SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Downloaden Sie, um offline zu lesen
Where did I go wrong?

Explaining errors in process models
Niels Lohmann
Verification of processes and services
WS-Adressing

WSDM
WS-CDL

WSCI
WS-TX

WSRM

WS-AT

WS-C

BPEL4People

WS-TX

WSRF
WSFL

WS-Policy

WS-BPEL
WS-Routing

- more aspects and domains = new languages and checks
- domain-specific approaches are not flexible
- moving target

2
Model checking

general purpose verification approach:
1. formalize model and specification*
2. push a button

*

can be

hidden from
the user

3
Effectiveness and efficiency
- model checking works in reality
- successful applications in many domains
!

!

!

!

!

- “verify while you model”

4
Diagnosis
- in case of error: outputs
target state and
produce a witness path
- describes how target
state can be reached
- operational semantics:
can be simulated

target state
witness path
5
Diagnosis: the bad
- paths can become very long
- length correlates with

size of the model
- reports all events equally:
disregarding importance

6
Reasons for useless paths
detours

interleavings

indisputable parts

depth-first search

concurrency

bootstrapping

7
process in Fig. 2 and to which we added a start and an end event. This process model
contains a lack of synchronization error as well as a local deadlock, which are not so
easy to spot in the first place.

Running example

M2
M1
J1
F1

lack of synchronization
Fig. 4: Workflow graph with deadlock and lack of synchronization errors.
t4

p1

t1

t3

p5

t5

p6

p4

t6

p7

p10
t11
t7
p2
A local deadlockt2is a p3
reachable state s of the process that has a token on p8 incoman
p9
t13
p13
t9
t10
ing edge et8 of an AND-join such that each state that is in turn reachable from s also
p11

6

t12

p12
t14

p14

8
Reduction: obvious parts
- assumption: progress
- classification of transitions*
- only report decisions
t4
p1

t1

t3
p2

t2

p5

t5
p6

p4
p10

p3

p7

t11

t7

t9

t13

t10
p11

* not just XOR-gateways!

t12

p8

p13

t14

t8

p9

t6

p14

p12

9
Reduction: obvious parts
- assumption: progress
- classification of transitions*
- only report decisions
t4
p1

t1

t3
p2

t2

p5

t5
p6

p4
p10

p3

p7

t11

t7

t9

t13

t10
p11

* not just XOR-gateways!

t12

p8

p13

t14

t8

p9

t6

p14

p12

9
Reduction: obvious parts
t4
t1

p1

t3
p2

t2

p5

t5
p6

p4
p10

p3

p7

t11

t7

t9

t13

t10
p11

t1

t2

t9

t10

t11

t12

t14

p14

p12

t12

t8

p8

p13

t14

t8

p9

t6

t2

t3

t4

t5

10
Reduction: obvious parts
t4
t1

p1

t3
p2

t2

p5

t5
p6

p4
p10

p3

p7

t11

t7

t9

t13

t10
p11

t1

t2

t9

t10

“down”

t11

t12

t14

“down”

p14

p12

t12

t8

p8

p13

t14

t8

p9

t6

t2

t3

“up”

t4

t5

10
Table 1. Paths from the checks for local deadlocks

Reduction: obvious checks for local deadlocks
Table 1. Paths from the parts
library

A

avg. path length before / after
max. path length before / after
library
sum of path lengths before / after
avg. path length before / after
reduction
max. path length before / after
sum of path lengths before / after

B1

B2

B3

C

17.51 / 1.83
53 / 8
A
1699 / 178
17.51 / 1.83
89.52 %
53 / 8
1699 / 178

17.52 / 2.11
66 / 7
B1
1419 / 171
17.52 / 2.11
87.95 %
66 / 7
1419 / 171

16.06 / 1.54
56 / 6
B2
1349 / 129
16.06 / 1.54
90.44 %
56 / 6
1349 / 129

20.34 / 1.67
54 / 5
B3
1688 / 139
20.34 / 1.67
91.77 %
54 / 5
1688 / 139

13.40 / 2.30
21 / 3
C
134 / 23
13.40 / 2.30
82.84 %
21 / 3
134 / 23

reduction

Table 2. Paths 89.52 % checks for lack of90.44 %
from the
synchronization %
87.95 %
91.77

