2016
DOI: 10.1007/978-3-319-47208-9_5
|View full text |Cite
|
Sign up to set email alerts
|

Selected Approaches Towards Taxonomy of Business Process Anomalies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 33 publications
0
4
0
Order By: Relevance
“…The first of the proposed methods is the manual creation of a process model in a graphical editor, using a readymade component database associated with the basic modeling guidelines. In addition to storing generated subgraphs, the purpose of having such a knowledge base is to avoid typical anomalies occurring in process models [8] and reduce the need for formal verification of the final model [11]. Among modeling errors, two basic groups are distinguished:…”
Section: Composition Of a Process Model Based On The Existing Componentsmentioning
confidence: 99%
See 1 more Smart Citation
“…The first of the proposed methods is the manual creation of a process model in a graphical editor, using a readymade component database associated with the basic modeling guidelines. In addition to storing generated subgraphs, the purpose of having such a knowledge base is to avoid typical anomalies occurring in process models [8] and reduce the need for formal verification of the final model [11]. Among modeling errors, two basic groups are distinguished:…”
Section: Composition Of a Process Model Based On The Existing Componentsmentioning
confidence: 99%
“…In the case of the synthesis of a model composed of such fragments, it is necessary to ensure the correctness of the generated solution. For example, during automated process modeling, verification of typical anomalies such as deadlock, or loops should be considered [8].…”
Section: Introductionmentioning
confidence: 99%
“…An improvement is required in the mechanism which provides cohesion in detecting anomalies in business processes [27]. Anomalies have been defined in numerous papers [28], yet a unified definition was presented in IEEE standard classification for Software Anomalies [29]: Each condition different from the expected is an anomaly. In a business logic, an anomaly can be considered as every negative influence on modeling and models.…”
Section: Applications Of the Verification In The Area Of Anomalimentioning
confidence: 99%
“…Eventhough widely accepted, BPMN's major drawback is related to the possible misunderstanding of its execution semantics, defined by means of natural text descriptions, sometimes containing misleading information [33]. To overcome this issue, much effort has been devoted to formalise BPMN semantics by means of mapping it to other formal languages.…”
Section: Introductionmentioning
confidence: 99%