Information Technology Reference
In-Depth Information
MappedElement SequenceEdge ∃target. ( ClosingGateway
2 incomingEdge.SequenceEdge ) Required
(23)
target ◦ incomingEdge isRequired
(24)
Exclusive Branching. Activities that appear in exclusive branches are sup-
posed to be exclusive, i.e., it is not allowed to execute activities from alternative
branches in a process execution. Axiom 25 defines each mapped element between
XOR-gateways as a subclass of Exclude .
MappedElement ∃successor.XORgateway ∃predecessor.XORgateway Exclude
(25)
Parallel Branching. If activities occur in parallel branches, they have to be
executed commonly, i.e., if an activity of the first branch is executed, then also
the activity of the second branch is executed. In Axiom 26, we define elements
between AND-gateways as subclasses of the class Conjunct .
MappedElement ∃successor.AN Dgateway ∃predecessor.AN Dgateway Conjunct
(26)
4 Validation Using Description Logics
Our aim is to ensure that the well-formedness constraints are satisfied in all
process models that can be derived from a process model template. The con-
straints are represented by logical formulas, DL expressions in our case. We use
the expression f Φ to represent a constraint on features and f Ω to represent a
constraint on elements of the business process. From a logical point of view,
checking whether the constraint given by f Φ ensures that the constraints repre-
sented by f Ω hold, can be realized by checking whether the implication f Φ
f Ω
holds for each interpretation, i.e., f Φ
f Ω
is a tautology.
f Ω for all mapped elements, we have
to tackle the following problems. (i) While the constraints in the problem space
are directly represented by the axioms, the constraints of the process model
template are implicitly given by the element's dependencies (cf. Sect. 3). Hence,
we have to classify and derive constraints of the mapped elements. (ii) We have
to guarantee that the same vocabulary and the same expression structure is used
in f Φ and f Ω . This is realized by building constraint expressions . (iii) Finally, we
have to check in DL whether the implication holds.
In Sect. 3.3, we specify implicit constraints of business processes and define
axioms in order to allow a dynamic classification of mapped and constrained
elements. These elements are categorized as subclasses of the classes Required ,
Conjunct and Exclude . Defined properties ( sibling and isRequired )aswellastheir
inverse properties help to get their counterparts. E.g., for the conjunct element
E , the counterpart ( E ) can be found by using the subsumption E
In order to test the implication f Φ
sibling.E .
Building Constraint Expressions. For the mapped elements, we build class
expressions f Φ and f Ω . To check the implication (subsumption in DL ( f Φ
f Ω )),
 
Search WWH ::




Custom Search