library

A
B1
B2
B3
Table 2. Paths from the checks for lack of synchronization

82.84 %
C

avg. path length before / after
30.83 / 3.17
10.47 / 0.66
12.16 / 0.68
11.50 / 0.59
51.00 / 7.57
max. path length before / after
89 / 13
52 / 7
100 / 8
103 / 14
120 / 17
library
A
B1
B2
B3
C
sum of path lengths before / after
1079 / 111
1047 / 66
1459 / 82
1507 / 77
357 / 53
avg. path length before / after
30.83 3.17
10.47 /
Table 3. Paths /from the 93.70 0.66 noninterference94.89 0.59 51.00 / 7.57
checks for 12.16 / 0.68 11.50 / %
reduction
89.71 %
%
94.38 %
85.15 %
max. path length before / after
89 / 13
52 / 7
100 / 8
103 / 14
120 / 17
sum of path lengths before / after
1079 / 111
1047 / 66
1459 / 82
1507 / 77
357 / 53
library
A
B1
B2
B3
C
reduction
89.71 %
93.70 %
94.38 %
94.89 %
85.15 %
avg. path length before / after
12.06 / 2.79
13.82 / 2.55
18.13 / 2.33
14.27 / 2.55
11.27 / 2.33
Information flow security. Furthermore, the/ same business process models were used
max. path length before / after
44 / 7
70 7
95 / 7
95 / 7
27 / 3
suma recent report [12] on information flow/ security. In / this case study, noninterfer169 / 35
in of path lengths before / after 19699 / 4557 5707 1054 13835 1777 17494 / 3130

ence [13] wasflow security. correctness criterion ensures that decisions from a secure
reduction
76.87 %
87.16 %
82.11 %
79.29 %
Information verified. This Furthermore,81.53same business process models were used
the %

domain cannot be reproduced by investigating public runtime case study, noninterferin a recent report [12] on information flow security. In this information of the busi-

11
Table 1. Paths from the checks for local deadlocks

Reduction: obvious checks for local deadlocks
Table 1. Paths from the parts
library

A

avg. path length before / after
max. path length before / after
library
sum of path lengths before / after
avg. path length before / after
reduction
max. path length before / after
sum of path lengths before / after

B1

B2

B3

C

17.51 / 1.83
53 / 8
A
1699 / 178
17.51 / 1.83
89.52 %
53 / 8
1699 / 178

17.52 / 2.11
66 / 7
B1
1419 / 171
17.52 / 2.11
87.95 %
66 / 7
1419 / 171

16.06 / 1.54
56 / 6
B2
1349 / 129
16.06 / 1.54
90.44 %
56 / 6
1349 / 129

20.34 / 1.67
54 / 5
B3
1688 / 139
20.34 / 1.67
91.77 %
54 / 5
1688 / 139

13.40 / 2.30
21 / 3
C
134 / 23
13.40 / 2.30
82.84 %
21 / 3
134 / 23

reduction

Table 2. Paths 89.52 % checks for lack of90.44 %
from the
synchronization %
87.95 %
91.77

library

A
B1
B2
B3
Table 2. Paths from the checks for lack of synchronization

82.84 %
C

avg. path length before / after
30.83 / 3.17
10.47 / 0.66
12.16 / 0.68
11.50 / 0.59
51.00 / 7.57
max. path length before / after
89 / 13
52 / 7
100 / 8
103 / 14
120 / 17
library
A
B1
B2
B3
C
sum of path lengths before / after
1079 / 111
1047 / 66
1459 / 82
1507 / 77
357 / 53
avg. path length before / after
30.83 3.17
10.47 /
Table 3. Paths /from the 93.70 0.66 noninterference94.89 0.59 51.00 / 7.57
checks for 12.16 / 0.68 11.50 / %
reduction
89.71 %
%
94.38 %
85.15 %
max. path length before / after
89 / 13
52 / 7
100 / 8
103 / 14
120 / 17
sum of path lengths before / after
1079 / 111
1047 / 66
1459 / 82
1507 / 77
357 / 53
library
A
B1
B2
B3
C
reduction
89.71 %
93.70 %
94.38 %
94.89 %
85.15 %
avg. path length before / after
12.06 / 2.79
13.82 / 2.55
18.13 / 2.33
14.27 / 2.55
11.27 / 2.33
Information flow security. Furthermore, the/ same business process models were used
max. path length before / after
44 / 7
70 7
95 / 7
95 / 7
27 / 3
suma recent report [12] on information flow/ security. In / this case study, noninterfer169 / 35
in of path lengths before / after 19699 / 4557 5707 1054 13835 1777 17494 / 3130

ence [13] wasflow security. correctness criterion ensures that decisions from a secure
reduction
76.87 %
87.16 %
82.11 %
79.29 %
Information verified. This Furthermore,81.53same business process models were used
the %

domain cannot be reproduced by investigating public runtime case study, noninterferin a recent report [12] on information flow security. In this information of the busi-

11
Reduction: spurious decisions
p2

p5

p5

p3
p1

p3
p6

p1

p6

p4

- some decisions determine others
- often occurs in non-free choice models
- can be model checked

12
Reduction: spurious decisions
p2

p5

p5

p3
p1

p3
p6

p1

p6

p4

- some decisions determine others
- often occurs in non-free choice models
- can be model checked

