The document reflects on 10 years of Business Process Management conferences, noting key topics discussed including process modeling languages, enactment infrastructures, and process mining. It analyzes 289 conference papers tagged with various categories and observes that while enactment is a broad topic, areas like process improvement and performance analysis received less attention. The document also relates areas like flexibility, configuration, and mining as important and interrelated challenges in BPM.
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
A Decade of Business Process Management Conferences: Reflections on a Developing Discipline
1. A Decade of Business Process
Management Conferences:
Reflections on a Developing Discipline
Wil van der Aalst
vdaalst.com
Just before BPM 2003
2. How it all started …
• Petri nets conference 2003
• Grzegorz Rozenberg
• Earlier events:
− W. van der Aalst, G. De Michelis, and C.A. Ellis, editors. Workflow
Management: Net-based Concepts, Models, Techniques and
Tools (WFM’98), Lisbon, June 1998.
− J. Desel, A. Oberweis, W. Reisig, G. Rozenberg, editors. Petri Nets
and Business Process Management, Dagstuhl Seminar 98271,
July 1998.
− W. van der Aalst, J. Desel, and R. Kaschek, editors. Software
Architectures for Business Process Management (SABPM’99),
Heidelberg, June 1999.
− W. van der Aalst, J. Desel, and A. Oberweis, editors. Business
Process Management: Models, Techniques, and Empirical
Studies, LNCS 1806, 2000.
PAGE 1
33. A Decade of Business Process
Management Conferences
Reflections on a Developing Discipline
PAGE 32
34. Another variant of the BPM lifecycle
diagnosis/
requirements
adustment insight
discussion performance
animation analysis
enactment/
(re)design
monitoring data models
verification
documentation
specification
configuration/
implementation
configuration
PAGE 33
35. Four main activities related to BPM
creating a analyzing a process
process model using a process
to be used for model and/or event
discussion, model analyze logs (verification,
training, simulation, process
analysis or mining, etc.)
enactment
using a all other activities,
process model e.g., adjusting the
to control and process, reallocating
support
concrete
enact manage resources, or
managing large
cases collections of related
process models
PAGE 34
36. History and Origins of the Domain
user user
interface interface
application
BPM system
application
application
application
Michael Zisman, Carl Adam Petri,
SCOOP, 1977 Petri nets, 1962
Anatol Holt,
Information
Systems Theory
database database database Skip Ellis,
Office Talk,
Project, 1968
system system system 1979
BPM
1960 1975 1985 2000 business data/
process process
reengineering mining
WFM
operations
data management
modeling formal
methods
office software scientific
automation engineering management
PAGE 35
38. 20 BPM Use Cases
•Use cases to obtain a model [1-5]
•Use cases to obtain a configurable model [6-8]
•Use cases related to enactment [9-13]
•Use cases for model-only-based analysis [14-15]
•Use cases for log&model-based analysis [16-17]
•Use cases to repair, extend or improve process
models [18-20]
Notation:
M CM S D
D|N|E D|N|E
E
human model configurable information event diagnostics
D=descriptive model system data
N=normative
E=executable PAGE 37
40. Use Case 2:
Discover model from event data (DiscM)
discover model from
event data
E (DiscM) M
D|E
PAGE 39
41. Use Case 3:
Select model from collection (SelM)
select model from
collection
MM M
M (SelM)
D|N|E
D|N|E
PAGE 40
42. Use Case 4:
Merge models (MerM)
merge models
MM M
M (MerM)
D|N|E
D|N|E
PAGE 41
43. Use Case 5:
Compose model (CompM)
M M compose model
D|N|E D|N|E
(CompM) M
M
D|N|E
D|N|E
PAGE 42
44. Use Case 6:
Design configurable model (DesCM)
design configurable
model
(DesCM) CM
D|N|E
PAGE 43
45. Use Case 7: Merge models into
configurable model (MerCM)
merge models into
configurable model
MM CM
M (MerCM)
D|N|E
D|N|E
d
a b g h
cf
variant 1
dc
a b g h
d
e
a g h
fe
variant 2 f
PAGE 44
46. Use Case 8:
Configure configurable model (ConCM)
configure configurable
model
CM (ConCM) M
D|N|E D|N|E
c
d
a b g h
e
f
d
a g h
PAGE 45
f
54. Use Case 16: Check conformance using
event data (ConfED)
check conformance
using event data
M E (ConfED) CD
E
PAGE 53
55. Use Case 17: Analyze performance using
event data (PerfED)
analyze performance
using event data
M E (PerfED) PD
E
PAGE 54
56. Use Case 18:
Repair model (RepM)
repair model
M CD (RepM) M
D|N|E D|N|E
PAGE 55
57. Use Case 19:
Extend model (ExtM)
extend model
M E (ExtM) M
E E
resource information in the event log can
be used for social network analysis, role
discovery, and performance analysis
Sue Mike
timestamps in the event log
can be used to analyze waiting Mary
times in-between activities Pete attributes in the event log can be
used for decision point analysis
Norman
566
b 566
check="OK" and
report="Approved"
g
1391 1537
1391
971 c 971
1537
461 461
a e
start 930 930 end
1391 1537
h
1537 d 1537
146
146
146 f
PAGE 56
58. Use Case 20:
Improve model (ImpM)
improve model
M PD (ImpM) M
D|N|E D|N|E
PAGE 57
59. Overview Use Cases
13 diagnosis/ 2 18
19
requirements 20
adustment insight
16 17 7
discussion performance
animation analysis
1 5 14
enactment/
(re)design 3 6 15
monitoring data models 4 8
11 12 verification
documentation
specification
configuration/ 9
10 implementation
configuration
• Use cases to obtain a model [1-5]
• Use cases to obtain a configurable model [6-8]
• Use cases related to enactment [9-13]
• Use cases for model-only-based analysis [14-15]
• Use cases for log&model-based analysis [16-17]
• Use cases to repair, extend or improve process models [18-20]
PAGE 58
60. BPM proceedings (10 years) -
enactment is
broad topic surprising
focus on
not surprising verification
weakness: topics related to
process improvement and
performance analysis
score low
289 papers, 367 tags 59
PAGE
63. 6 BPM Key Concerns (not detailed here)
1. Process modeling languages (suggesting new
languages, comparing/evaluating languages, etc.)
2. Process enactment infrastructures (focus on
software and systems to execute, support, and
monitor processes)
3. Process model analysis (e.g., verification and
simulation; no event data is used)
4. Process mining (analysis based on event data)
5. Process flexibility (ability to deal with foreseen and
unforeseen changes)
6. Process reuse (configurable models, reference
models, process repositories, similarity search, etc.)
PAGE 62
66. Observations
• Disclaimer: tagging of 289 papers is highly subjective
and obvious classes may be missing (e.g., patterns,
process integration, collaboration).
• Perspectives (control-flow, data, resources, etc.) could
have been added as an additional dimension.
• Rapidly maturing discipline, but:
− Many papers introduce a new modeling language (Needed? Used
again?).
− Several papers cannot be linked to one of the 20 use cases in a
straightforward manner.
− Coverage of the domain can be improved.
− Many papers describe implementation efforts; however, frequently
the software is not available for the reader.
