SlideShare a Scribd company logo
1 of 64
Download to read offline
University of Stuttgart
Universitätsstr. 38
70569 Stuttgart
Germany
Phone +49-711-685 88477
Fax +49-711-685 88472
Research
Marigianna Skouradaki, Frank Leymann
Institute of Architecture of Application Systems
{firstname.lastname}@iaas.uni-stuttgart.de
“Detecting Frequently Recurring
Structures in
BPMN 2.0 Process Models”
SummerSOC 2015
22
Research
© Marigianna Skouradaki
BPMN 2.0
Process Models
Collection
Fragments
Repository
Workload
Mix
Graph
Matching
Selection
Criteria
Composition
Criteria
80%
20%
Motivation: Generation of Realistic Workload
33
Research
© Marigianna Skouradaki
Agenda
 Process Model Matching
 Basic Concepts
 Algorithms
 Validation & Discussion
 Conclusions & Outlook
4
Process Model Matching
55
Research
© Marigianna Skouradaki
BPMN 2.0 Collection Characteristics
 Detect the reoccurring structures on BPMN 2.0 process
models which:
 Might be anonymized (no text information available)
 Might be mock-up models (non-executable)
66
Research
© Marigianna Skouradaki
Text Matching
 Cannot be applied to anonymized models
77
Research
© Marigianna Skouradaki
Behavioral Matching
log
 Cannot be applied on mock-up models
log
2
88
Research
© Marigianna Skouradaki
Structural Matching
99
Research
© Marigianna Skouradaki
The Challenge of Graph Isomorphism
NonDeterministic Polynomial
Time
(NP – Complete)
The time required to solve the
problem using any currently
known algorithm increases very
quickly as the size of the
problem grows.
1010
Research
© Marigianna Skouradaki
Subgraph Isomorphism on BPMN 2.0 Process Models
BPMN 2.0 Process Models are special types of graphs
Subgraph isomorphism can be applied in lower complexity1
1 R. M Verma.; and S. W. Reyner; “An analysis of a good algorithm for the subtree problem, correlated,” SIAM J. Comput., vol. 18, no. 5,
pp. 906–908, Oct. 1989.
11
Basic Concepts
1212
Research
© Marigianna Skouradaki
Exiting Attributes: Nested
1313
Research
© Marigianna Skouradaki
Exiting Attributes: Different Positions
1414
Research
© Marigianna Skouradaki
Exiting Attributes: Partially Similar
1515
Research
© Marigianna Skouradaki
Process Fragment
A Process Fragment is a piece of process model with loose
completeness and consistency. The existence of process
graph elements (start, end, activities, context etc.) is
possible but not imperative in a process fragment.
However, a process fragment must have at least one
activity and there must be a way to convert it to an
executable process graph.2
1. It is not necessarily related with a complete process model
2. A starting point is not defined
3. Existence of split, merge node or event is optional
2D. Schumm, F. Leymann, Z. Ma, T. Scheibler, and S. Strauch, “Integrating Compliance into Business Processes: Process Fragments as
Reusable Compliance Controls” in MKWI’10, Göttingen, Germany, February 23-25, 2010, Ed., Conference Paper, pp. 2125–2137.
1616
Research
© Marigianna Skouradaki
Checkpoints & Relevant Process Fragments (RPFs)
 Checkpoint (the starting points)
 A pre-configured type of node that is used as start point of
the “extended” process fragments
 Relevant Process Fragment
 Exists in at least K business processes
 Starts with a checkpoint
 Has at least N nodes including the checkpoint
 Contains at least one activity
1717
Research
© Marigianna Skouradaki
Checkpoints & Relevant Process Fragments
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
1818
Research
© Marigianna Skouradaki
Checkpoints & Relevant Process Fragments
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
1919
Research
© Marigianna Skouradaki
Checkpoints & Relevant Process Fragments
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
RPF
RPF
2020
Research
© Marigianna Skouradaki
Checkpoints & Relevant Process Fragments
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
2121
Research
© Marigianna Skouradaki
Checkpoints & Relevant Process Fragments
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
RPF
RPF
2222
Research
© Marigianna Skouradaki
Checkpoints & Relevant Process Fragments
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
2323
Research
© Marigianna Skouradaki
Checkpoints & Relevant Process Fragments
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
RPF
24
Algorithms
2525
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
2626
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
2727
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
2828
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
2929
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
3030
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
3131
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
3232
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
3333
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
3434
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
3535
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
3636
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
3737
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
3838
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
3939
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
4040
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
4141
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
4242
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
4343
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
4444
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
4545
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
4646
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
4747
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
4848
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
4949
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
5050
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
5151
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
5252
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
5353
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
…continue likewise..
 Will not work for cycles
5454
Research
© Marigianna Skouradaki
Discover Duplicates and Count Appearance
RPF
Collection
Newly Discovered RPF
5555
Research
© Marigianna Skouradaki
Discover Duplicates and Count Appearance
RPF
Collection
Newly Discovered RPF
5656
Research
© Marigianna Skouradaki
Discover Duplicates and Count Appearance
RPF
Collection
Newly Discovered RPF
For each RPF in Collection:
If RPF have the same size:
COMPARE
5757
Research
© Marigianna Skouradaki
Discover Duplicates and Count Appearance
RPF
Collection
Newly Discovered RPF
5858
Research
© Marigianna Skouradaki
Discover Duplicates and Count Appearance
RPF
Collection
Newly Discovered RPF
2
5959
Research
© Marigianna Skouradaki
Discover Duplicates and Count Appearance
RPF
Collection
Newly Discovered RPF
6060
Research
© Marigianna Skouradaki
Discover Duplicates and Count Appearance
RPF
Collection
Newly Discovered RPF
1
61
Validation and Discussion
6262
Research
© Marigianna Skouradaki
Validation
 43 BPMN 2.0 Process Models
 BPMN 2.0 Standard Example Processes
 Models used in Pietsch and Wenzel, 2012
 903 Comparisons
 1544 non-filtered RPFs
 83.22% decrease of results when filtering duplicates
(259 RPFs)
 54 RPF appear > 1 time
Median = Threshold = 14
 27 RPFs with re-appearance rate above the threshold
6363
Research
© Marigianna Skouradaki
Some Representative RPF and Number of Appearance
ID Fragment Count
1 178
2 169
3 117
4 101
5 62
6 60
7 44
8 42
9 42
6464
Research
© Marigianna Skouradaki
Conclusions & Outlook
 Extension of RPF Discovery algorithm
 Automatic count of the RPF appearance in collection
 We have evaluated the approach on 43 BPMN 2.0 process models
 Conclusions on frequently used structures (best practices)
 Conclusions for collection’s special characteristics
 Extend the algorithms for the complete set of BPMN 2.0
 Apply to thousands real world BPMN 2.0 process models and
execute thorough analysis
 Implement the prototype for process synthesizing methodology
Thank You!!!
Marigianna Skouradaki: skourama@iaas.uni-stuttgart.de