12
Table 4. Reduced paths from the checks for local deadlocks

Reduction: spurious decisions
library

Table 4. Reduced A
paths from the checks for local deadlocks
B1
B2
B3

avg. path length before / after
max. path length before / after
library
sum of path lengths before / after
avg. path length before / after
reduction length before / after
max. path
abortedpath lengths before / after
sum of checks

1.84 / 0.91
8 A2
/
178 / 88
1.84 / 0.91
50.562%
8/
1
178 / 88

2.11 / 0.67
7B1
/1
171 / 54
2.11 / 0.67
68.421%
7/
0
171 / 54

1.54 / 0.57
6B2
/1
129 / 49
1.54 / 0.57
62.79 %
6/1
1290/ 49

1.67 / 0.41
5B3
/1
139 / 34
1.67 / 0.41
75.54 %
5/1
1390/ 34

reduction
aborted checks

Table 5. Reduced

50.56 %
1
paths from

68.42 %
0
the checks for

library

Table 5. Reduced paths from the checks for lack B2 synchronization
of
A
B1
B3

62.79 %
75.54 %
0
0
lack of synchronization

avg. path length before / after
3.17 / 0.86
0.66 / 0.17
0.68 / 0.14
0.59 / 0.09
max. path length before / after
13A 2
/
7B1
/2
8B2
/2
14 / 2
library
B3
sum of path lengths before / after
111 / 30
66 / 17
82 / 17
72 / 12
avg. path length before / after
3.17 / 0.86
0.66 / 0.17
0.68 / 0.14
0.59 / 0.09
reduction length before / after
72.97 2
54.552%
79.27 %
84.42 2
max. path
13 / %
7/
8/2
14 / %
abortedpath lengths before / after
1
sum of checks
111 / 30
82 0 17
/
72 0
/
Table 6. Reduced paths from 66 4 checks for noninterference 12
the/ 17
reduction
aborted checks
library

72.97 %
1
A

54.55 %
4
B1

79.27 %
0
B2

84.42 %
0
B3

C
2.30 / 0.90
3C1
/
23 / 10
2.30 / 0.90
60.87 %
3/1
23 0 10
/
60.87 %
0

C
7.57 / 1.00
17 / 2
C
53 / 7
7.57 / 1.00
86.792
17 / %
534/ 7
86.79 %
4
C

could exploitbefore Petri net structure to calculate conflict /clusters 2.55identify 2.33 / 0.40
to / 0.63
possible
avg. path length the / after
2.79 / 0.99
2.55 / 0.75
2.33 0.55
max. path length before / after
7/2
7/2
7/2
7/2
3/1
conflict transitions. This allowed / for a quick check whether a transition is actually a
sum of path lengths before / after
4557 1614
1054 / 310
1777 / 423
3130 / 772
35 / 6
could exploit the Petri net structure to calculate conflict clusters to identify possible
conflict.
reduction
64.58 %
70.59 %
76.20 %
75.34 %
82.86 %
conflict transitions. This allowed for aas a sequences of transitions leading to the0goal
However, we still considered 12
paths quick 4check whether a transition is actually a
aborted checks
4
7
conflict.
state. As discussed earlier, this sequence may be an arbitrary linearization of originally

13
Reduction: unorder transitions

- Petri nets have explicit locality
- exploit to derive concurrency
- helps to “distribute” actions to components
- makes synchronization points (milestones) explicit

14
Reduction: unorder transitions
t4
t1

p1

t3
p2

t2

p5

t5
p6

p4
p10

p3

p7

t11

t7

t9

t13

t10
p11

t1

t2

t9

t10

t11

t12

t14

t12

t8

p8

p13

t14

t8

p9

t6

p14

p12

t2

t3

t4

t5
p10

p1

t1

p2

t2

p3

t9

p9

t10

p11

t12

p12

t14

p14

t8

p2

t2

p3

t3

p4

t4

t11

p6

p5

t5

p6

15
Reduction: unorder transitions

16
Summary
- paths can be shortened and uncluttered
- result is a partial order of important decisions
- applicable to any verification goal


Open issues
- error localization vs. explanation
- cyclic behavior
- How should a good diagnosis for $problem
look like?

