43 research outputs found
Soundness-preserving composition of synchronously and asynchronously interacting workflow net components
In this paper, we propose a compositional approach to construct formal models
of complex distributed systems with several synchronously and asynchronously
interacting components. A system model is obtained from a composition of
individual component models according to requirements on their interaction. We
represent component behavior using workflow nets - a class of Petri nets. We
propose a general approach to model and compose synchronously and
asynchronously interacting workflow nets. Through the use of Petri net
morphisms and their properties, we prove that this composition of workflow nets
preserves component correctness.Comment: Preprint of the paper submitted to "Fundamenta Informaticae
Preventing Object-centric Discovery of Unsound Process Models for Object Interactions with Loops in Collaborative Systems: Extended Version
Object-centric process discovery (OCPD) constitutes a paradigm shift in
process mining. Instead of assuming a single case notion present in the event
log, OCPD can handle events without a single case notion, but that are instead
related to a collection of objects each having a certain type. The object types
constitute multiple, interacting case notions. The output of OCPD is an
object-centric Petri net, i.e. a Petri net with object-typed places, that
represents the parallel execution of multiple execution flows corresponding to
object types. Similar to classical process discovery, where we aim for
behaviorally sound process models as a result, in OCPD, we aim for soundness of
the resulting object-centric Petri nets. However, the existing OCPD approach
can result in violations of soundness. As we will show, one violation arises
for multiple interacting object types with loops that arise in collaborative
systems. This paper proposes an extended OCPD approach and proves that it does
not suffer from this violation of soundness of the resulting object-centric
Petri nets. We also show how we prevent the OCPD approach from introducing
spurious interactions in the discovered object-centric Petri net. The proposed
framework is prototypically implemented
Exploring the Integration of Agent-Based Modelling, Process Mining, and Business Process Management through a Text Analytics–Based Literature Review
Agent-based modelling and business process management are two interrelated yet distinct concepts. To explore the relationship between these two fields, we conducted a systematic literature review to investigate existing methods and identify research gaps in the integration of agent-based modelling, process mining, and business process management. Our search yielded 359 research papers, which were evaluated using predefined criteria and quality measures. This resulted in a final selection of forty-two papers. Our findings reveal several research gaps, including the need for enhanced validation methods, the modelling of complex agents and environments, and the integration of process mining and business process management with emerging technologies. Existing agent-based approaches within process mining and business process management have paved the way for identifying the validation methods for performance evaluation. The addressed research gaps primarily concern validation before delving deeper into specific research topics. These include improved validation methods, modelling of complex agents and environments, and a preliminary exploration of integrating process mining and business process management with emerging technologies
Third Workshop on Modelling of Objects, Components, and Agents
This booklet contains the proceedings of the Third International Workshop on Modelling of Objects, Components, and Agents (MOCA'04), October 11-13, 2004. The workshop is organised by the CPN group at the Department of Computer Science, University of Aarhus, Denmark and the "Theoretical Foundations of Computer Science" group at the University of Hamburg. The home page of the workshop is: http://www.daimi.au.dk/CPnets/workshop0
A formal descriptive theory of software-based creative practice
PhDCreative artefacts, from concert posters to architectural plans, are often created in entirely software-based workflows. Software tools can be easily made to record all user interactions, thereby capturing the observable part of creative practice. Although recording software-based creative practice is easy, analysing it is much harder. This is especially true if one wishes to analyse the cognitive process that underlies the recorded creative practice. There are currently no clear methods for the analysis of recorded creative practice, nor are there any suitable theories of the cognition underlying creative practice that can serve as the basis for the development of such methods. This thesis develops a formal descriptive theory of the cognition underlying software-based creative practice, with the aim of informing the development of analysis of recorded creative practice. The theory, called the Software-based Creative Practice Framework (SbCPF), fits with extended and predictive views of cognition. It characterises creative practice as a process of iteratively working from an abstract idea to a concrete artefact, whereby the required lowlevel detail to decide on action is imagined in flight, during practice. Furthermore, it argues that this iterative just-in-time imagination is necessary, because of the predictive nature of the mind. The SbCPF was developed through the use of a novel method for the analysis of creative practice displayed in video tutorials. This method is based on Grounded Theory, Rhetorical Structure Theory, Gesture Theory, Category Theory, and a novel taxonomy describing the relation of action to speech. The method is applied to produce a grounded theory of the creative practice of 3D modelling and animation with the Blender software. The grounded theory forms the basis of the aforementioned formal theory. Finally, the formal theory is further illustrated, evaluated, and explored by way of implementing a computational model.Queen Mary University of London, and the EPSRC Centre for Doctoral Training in Media and Arts Technology EP/G03723X/
Model-based Adaptation of Behavioural Mismatching Components
International audienceComponent-Based Software Engineering focuses on the reuse of existing software components. In practice, most components cannot be integrated directly into an application-to-be, because they are incompatible. Software Adaptation aims at generating, as automatically as possible, adaptors to compensate mismatch between component interfaces, and is therefore a promising solution for the development of a real market of components promoting software reuse. In this article, we present our approach for software adaptation which relies on an abstract notation based on synchronous vectors and transition systems for governing adaptation rules. Our proposal is supported by dedicated algorithms that generate automatically adaptor protocols. These algorithms have been implemented in a tool, called Adaptor, that can be used through a user-friendly graphical interface
Security Analysis of System Behaviour - From "Security by Design" to "Security at Runtime" -
The Internet today provides the environment for novel applications and
processes which may evolve way beyond pre-planned scope and
purpose. Security analysis is growing in complexity with the increase
in functionality, connectivity, and dynamics of current electronic
business processes. Technical processes within critical
infrastructures also have to cope with these developments. To tackle
the complexity of the security analysis, the application of models is
becoming standard practice. However, model-based support for security
analysis is not only needed in pre-operational phases but also during
process execution, in order to provide situational security awareness
at runtime.
This cumulative thesis provides three major contributions to modelling
methodology.
Firstly, this thesis provides an approach for model-based analysis and
verification of security and safety properties in order to support
fault prevention and fault removal in system design or redesign.
Furthermore, some construction principles for the design of
well-behaved scalable systems are given.
The second topic is the analysis of the exposition of vulnerabilities
in the software components of networked systems to exploitation by
internal or external threats. This kind of fault forecasting allows
the security assessment of alternative system configurations and
security policies. Validation and deployment of security policies
that minimise the attack surface can now improve fault tolerance and
mitigate the impact of successful attacks.
Thirdly, the approach is extended to runtime applicability. An
observing system monitors an event stream from the observed system
with the aim to detect faults - deviations from the specified
behaviour or security compliance violations - at runtime.
Furthermore, knowledge about the expected behaviour given by an
operational model is used to predict faults in the near
future. Building on this, a holistic security management strategy is
proposed. The architecture of the observing system is described and
the applicability of model-based security analysis at runtime is
demonstrated utilising processes from several industrial scenarios.
The results of this cumulative thesis are provided by 19 selected
peer-reviewed papers
Fundamental Approaches to Software Engineering
This open access book constitutes the proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020, which took place in Dublin, Ireland, in April 2020, and was held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020. The 23 full papers, 1 tool paper and 6 testing competition papers presented in this volume were carefully reviewed and selected from 81 submissions. The papers cover topics such as requirements engineering, software architectures, specification, software quality, validation, verification of functional and non-functional properties, model-driven development and model transformation, software processes, security and software evolution