More Related Content

Viewers also liked

BPMN MIWG Capability Demonstration BPM Eastern Europe 2015
BPMN MIWG Capability Demonstration   BPM Eastern Europe 2015BPMN MIWG Capability Demonstration   BPM Eastern Europe 2015
BPMN MIWG Capability Demonstration BPM Eastern Europe 2015Denis Gagné
 
BPM Standards - What is new in BPMN 2.0 and XPDL 2.2 (BBC 2011)
BPM Standards -  What is new in BPMN 2.0 and XPDL 2.2 (BBC 2011)BPM Standards -  What is new in BPMN 2.0 and XPDL 2.2 (BBC 2011)
BPM Standards - What is new in BPMN 2.0 and XPDL 2.2 (BBC 2011)Denis Gagné
 
BPMN MIWG Capability Demonstration Reston 2016
BPMN MIWG Capability Demonstration   Reston 2016BPMN MIWG Capability Demonstration   Reston 2016
BPMN MIWG Capability Demonstration Reston 2016Denis Gagné
 
BPMN 2.0 - an introduction to the Level 1 Palette
BPMN 2.0 - an introduction to the Level 1 PaletteBPMN 2.0 - an introduction to the Level 1 Palette
BPMN 2.0 - an introduction to the Level 1 PaletteDeclan Chellar
 
Ultimate guide to_bpmn2_2016_edition_110716
Ultimate guide to_bpmn2_2016_edition_110716Ultimate guide to_bpmn2_2016_edition_110716
Ultimate guide to_bpmn2_2016_edition_110716yomito_2
 
BPMN 2.0 Tutorial 01 - Basic Constructs
BPMN 2.0 Tutorial 01 - Basic ConstructsBPMN 2.0 Tutorial 01 - Basic Constructs
BPMN 2.0 Tutorial 01 - Basic ConstructsMichael zur Muehlen
 