17
Where did I go wrong?

Explaining errors in process models
Niels Lohmann

Weitere ähnliche Inhalte

Ähnlich wie Where did I go wrong? Explaining errors in process models

Instrument Condition Based Monitoring.ppt
Instrument Condition Based Monitoring.pptInstrument Condition Based Monitoring.ppt
Instrument Condition Based Monitoring.pptmuhamadzulhelmibinmo
 
Introductiontoflowchart 110630082600-phpapp01
Introductiontoflowchart 110630082600-phpapp01Introductiontoflowchart 110630082600-phpapp01
Introductiontoflowchart 110630082600-phpapp01VincentAcapen1
 
Software Verification, Validation and Testing
Software Verification, Validation and TestingSoftware Verification, Validation and Testing
Software Verification, Validation and TestingDr Sukhpal Singh Gill
 
Study 3: Detailed Design Hazards
Study 3: Detailed Design Hazards Study 3: Detailed Design Hazards
Study 3: Detailed Design Hazards Gerard B. Hawkins
 
Us4154988 method and means for accessing program memory of a common control t...
Us4154988 method and means for accessing program memory of a common control t...Us4154988 method and means for accessing program memory of a common control t...
Us4154988 method and means for accessing program memory of a common control t...satyanpitroda
 
Care and use manual waters x bridge columns
Care and use manual waters x bridge columnsCare and use manual waters x bridge columns
Care and use manual waters x bridge columnsJohn Omondi
 
Dg05 ch 03 elements of design
Dg05 ch 03 elements of designDg05 ch 03 elements of design
Dg05 ch 03 elements of designGizachew Kefelew
 
IMC Based Fractional Order Controller for Three Interacting Tank Process
IMC Based Fractional Order Controller for Three Interacting Tank ProcessIMC Based Fractional Order Controller for Three Interacting Tank Process
IMC Based Fractional Order Controller for Three Interacting Tank ProcessTELKOMNIKA JOURNAL
 
Circuit Theory 2: Filters Project Report
Circuit Theory 2: Filters Project ReportCircuit Theory 2: Filters Project Report
Circuit Theory 2: Filters Project ReportMichael Sandy
 
Design of Filter Circuits using MATLAB, Multisim, and Excel
Design of Filter Circuits using MATLAB, Multisim, and ExcelDesign of Filter Circuits using MATLAB, Multisim, and Excel
Design of Filter Circuits using MATLAB, Multisim, and ExcelDavid Sandy
 
Emerson Exchange 3D plots Process Analysis
Emerson Exchange 3D plots Process AnalysisEmerson Exchange 3D plots Process Analysis
Emerson Exchange 3D plots Process AnalysisEmerson Exchange
 
ECE260BMiniProject2Report
ECE260BMiniProject2ReportECE260BMiniProject2Report
ECE260BMiniProject2ReportFanyu Yang
 
Opportunity Assessment and Advanced Control
Opportunity Assessment and Advanced ControlOpportunity Assessment and Advanced Control
Opportunity Assessment and Advanced ControlJim Cahill
 
07 Speed, Travel Time & Delay Studies (Traffic Engineering هندسة المرور & Pro...
07 Speed, Travel Time & Delay Studies (Traffic Engineering هندسة المرور & Pro...07 Speed, Travel Time & Delay Studies (Traffic Engineering هندسة المرور & Pro...
07 Speed, Travel Time & Delay Studies (Traffic Engineering هندسة المرور & Pro...Hossam Shafiq I
 
Controller Tuning for Integrator Plus Delay Processes.
Controller Tuning for Integrator Plus Delay Processes.Controller Tuning for Integrator Plus Delay Processes.
Controller Tuning for Integrator Plus Delay Processes.theijes
 
A novel auto-tuning method for fractional order PID controllers
A novel auto-tuning method for fractional order PID controllersA novel auto-tuning method for fractional order PID controllers
A novel auto-tuning method for fractional order PID controllersISA Interchange
 
Heuristic approach to optimize the number of test cases for simple circuits
Heuristic approach to optimize the number of test cases for simple circuitsHeuristic approach to optimize the number of test cases for simple circuits
Heuristic approach to optimize the number of test cases for simple circuitsVLSICS Design
 

Ähnlich wie Where did I go wrong? Explaining errors in process models (20)

Instrument Condition Based Monitoring.ppt
Instrument Condition Based Monitoring.pptInstrument Condition Based Monitoring.ppt
Instrument Condition Based Monitoring.ppt
 
Introductiontoflowchart 110630082600-phpapp01
Introductiontoflowchart 110630082600-phpapp01Introductiontoflowchart 110630082600-phpapp01
Introductiontoflowchart 110630082600-phpapp01
 
AMBA 2.0 REPORT
AMBA 2.0 REPORTAMBA 2.0 REPORT
AMBA 2.0 REPORT
 
PID Tuning Rules
PID Tuning RulesPID Tuning Rules
PID Tuning Rules
 
Software Verification, Validation and Testing
Software Verification, Validation and TestingSoftware Verification, Validation and Testing
Software Verification, Validation and Testing
 
Study 3: Detailed Design Hazards
Study 3: Detailed Design Hazards Study 3: Detailed Design Hazards
Study 3: Detailed Design Hazards
 
Us4154988 method and means for accessing program memory of a common control t...
Us4154988 method and means for accessing program memory of a common control t...Us4154988 method and means for accessing program memory of a common control t...
Us4154988 method and means for accessing program memory of a common control t...
 
