SlideShare a Scribd company logo
Strategy Synthesis
for Data-Aware Dynamic Systems
with Multiple Actors
KR 2020
Paolo Felli

Marco Montali
Massimiliano de Leoni
Data-process divide in dynamic systems
Data


Structural aspects


In
fi
nite quanti
fi
cation domain
Process


Actions and updates


System dynamics
Data-process divide in dynamic systems
Data


Structural aspects


In
fi
nite quanti
fi
cation domain
Process


Actions and updates


System dynamics
Explosive mix


Undecidability of basic tasks


A-priori propositionalisation
The case of Business Process Management
Data-process divide
Cer. Exp.
(date)
Length
(m)
Draft
(m)
Capacity
(TEU)
Cargo
(mg/cm2)
0 0 0 0 0
Enter
y, n
U
Ship Clearance
 today
> today < 260 < 10 < 1000
> today < 260 < 10 1000
> today < 260 [10,12] < 4000  0.75
> today < 260 [10,12] < 4000 > 0.75
> today [260,320) (10,13] < 6000  0.5
> today [260,320) (10,13] < 6000 > 0.5
> today [320,400) 13 > 4000  0.25
> today [320,400) 13 > 4000 > 0.25
n
y
n
y
n
y
n
y
n
1
2
3
4
5
6
7
8
9
Table 1: DMN representation of the ship clearance decision of Figure 1b
Enter Length
(m)
Cargo
(mg/cm2)
y,n 0 0
Refuel Area
none, indoor, outdoor
U
Refuel area determination
n
y  350
y > 350  0.3
y > 350 > 0.3
none
indoor
indoor
outdoor
1
2
3
4
Table 2: DMN representation of the refuel area determination decision of Figure 1b
er their corresponding datatypes. In Table 1, the input attributes are: (i) the certificate expira-
on date, (ii) the length, (iii) the size, (iv) the capacity, and (v) the amount of cargo residuals of
ship. Such attributes are nonnegative real numbers; this is captured by typing them as reals,
ding restriction “ 0” as facet. The rightmost, red cell represents the output attribute. In both
ses, there is only one output attribute, of type string. The cell below enumerates the possible
tput values produced by the decision table, in descending priority order. If a default output is
fined, it is underlined. This is the case for the none string in Table 2.
Every other row models a rule. The intuitive interpretation of such rules relies on the usual
f . ..then ...” pattern. For example, the first rule of Table 1 states that, if the certificate of the
ip is expired, then the ship cannot enter the port, that is, the enter output attribute is set to n
egardless of the other input attributes). The second rule, instead, states that, if the ship has a
lid certificate, a length shorter than 260 m, a draft smaller than 10 m, and a capacity smaller
an 1000 TEU, then the ship is allowed to enter the port (regardless of the cargo residuals it
rries). Other rules are interpreted similarly.
Ship
id-code


name
Certi
fi
cate
exp-date
Harbor
location
Attempt
when


outcome
tried entering into
owns
1
0..1
* *
receive
entrance request
record
ship info
inspect ship
ship id
acquire
certificate
record
cargo
residuals
record
exp. date
cargo residuals
certificate exp. date
decice
clearance
enter
refuel area
enter?
send
refusal
send
fuel area info
open
dock
N
Y
ship type (short name)
The case of Business Process Management
Data-process divide
Tasks read and write data. Some choices depend on data. Other choices are

resolved by agents. Agents are not always cooperative.
Which model for data-aware
dynamic systems?

How to verify properties of data-
aware dynamic systems?

How to account for multiple
agents and reason strategically?
Three main questions
Process:
fi
nite-state, labelled transition system
Data-Aware Dynamic Systems
0 1 2
1
4
3
choose
repeat
guess
wait cheat
win
Data: real variables
Data-Aware Dynamic Systems
0 1 2
1
4
3
choose
repeat
guess
wait cheat
win
num val
Glue: read/write guards
Data-Aware Dynamic Systems
0 1 2
1
4
3
choose
repeat
guess
wait cheat
win
num val
[ numw > 0 ] [ valw ≥ valr ]
[ valr ≥ numr ]
[ numw ≥ valr ]
Agents: control of actions, choices, variables
Data-Aware Dynamic Systems
0 1 2
1
4
3
choose
repeat
guess
wait cheat
win
num val
[ numw > 0 ] [ valw ≥ valr ]
[ valr ≥ numr ]
[ numw ≥ valr ]
Agents: control of actions, choices, variables
Data-Aware Dynamic Systems
0 1 2
1
4
3
choose
repeat
guess
wait cheat
win
num val
[ numw > 0 ] [ valw ≥ valr ]
[ valr ≥ numr ]
[ numw ≥ valr ]
Simple and useful
Corresponds to a model of data-aware Petri nets
studied in the literature (bounded, with interleaving
semantics). [Mannhardt, PhD Thesis 2018]