Business Process Modeling with BPMN 2.0 - Second edition
Business Process Modeling with BPMN 2.0 - Second editionBusiness Process Modeling with BPMN 2.0 - Second edition
Business Process Modeling with BPMN 2.0 - Second editionGregor Polančič
 
Structured Business Process Modeling - Lavacon 2014
Structured Business Process Modeling - Lavacon 2014Structured Business Process Modeling - Lavacon 2014
Structured Business Process Modeling - Lavacon 2014Dr. Jackie Damrau, BPMN
 

Viewers also liked (9)

BPMN MIWG Capability Demonstration BPM Eastern Europe 2015
BPMN MIWG Capability Demonstration   BPM Eastern Europe 2015BPMN MIWG Capability Demonstration   BPM Eastern Europe 2015
BPMN MIWG Capability Demonstration BPM Eastern Europe 2015
 
BPM Standards - What is new in BPMN 2.0 and XPDL 2.2 (BBC 2011)
BPM Standards -  What is new in BPMN 2.0 and XPDL 2.2 (BBC 2011)BPM Standards -  What is new in BPMN 2.0 and XPDL 2.2 (BBC 2011)
BPM Standards - What is new in BPMN 2.0 and XPDL 2.2 (BBC 2011)
 
BPMN MIWG Capability Demonstration Reston 2016
BPMN MIWG Capability Demonstration   Reston 2016BPMN MIWG Capability Demonstration   Reston 2016
BPMN MIWG Capability Demonstration Reston 2016
 
BPMN 2.0 - an introduction to the Level 1 Palette
BPMN 2.0 - an introduction to the Level 1 PaletteBPMN 2.0 - an introduction to the Level 1 Palette
BPMN 2.0 - an introduction to the Level 1 Palette
 
Ultimate guide to_bpmn2_2016_edition_110716
Ultimate guide to_bpmn2_2016_edition_110716Ultimate guide to_bpmn2_2016_edition_110716
Ultimate guide to_bpmn2_2016_edition_110716
 
BPMN 2.0 Tutorial 01 - Basic Constructs
BPMN 2.0 Tutorial 01 - Basic ConstructsBPMN 2.0 Tutorial 01 - Basic Constructs
BPMN 2.0 Tutorial 01 - Basic Constructs
 
BPMN 2.0 Fundamentals
BPMN 2.0 FundamentalsBPMN 2.0 Fundamentals
BPMN 2.0 Fundamentals
 
Business Process Modeling with BPMN 2.0 - Second edition
Business Process Modeling with BPMN 2.0 - Second editionBusiness Process Modeling with BPMN 2.0 - Second edition
Business Process Modeling with BPMN 2.0 - Second edition
 
Structured Business Process Modeling - Lavacon 2014
Structured Business Process Modeling - Lavacon 2014Structured Business Process Modeling - Lavacon 2014
Structured Business Process Modeling - Lavacon 2014
 

Similar to Detecting Frequently Recurring Structures in BPMN 2.0 Process Models (SummerSOC 2015)

Application of Sub-Graph Isomorphism to Extract Reoccurring Structures from B...
Application of Sub-Graph Isomorphism to Extract Reoccurring Structures from B...Application of Sub-Graph Isomorphism to Extract Reoccurring Structures from B...
Application of Sub-Graph Isomorphism to Extract Reoccurring Structures from B...Marigianna Skouradaki
 
Personal Research Overview presented at the KU-NAIST Research Meeting
Personal Research Overview presented at the KU-NAIST Research MeetingPersonal Research Overview presented at the KU-NAIST Research Meeting
Personal Research Overview presented at the KU-NAIST Research MeetingChawanat Nakasan
 
Process Mining and Predictive Process Monitoring
Process Mining and Predictive Process MonitoringProcess Mining and Predictive Process Monitoring
Process Mining and Predictive Process MonitoringMarlon Dumas
 
Porting an MPI application to hybrid MPI+OpenMP with Reveal tool on Shaheen II
Porting an MPI application to hybrid MPI+OpenMP with Reveal tool on Shaheen IIPorting an MPI application to hybrid MPI+OpenMP with Reveal tool on Shaheen II
Porting an MPI application to hybrid MPI+OpenMP with Reveal tool on Shaheen IIGeorge Markomanolis
 