Care and use manual waters x bridge columns
Care and use manual waters x bridge columnsCare and use manual waters x bridge columns
Care and use manual waters x bridge columns
 
Dg05 ch 03 elements of design
Dg05 ch 03 elements of designDg05 ch 03 elements of design
Dg05 ch 03 elements of design
 
IMC Based Fractional Order Controller for Three Interacting Tank Process
IMC Based Fractional Order Controller for Three Interacting Tank ProcessIMC Based Fractional Order Controller for Three Interacting Tank Process
IMC Based Fractional Order Controller for Three Interacting Tank Process
 
Circuit Theory 2: Filters Project Report
Circuit Theory 2: Filters Project ReportCircuit Theory 2: Filters Project Report
Circuit Theory 2: Filters Project Report
 
Design of Filter Circuits using MATLAB, Multisim, and Excel
Design of Filter Circuits using MATLAB, Multisim, and ExcelDesign of Filter Circuits using MATLAB, Multisim, and Excel
Design of Filter Circuits using MATLAB, Multisim, and Excel
 
Emerson Exchange 3D plots Process Analysis
Emerson Exchange 3D plots Process AnalysisEmerson Exchange 3D plots Process Analysis
Emerson Exchange 3D plots Process Analysis
 
Model
Model Model
Model
 
ECE260BMiniProject2Report
ECE260BMiniProject2ReportECE260BMiniProject2Report
ECE260BMiniProject2Report
 
Opportunity Assessment and Advanced Control
Opportunity Assessment and Advanced ControlOpportunity Assessment and Advanced Control
Opportunity Assessment and Advanced Control
 
07 Speed, Travel Time & Delay Studies (Traffic Engineering هندسة المرور & Pro...
07 Speed, Travel Time & Delay Studies (Traffic Engineering هندسة المرور & Pro...07 Speed, Travel Time & Delay Studies (Traffic Engineering هندسة المرور & Pro...
07 Speed, Travel Time & Delay Studies (Traffic Engineering هندسة المرور & Pro...
 
Controller Tuning for Integrator Plus Delay Processes.
Controller Tuning for Integrator Plus Delay Processes.Controller Tuning for Integrator Plus Delay Processes.
Controller Tuning for Integrator Plus Delay Processes.
 
A novel auto-tuning method for fractional order PID controllers
A novel auto-tuning method for fractional order PID controllersA novel auto-tuning method for fractional order PID controllers
A novel auto-tuning method for fractional order PID controllers
 
Heuristic approach to optimize the number of test cases for simple circuits
Heuristic approach to optimize the number of test cases for simple circuitsHeuristic approach to optimize the number of test cases for simple circuits
Heuristic approach to optimize the number of test cases for simple circuits
 

Mehr von Universität Rostock

Pragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementationsPragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementationsUniversität Rostock
 
Decidability Results for Choreography Realization
Decidability Results for Choreography RealizationDecidability Results for Choreography Realization
Decidability Results for Choreography RealizationUniversität Rostock
 
Artifact-centric modeling using BPMN
Artifact-centric modeling using BPMNArtifact-centric modeling using BPMN
Artifact-centric modeling using BPMNUniversität Rostock
 
Compliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business ProcessesCompliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business ProcessesUniversität Rostock
 
Verification with LoLA: 7 Implementation
Verification with LoLA: 7 ImplementationVerification with LoLA: 7 Implementation
Verification with LoLA: 7 ImplementationUniversität Rostock
 
Verification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLAVerification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLAUniversität Rostock
 
Verification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case StudiesVerification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case StudiesUniversität Rostock
 
Verification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLAVerification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLAUniversität Rostock
 
Verification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space ReductionVerification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space ReductionUniversität Rostock
 
Verification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input LanguageVerification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input LanguageUniversität Rostock
 
Internal Behavior Reduction for Services
Internal Behavior Reduction for ServicesInternal Behavior Reduction for Services
Internal Behavior Reduction for ServicesUniversität Rostock
 
Karsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial SymposiumKarsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial SymposiumUniversität Rostock
 
Implementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDAImplementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDAUniversität Rostock
 
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...Universität Rostock
 
Demonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and FionaDemonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and FionaUniversität Rostock
 
service-technology.org — A tool family for correct
business processes and ser...
service-technology.org — A tool family for correct
business processes and ser...service-technology.org — A tool family for correct
business processes and ser...
service-technology.org — A tool family for correct
business processes and ser...Universität Rostock
 

Mehr von Universität Rostock (20)

Pragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementationsPragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementations
 
