. Dijkman, R.M.: Diagnosing differences between business process models. In: BPM.
    Volume 5240 of LNCS., Springer (2008) 261–277
 2. Dijkman, R., Dumas, M., Garcı́a-Bañuelos, L., Käärik, R.: Aligning business process
    models. In: EDOC. (2009) 45–53
 3. Nejati, S., Sabetzadeh, M., Chechik, M., Easterbrook, S.M., Zave, P.: Matching
    and merging of statecharts specifications. In: ICSE, IEEE Computer Society (2007)
    54–64
 4. van Glabbeek, R.: The linear time - brancing time spectrum I. The semantics of
    concrete, sequential processes. In: Handbook of Process Algebra. Elsevier (2001)
    3–99
 5. Aalst, W.: The application of Petri nets to workflow management. Journal of
    Circuits, Systems, and Computers 8(1) (1998) 21–66
 6. Desel, J., Esparza, J.: Free Choice Petri Nets. Cambridge University Press (1995)
 7. Aalst, W.: Verification of workflow nets. In: ICATPN. Volume 1248 of LNCS.
    (1997) 407–426
 8. Vanhatalo, J., Völzer, H., Koehler, J.: The refined process structure tree. In: BPM.
    Volume 5240 of LNCS. (2008) 100–115
 9. Euzenat, J., Shvaiko, P.: Ontology Matching. Springer-Verlag (2007)
10. Basten, T., Aalst, W.: Inheritance of Behavior. Journal of Logic and Algebraic
    Programming 47(2) (2001) 47–145
11. Schrefl, M., Stumptner, M.: Behavior-consistent specialization of object life cycles.
    ACM Trans. Softw. Eng. Methodol. 11(1) (2002) 92–148
12. Weidlich, M., Polyvyanyy, A., Mendling, J., Weske, M.: Efficient computation of
    causal behavioural profiles using structural decomposition. In: ICATPN. (2010)
    accepted for publication.
13. Wombacher, A.: Evaluation of technical measures for workflow similarity based on
    a pilot study. In: OTM (1). Volume 4275 of LNCS., Springer (2006) 255–272
14. de Medeiros, A.K.A., van der Aalst, W.M.P., Weijters, A.J.M.M.: Quantifying
    process equivalence based on observed behavior. Data Knowl. Eng. 64(1) (2008)
    55–74
15. Brauer, W., Gold, R., Vogler, W.: A survey of behaviour and equivalence preserving
    refinements of petri nets. In: ICATPN. Volume 483 of LNCS., Springer (1989) 1–46