PhD Thesis: Mining abstractions in scientific workflows
PhD Thesis: Mining abstractions in scientific workflowsPhD Thesis: Mining abstractions in scientific workflows
PhD Thesis: Mining abstractions in scientific workflowsdgarijo
 
UKSG Conference 2015 - E-resources: ezPAARSE helps you discover who is readin...
UKSG Conference 2015 - E-resources: ezPAARSE helps you discover who is readin...UKSG Conference 2015 - E-resources: ezPAARSE helps you discover who is readin...
UKSG Conference 2015 - E-resources: ezPAARSE helps you discover who is readin...UKSG: connecting the knowledge community
 
Compliance driven process development with DCR graphs
Compliance driven process development with DCR graphsCompliance driven process development with DCR graphs
Compliance driven process development with DCR graphsHugo Andrés López
 
Neo4j GraphTour New York_Leveraging Graphs for AI_Neo4j
Neo4j GraphTour New York_Leveraging Graphs for AI_Neo4jNeo4j GraphTour New York_Leveraging Graphs for AI_Neo4j
Neo4j GraphTour New York_Leveraging Graphs for AI_Neo4jNeo4j
 
Comparison between the Plitt model and an artificial neural network in predic...
Comparison between the Plitt model and an artificial neural network in predic...Comparison between the Plitt model and an artificial neural network in predic...
Comparison between the Plitt model and an artificial neural network in predic...Neil Zietsman
 
Scaling Analytics with Apache Spark
Scaling Analytics with Apache SparkScaling Analytics with Apache Spark
Scaling Analytics with Apache SparkQuantUniversity
 
Spline: Data Lineage For Spark Structured Streaming
Spline: Data Lineage For Spark Structured StreamingSpline: Data Lineage For Spark Structured Streaming
Spline: Data Lineage For Spark Structured StreamingVaclav Kosar
 
Spm ap-network model-
Spm ap-network model-Spm ap-network model-
Spm ap-network model-Kanchana Devi
 
iFL: An Interactive Environment for Understanding Feature Implementations
iFL: An Interactive Environment for Understanding Feature ImplementationsiFL: An Interactive Environment for Understanding Feature Implementations
iFL: An Interactive Environment for Understanding Feature ImplementationsICSM 2010
 
Lec 09 network scheduling_techniques
Lec 09 network scheduling_techniquesLec 09 network scheduling_techniques
Lec 09 network scheduling_techniquesSAJID ALI RUK
 
Safeguarding Abila: Discovering Evolving Activist Networks
Safeguarding Abila: Discovering Evolving Activist NetworksSafeguarding Abila: Discovering Evolving Activist Networks
Safeguarding Abila: Discovering Evolving Activist NetworksParang Saraf
 
Extending the Stream/Table Duality into a Trinity, with Graphs (David Allen &...
Extending the Stream/Table Duality into a Trinity, with Graphs (David Allen &...Extending the Stream/Table Duality into a Trinity, with Graphs (David Allen &...
Extending the Stream/Table Duality into a Trinity, with Graphs (David Allen &...confluent
 
Slides: Safeguarding Abila through Multiple Data Perspectives
Slides: Safeguarding Abila through Multiple Data PerspectivesSlides: Safeguarding Abila through Multiple Data Perspectives
Slides: Safeguarding Abila through Multiple Data PerspectivesParang Saraf
 
Anomaly Detection based on Control-flow Pattern of Parallel Business Processes
Anomaly Detection based on Control-flow Pattern of Parallel Business ProcessesAnomaly Detection based on Control-flow Pattern of Parallel Business Processes
Anomaly Detection based on Control-flow Pattern of Parallel Business ProcessesTELKOMNIKA JOURNAL
 

Similar to Detecting Frequently Recurring Structures in BPMN 2.0 Process Models (SummerSOC 2015) (20)

Application of Sub-Graph Isomorphism to Extract Reoccurring Structures from B...
Application of Sub-Graph Isomorphism to Extract Reoccurring Structures from B...Application of Sub-Graph Isomorphism to Extract Reoccurring Structures from B...
Application of Sub-Graph Isomorphism to Extract Reoccurring Structures from B...
 