Decidability Results for Choreography Realization
Decidability Results for Choreography RealizationDecidability Results for Choreography Realization
Decidability Results for Choreography Realization
 
Artifact-centric modeling using BPMN
Artifact-centric modeling using BPMNArtifact-centric modeling using BPMN
Artifact-centric modeling using BPMN
 
Compliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business ProcessesCompliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business Processes
 
Verification with LoLA
Verification with LoLAVerification with LoLA
Verification with LoLA
 
Verification with LoLA: 7 Implementation
Verification with LoLA: 7 ImplementationVerification with LoLA: 7 Implementation
Verification with LoLA: 7 Implementation
 
Verification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLAVerification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLA
 
Verification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case StudiesVerification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case Studies
 
Verification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLAVerification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLA
 
Verification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space ReductionVerification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space Reduction
 
Verification with LoLA: 1 Basics
Verification with LoLA: 1 BasicsVerification with LoLA: 1 Basics
Verification with LoLA: 1 Basics
 
Verification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input LanguageVerification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input Language
 
Saarbruecken
SaarbrueckenSaarbruecken
Saarbruecken
 
Ws4 dsec talk @ Kickoff RS3
Ws4 dsec talk @ Kickoff RS3Ws4 dsec talk @ Kickoff RS3
Ws4 dsec talk @ Kickoff RS3
 
Internal Behavior Reduction for Services
Internal Behavior Reduction for ServicesInternal Behavior Reduction for Services
Internal Behavior Reduction for Services
 
Karsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial SymposiumKarsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial Symposium
 
Implementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDAImplementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDA
 
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
 
Demonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and FionaDemonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and Fiona
 
service-technology.org — A tool family for correct
business processes and ser...
service-technology.org — A tool family for correct
business processes and ser...service-technology.org — A tool family for correct
business processes and ser...
service-technology.org — A tool family for correct
business processes and ser...
 