− Many papers include case studies, e.g., to test a new technique or
system, which is good. Unfortunately, most case studies seem rather
artificial. PAGE 65
68. BPM Challenges are Related
process
flexibility
variability at flexibility versus
different levels conformance
process process
configuration mining
cross-organizational mining
PAGE 67
69. Process Flexibility
process
flexibility
variability at flexibility versus
different levels conformance
process process
configuration mining
cross-organizational mining
PAGE 68
70. Taxonomy of Flexibility
flexibility by change
underspecification
flexibility by
process
definition flexibility by
degree of impact
definition
flexibility by
process deviation
instance
design time runtime
time at which flexibility is added
Helen Schonenberg, Ronny Mans, Nick Russell, Nataliya Mulyar, Wil M. P. van der Aalst:
Process Flexibility: A Survey of Contemporary Approaches. Lecture Notes in Business PAGE 69
Information Processing, 2008, Volume 10, Part 1, 16-30, DOI: 10.1007/978-3-540-68644-6_2
71. flexibility by change
underspecification
flexibility by
Flexibility by Definition process
definition flexibility by
degree of impact
definition
flexibility by
process deviation
instance
design time runtime
time at which flexibility is added
start a b c end
72. flexibility by change
underspecification
flexibility by
Flexibility by Deviation process
definition flexibility by
degree of impact
definition
flexibility by
process deviation
instance
design time runtime
time at which flexibility is added
start a b c end
73. flexibility by change
Flexibility by
underspecification
flexibility by
process
definition flexibility by
degree of impact
definition
Underspecification
flexibility by
process deviation
instance
design time runtime
time at which flexibility is added
start a ? c end
x y z
74. flexibility by change
underspecification
flexibility by
Flexibility by Change process
definition flexibility by
degree of impact
definition
flexibility by
process deviation
instance
design time runtime
time at which flexibility is added
start a b c end
start a c end
75. Procedural Versus Declarative
response: every occurrence of b
should be eventually followed by c or d
drink beer
c response
c2
c1
precedence
a c4 b
eat food feel bad
c3 non co-existence
d
precedence: every occurrence drink wine non co-existence: activities b and d
of d needs to be preceded by a cannot happen both for the same case
Declarative = anything is possible unless it is explicitly forbidden
Procedural = everything is impossible unless it is triggered explicitly
PAGE 74
76. Process Configuration
process
flexibility
variability at flexibility versus
different levels conformance
process process
configuration mining
cross-organizational mining
PAGE 75
77. Variants of the same process
d
a b g h
f
c
d
a b g h
e
f
c
d
a g h
e
f
PAGE 76
78. Configurable process models
• Reference models revisited, but now better (correct,
executable, etc.).
• Examples:
− 430 Dutch municipalities need to execute the same collection
of processes, but value their "couleur locale"
− Hertz has 8,650 rental locations in about 150 countries
worldwide all executing essentially the same set of
processes (but with local differences)
− All 94 U.S. District Courts in the United States share the same
set of workflows
• Process sharing will increase (cf. cloud computing,
SaaS, etc.)
• "Content" is often missing in BPM approaches!
PAGE 77
79. Process Mining
process
flexibility
variability at flexibility versus
different levels conformance
process process
configuration mining
cross-organizational mining
PAGE 78
83. BPM Challenges are Related
process
flexibility
process process
configuration mining
PAGE 82
84. Process Flexibility and Process Mining
potential
high
waste
degree of examination
e
la nc
ba
uncontrolled
low
chaos
low high
degree of flexibility
PAGE 83
85. Process and Case Dimensions
clustering and
classification
group
acbe
abce
ade
acbe
acbe
abce
abce
ade
ade concept
time drift
cross- location analysis
organizational
process
mining PAGE 84
86. Example: Hertz has 8,650 rental locations
and different types of customers
gold
silver
normal
PAGE 85
89. Example Questions
• How to detect
changes over time
(concept drift)?
• How to compare
process
flexibility process variants in
different
organizations (cross-
group organizational
process process
configuration mining
mining)?
time
location
PAGE 88
98. 10 Years of BPM Conferences
• Business Process Management
(BPM) is an important, relevant
and interesting topic.
• Provides challenging and
fascinating computer science
problems (verification, process
mining, enactment, flexibility, etc.).
• Requires connections to other
sciences (management science,
operations research, social
sciences, etc.).
PAGE 97
99. Recommendations
• Avoid introducing new languages without a clear
purpose (short lifetime, incomparable results).
• Artifacts (software and data) need to be made
available (suggestion: classify papers based on their
level of openness).
• Evaluate results based on a predefined criterion and
compare with other approaches.
• Many prototypes are developed from scratch and
"fade into oblivion", so as a community we should
build on shared platforms (and not always ask for
something "new").
• Contribution is not always clear; a paper should focus
on at least one of the 20 use cases. Suggestions:
− Further develop use case classification
− Tag papers based on these use cases
PAGE 98