Personal Research Overview presented at the KU-NAIST Research Meeting
Personal Research Overview presented at the KU-NAIST Research MeetingPersonal Research Overview presented at the KU-NAIST Research Meeting
Personal Research Overview presented at the KU-NAIST Research Meeting
 
Process Mining and Predictive Process Monitoring
Process Mining and Predictive Process MonitoringProcess Mining and Predictive Process Monitoring
Process Mining and Predictive Process Monitoring
 
Porting an MPI application to hybrid MPI+OpenMP with Reveal tool on Shaheen II
Porting an MPI application to hybrid MPI+OpenMP with Reveal tool on Shaheen IIPorting an MPI application to hybrid MPI+OpenMP with Reveal tool on Shaheen II
Porting an MPI application to hybrid MPI+OpenMP with Reveal tool on Shaheen II
 
PhD Thesis: Mining abstractions in scientific workflows
PhD Thesis: Mining abstractions in scientific workflowsPhD Thesis: Mining abstractions in scientific workflows
PhD Thesis: Mining abstractions in scientific workflows
 
UKSG Conference 2015 - E-resources: ezPAARSE helps you discover who is readin...
UKSG Conference 2015 - E-resources: ezPAARSE helps you discover who is readin...UKSG Conference 2015 - E-resources: ezPAARSE helps you discover who is readin...
UKSG Conference 2015 - E-resources: ezPAARSE helps you discover who is readin...
 
Compliance driven process development with DCR graphs
Compliance driven process development with DCR graphsCompliance driven process development with DCR graphs
Compliance driven process development with DCR graphs
 
Neo4j GraphTour New York_Leveraging Graphs for AI_Neo4j
Neo4j GraphTour New York_Leveraging Graphs for AI_Neo4jNeo4j GraphTour New York_Leveraging Graphs for AI_Neo4j
Neo4j GraphTour New York_Leveraging Graphs for AI_Neo4j
 
Comparison between the Plitt model and an artificial neural network in predic...
Comparison between the Plitt model and an artificial neural network in predic...Comparison between the Plitt model and an artificial neural network in predic...
Comparison between the Plitt model and an artificial neural network in predic...
 
Scaling Analytics with Apache Spark
Scaling Analytics with Apache SparkScaling Analytics with Apache Spark
Scaling Analytics with Apache Spark
 
Spline: Data Lineage For Spark Structured Streaming
Spline: Data Lineage For Spark Structured StreamingSpline: Data Lineage For Spark Structured Streaming
Spline: Data Lineage For Spark Structured Streaming
 
Spm ap-network model-
Spm ap-network model-Spm ap-network model-
Spm ap-network model-
 
iFL: An Interactive Environment for Understanding Feature Implementations
iFL: An Interactive Environment for Understanding Feature ImplementationsiFL: An Interactive Environment for Understanding Feature Implementations
iFL: An Interactive Environment for Understanding Feature Implementations
 
Lec 09 network scheduling_techniques
Lec 09 network scheduling_techniquesLec 09 network scheduling_techniques
Lec 09 network scheduling_techniques
 
Safeguarding Abila: Discovering Evolving Activist Networks
Safeguarding Abila: Discovering Evolving Activist NetworksSafeguarding Abila: Discovering Evolving Activist Networks
Safeguarding Abila: Discovering Evolving Activist Networks
 
Icsm05.ppt
Icsm05.pptIcsm05.ppt
Icsm05.ppt
 
Extending the Stream/Table Duality into a Trinity, with Graphs (David Allen &...
Extending the Stream/Table Duality into a Trinity, with Graphs (David Allen &...Extending the Stream/Table Duality into a Trinity, with Graphs (David Allen &...
Extending the Stream/Table Duality into a Trinity, with Graphs (David Allen &...
 
06 pert cpm
06 pert cpm06 pert cpm
06 pert cpm
 
Slides: Safeguarding Abila through Multiple Data Perspectives
Slides: Safeguarding Abila through Multiple Data PerspectivesSlides: Safeguarding Abila through Multiple Data Perspectives
Slides: Safeguarding Abila through Multiple Data Perspectives
 
Anomaly Detection based on Control-flow Pattern of Parallel Business Processes
Anomaly Detection based on Control-flow Pattern of Parallel Business ProcessesAnomaly Detection based on Control-flow Pattern of Parallel Business Processes
Anomaly Detection based on Control-flow Pattern of Parallel Business Processes
 

Recently uploaded

Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noidabntitsolutionsrishis
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 

Recently uploaded (20)

Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 

Detecting Frequently Recurring Structures in BPMN 2.0 Process Models (SummerSOC 2015)