Kürzlich hochgeladen

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 

Kürzlich hochgeladen (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 

Where did I go wrong? Explaining errors in process models

  • 1. Where did I go wrong? Explaining errors in process models Niels Lohmann
  • 2. Verification of processes and services WS-Adressing WSDM WS-CDL WSCI WS-TX WSRM WS-AT WS-C BPEL4People WS-TX WSRF WSFL WS-Policy WS-BPEL WS-Routing - more aspects and domains = new languages and checks - domain-specific approaches are not flexible - moving target 2
  • 3. Model checking general purpose verification approach: 1. formalize model and specification* 2. push a button * can be
 hidden from the user 3
  • 4. Effectiveness and efficiency - model checking works in reality - successful applications in many domains ! ! ! ! ! - “verify while you model” 4
  • 5. Diagnosis - in case of error: outputs target state and produce a witness path - describes how target state can be reached - operational semantics: can be simulated target state witness path 5
  • 6. Diagnosis: the bad - paths can become very long - length correlates with
 size of the model - reports all events equally: disregarding importance 6
  • 7. Reasons for useless paths detours interleavings indisputable parts depth-first search concurrency bootstrapping 7
  • 8. process in Fig. 2 and to which we added a start and an end event. This process model contains a lack of synchronization error as well as a local deadlock, which are not so easy to spot in the first place. Running example M2 M1 J1 F1 lack of synchronization Fig. 4: Workflow graph with deadlock and lack of synchronization errors. t4 p1 t1 t3 p5 t5 p6 p4 t6 p7 p10 t11 t7 p2 A local deadlockt2is a p3 reachable state s of the process that has a token on p8 incoman p9 t13 p13 t9 t10 ing edge et8 of an AND-join such that each state that is in turn reachable from s also p11 6 t12 p12 t14 p14 8
  • 9. Reduction: obvious parts - assumption: progress - classification of transitions* - only report decisions t4 p1 t1 t3 p2 t2 p5 t5 p6 p4 p10 p3 p7 t11 t7 t9 t13 t10 p11 * not just XOR-gateways! t12 p8 p13 t14 t8 p9 t6 p14 p12 9
  • 10. Reduction: obvious parts - assumption: progress - classification of transitions* - only report decisions t4 p1 t1 t3 p2 t2 p5 t5 p6 p4 p10 p3 p7 t11 t7 t9 t13 t10 p11 * not just XOR-gateways! t12 p8 p13 t14 t8 p9 t6 p14 p12 9
  • 13. Table 1. Paths from the checks for local deadlocks Reduction: obvious checks for local deadlocks Table 1. Paths from the parts library A avg. path length before / after max. path length before / after library sum of path lengths before / after avg. path length before / after reduction max. path length before / after sum of path lengths before / after B1 B2 B3 C 17.51 / 1.83 53 / 8 A 1699 / 178 17.51 / 1.83 89.52 % 53 / 8 1699 / 178 17.52 / 2.11 66 / 7 B1 1419 / 171 17.52 / 2.11 87.95 % 66 / 7 1419 / 171 16.06 / 1.54 56 / 6 B2 1349 / 129 16.06 / 1.54 90.44 % 56 / 6 1349 / 129 20.34 / 1.67 54 / 5 B3 1688 / 139 20.34 / 1.67 91.77 % 54 / 5 1688 / 139 13.40 / 2.30 21 / 3 C 134 / 23 13.40 / 2.30 82.84 % 21 / 3 134 / 23 reduction Table 2. Paths 89.52 % checks for lack of90.44 % from the synchronization % 87.95 % 91.77 library A B1 B2 B3 Table 2. Paths from the checks for lack of synchronization 82.84 % C avg. path length before / after 30.83 / 3.17 10.47 / 0.66 12.16 / 0.68 11.50 / 0.59 51.00 / 7.57 max. path length before / after 89 / 13 52 / 7 100 / 8 103 / 14 120 / 17 library A B1 B2 B3 C sum of path lengths before / after 1079 / 111 1047 / 66 1459 / 82 1507 / 77 357 / 53 avg. path length before / after 30.83 3.17 10.47 / Table 3. Paths /from the 93.70 0.66 noninterference94.89 0.59 51.00 / 7.57 checks for 12.16 / 0.68 11.50 / % reduction 89.71 % % 94.38 % 85.15 % max. path length before / after 89 / 13 52 / 7 100 / 8 103 / 14 120 / 17 sum of path lengths before / after 1079 / 111 1047 / 66 1459 / 82 1507 / 77 357 / 53 library A B1 B2 B3 C reduction 89.71 % 93.70 % 94.38 % 94.89 % 85.15 % avg. path length before / after 12.06 / 2.79 13.82 / 2.55 18.13 / 2.33 14.27 / 2.55 11.27 / 2.33 Information flow security. Furthermore, the/ same business process models were used max. path length before / after 44 / 7 70 7 95 / 7 95 / 7 27 / 3 suma recent report [12] on information flow/ security. In / this case study, noninterfer169 / 35 in of path lengths before / after 19699 / 4557 5707 1054 13835 1777 17494 / 3130 ence [13] wasflow security. correctness criterion ensures that decisions from a secure reduction 76.87 % 87.16 % 82.11 % 79.29 % Information verified. This Furthermore,81.53same business process models were used the % domain cannot be reproduced by investigating public runtime case study, noninterferin a recent report [12] on information flow security. In this information of the busi- 11
