2014
DOI: 10.1007/978-3-319-03677-9_5
|View full text |Cite
|
Sign up to set email alerts
|

AI Approach to Formal Analysis of BPMN Models: Towards a Logical Model for BPMN Diagrams

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 16 publications
0
9
0
Order By: Relevance
“…There are many research on transforming the BPMN as a graphical language into Petri nets [6], YAWL [21], π-Calculus [16], CSP [20], graphs [9], Prolog [11] and Maude [10]. A mapping from a subset of BPMN into Petri nets was proposed in [6] reserving the classical Petri nets limitation in representing the inclusive OR gateway.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…There are many research on transforming the BPMN as a graphical language into Petri nets [6], YAWL [21], π-Calculus [16], CSP [20], graphs [9], Prolog [11] and Maude [10]. A mapping from a subset of BPMN into Petri nets was proposed in [6] reserving the classical Petri nets limitation in representing the inclusive OR gateway.…”
Section: Related Workmentioning
confidence: 99%
“…Graph rewrite rules were used in [9] for conformance checking and visualization purposes without using a well-formedness notion or handling of data objects. An AI approach was followed in [11] to give a logical model for a subset of BPMN elements discussing some correctness criteria, e.g. deadlock freedom, termination and determinism.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Another interesting approach is a use of Prolog language (Ligeza et al, 2012) in order to check the correctness of data flows by using declarative specification of the BPMN model.…”
Section: Related Workmentioning
confidence: 99%
“…Considering designing processes, one can think about models designed manually by business analysts, as well as models generated from other representations such as: natural text description [1], structured text [2], spreadsheets [3], other representations like UML [4], or mining such models from event logs [5]. All such models can suffer from various anomalies [6]- [8]. Some of such anomalies can be avoided by validation models [9], [10] or verification [11] of models.…”
Section: Introductionmentioning
confidence: 99%