  • 14. Table 1. Paths from the checks for local deadlocks Reduction: obvious checks for local deadlocks Table 1. Paths from the parts library A avg. path length before / after max. path length before / after library sum of path lengths before / after avg. path length before / after reduction max. path length before / after sum of path lengths before / after B1 B2 B3 C 17.51 / 1.83 53 / 8 A 1699 / 178 17.51 / 1.83 89.52 % 53 / 8 1699 / 178 17.52 / 2.11 66 / 7 B1 1419 / 171 17.52 / 2.11 87.95 % 66 / 7 1419 / 171 16.06 / 1.54 56 / 6 B2 1349 / 129 16.06 / 1.54 90.44 % 56 / 6 1349 / 129 20.34 / 1.67 54 / 5 B3 1688 / 139 20.34 / 1.67 91.77 % 54 / 5 1688 / 139 13.40 / 2.30 21 / 3 C 134 / 23 13.40 / 2.30 82.84 % 21 / 3 134 / 23 reduction Table 2. Paths 89.52 % checks for lack of90.44 % from the synchronization % 87.95 % 91.77 library A B1 B2 B3 Table 2. Paths from the checks for lack of synchronization 82.84 % C avg. path length before / after 30.83 / 3.17 10.47 / 0.66 12.16 / 0.68 11.50 / 0.59 51.00 / 7.57 max. path length before / after 89 / 13 52 / 7 100 / 8 103 / 14 120 / 17 library A B1 B2 B3 C sum of path lengths before / after 1079 / 111 1047 / 66 1459 / 82 1507 / 77 357 / 53 avg. path length before / after 30.83 3.17 10.47 / Table 3. Paths /from the 93.70 0.66 noninterference94.89 0.59 51.00 / 7.57 checks for 12.16 / 0.68 11.50 / % reduction 89.71 % % 94.38 % 85.15 % max. path length before / after 89 / 13 52 / 7 100 / 8 103 / 14 120 / 17 sum of path lengths before / after 1079 / 111 1047 / 66 1459 / 82 1507 / 77 357 / 53 library A B1 B2 B3 C reduction 89.71 % 93.70 % 94.38 % 94.89 % 85.15 % avg. path length before / after 12.06 / 2.79 13.82 / 2.55 18.13 / 2.33 14.27 / 2.55 11.27 / 2.33 Information flow security. Furthermore, the/ same business process models were used max. path length before / after 44 / 7 70 7 95 / 7 95 / 7 27 / 3 suma recent report [12] on information flow/ security. In / this case study, noninterfer169 / 35 in of path lengths before / after 19699 / 4557 5707 1054 13835 1777 17494 / 3130 ence [13] wasflow security. correctness criterion ensures that decisions from a secure reduction 76.87 % 87.16 % 82.11 % 79.29 % Information verified. This Furthermore,81.53same business process models were used the % domain cannot be reproduced by investigating public runtime case study, noninterferin a recent report [12] on information flow security. In this information of the busi- 11
  • 15. Reduction: spurious decisions p2 p5 p5 p3 p1 p3 p6 p1 p6 p4 - some decisions determine others - often occurs in non-free choice models - can be model checked 12
  • 16. Reduction: spurious decisions p2 p5 p5 p3 p1 p3 p6 p1 p6 p4 - some decisions determine others - often occurs in non-free choice models - can be model checked 12
  • 17. Table 4. Reduced paths from the checks for local deadlocks Reduction: spurious decisions library Table 4. Reduced A paths from the checks for local deadlocks B1 B2 B3 avg. path length before / after max. path length before / after library sum of path lengths before / after avg. path length before / after reduction length before / after max. path abortedpath lengths before / after sum of checks 1.84 / 0.91 8 A2 / 178 / 88 1.84 / 0.91 50.562% 8/ 1 178 / 88 2.11 / 0.67 7B1 /1 171 / 54 2.11 / 0.67 68.421% 7/ 0 171 / 54 1.54 / 0.57 6B2 /1 129 / 49 1.54 / 0.57 62.79 % 6/1 1290/ 49 1.67 / 0.41 5B3 /1 139 / 34 1.67 / 0.41 75.54 % 5/1 1390/ 34 reduction aborted checks Table 5. Reduced 50.56 % 1 paths from 68.42 % 0 the checks for library Table 5. Reduced paths from the checks for lack B2 synchronization of A B1 B3 62.79 % 75.54 % 0 0 lack of synchronization avg. path length before / after 3.17 / 0.86 0.66 / 0.17 0.68 / 0.14 0.59 / 0.09 max. path length before / after 13A 2 / 7B1 /2 8B2 /2 14 / 2 library B3 sum of path lengths before / after 111 / 30 66 / 17 82 / 17 72 / 12 avg. path length before / after 3.17 / 0.86 0.66 / 0.17 0.68 / 0.14 0.59 / 0.09 reduction length before / after 72.97 2 54.552% 79.27 % 84.42 2 max. path 13 / % 7/ 8/2 14 / % abortedpath lengths before / after 1 sum of checks 111 / 30 82 0 17 / 72 0 / Table 6. Reduced paths from 66 4 checks for noninterference 12 the/ 17 reduction aborted checks library 72.97 % 1 A 54.55 % 4 B1 79.27 % 0 B2 84.42 % 0 B3 C 2.30 / 0.90 3C1 / 23 / 10 2.30 / 0.90 60.87 % 3/1 23 0 10 / 60.87 % 0 C 7.57 / 1.00 17 / 2 C 53 / 7 7.57 / 1.00 86.792 17 / % 534/ 7 86.79 % 4 C could exploitbefore Petri net structure to calculate conflict /clusters 2.55identify 2.33 / 0.40 to / 0.63 possible avg. path length the / after 2.79 / 0.99 2.55 / 0.75 2.33 0.55 max. path length before / after 7/2 7/2 7/2 7/2 3/1 conflict transitions. This allowed / for a quick check whether a transition is actually a sum of path lengths before / after 4557 1614 1054 / 310 1777 / 423 3130 / 772 35 / 6 could exploit the Petri net structure to calculate conflict clusters to identify possible conflict. reduction 64.58 % 70.59 % 76.20 % 75.34 % 82.86 % conflict transitions. This allowed for aas a sequences of transitions leading to the0goal However, we still considered 12 paths quick 4check whether a transition is actually a aborted checks 4 7 conflict. state. As discussed earlier, this sequence may be an arbitrary linearization of originally 13
  • 18. Reduction: unorder transitions - Petri nets have explicit locality - exploit to derive concurrency - helps to “distribute” actions to components - makes synchronization points (milestones) explicit 14
  • 21. Summary - paths can be shortened and uncluttered - result is a partial order of important decisions - applicable to any verification goal
 Open issues - error localization vs. explanation - cyclic behavior - How should a good diagnosis for $problem look like? 17
  • 22. Where did I go wrong? Explaining errors in process models Niels Lohmann