Captures BPMN with case data + DMN: two OMG
standard for process and decision modelling. [_, ER2018]

A fragment can be discovered from event logs using
existing process discovery techniques. [Mannhardt et al,
CAiSE2016]
Why this model?
Interlude
Con
fi
guration: state+variable assignment
Executing a DDS
0 1 2
1
4
3
choose
repeat
guess
wait cheat
win
num val
[ numw > 0 ] [ valw ≥ valr ]
[ valr ≥ numr ]
[ numw ≥ valr ]
t
o
k
e
n
o
n
s
t
a
t
e
variable assignment
Run: a
fi
nite trace with legal assignments
Executing a DDS
0 1 2
1
4
3
choose
repeat
guess
wait cheat
win
num val
[ numw > 0 ] [ valw ≥ valr ]
[ valr ≥ numr ]
[ numw ≥ valr ]
✓
s1,
⇢
num 50
val 0
◆
Conceptual reason (from BPM)
Each process execution is expected to eventually
terminate.

Technical reason (from KR)
Moving from in
fi
nite to
fi
nite traces usually does not impact
worst-case complexity…

… But has a huge impact in terms of practical algorithms!

• Direct application of
fi
nite-state automata, without the
need of detouring to automata over in
fi
nite structures.
Why
fi
nite traces?
Interlude
…
…
…
…
…
…
…
…
…
Reachability graph (in
fi
nite in two dimensions)
Execution semantics
0 1 2
choose guess
[ numw > 0 ] [ valw ≥ valr ]
choose
choose
choose
guess
guess
guess
⇢
num = 0
val = 0
⇢
num = 0.5
val = 0
⇢
num = 1
val = 0
⇢
num = 1
val = 0.75
⇢
num = 1
val = 3.4
⇢
num = 1
val = 0
⇢
num = 5
val = 0
0 1
1
2
2
2
1
…
…
…
…
…
…
…
…
…
…
…
…
• Atoms: check control state, check constraints.

• Standard temporal operators: labelled next, eventually, globally. 

• Interpreted over
fi
nite traces.
Linear temporal properties over the DDS
fi
nite traces
Specification language
me
st,
ss
of
le
is
ri-
),
a-
d,
by
rd
le
di
by
d,
nt
ment ↵ such that for each (v k) 2 C we have ↵(v) k
and, for each (v1 v2) 2 C, we have ↵(v1) ↵(v2).
4 Specification language
Given a DDS B, let LB be the language with grammar:
= true | C | b | ¬ | 1 ^ 2 | 1 _ 2 | hai | 3 | 2
where a 2 A, C is a constraint set over the variables in B
and b 2 B is a system state of B. We now give the semantics
on finite runs on RGB, for expressing properties on these
runs. For brevity, in what follows it is often convenient to
represent a constraint variable assignment ↵ as a constraint
set. Hence we define C↵
.
=
S
v2V {(v = ↵(v))}.
Intuitively, a formula = C is true when C is satisfiable
together with the current constraint variable assignment ↵
in the run of RGB, i.e., constraint variable assignment is a
solution of C (C [ C↵ is satisfiable). Similarly, an atomic
formula b requires the current system state to be b. hai
requires that is true in the run after executing action a (in
the next configuration, which must exist). 2 and 3 are read
as ‘for each step in the run’ and ‘eventually in the run’.
0 1 2
1
4
3
choose
repeat
guess
wait cheat
win
[ numw > 0 ] [ valw ≥ valr ]
[ valr ≥ numr ]
[ numw ≥ valr ]
b c
= val)}
= val)}
m = val)}
m 6= val)}
m = val)}
m 6= val)}
· · ·
{(num 3), win, (num = val)}
{(num < 3), win, (num = val)}
· · · a a0
⇢
num = 0
val = 0
b1
8
<
:
num > 0
val = 0
val < num
9
=
;
⇢
num < 3
num 6= val
a1
8
<
:
num > 0
val = 0
val < num
9
=
;
⇢
num 3
num 6= val
b2
8
<
:
num > 0
val = 0
val < num
9
=
;
⇢
num < 3
num 6= val b2
8
<
:v
⇢
n
b2
8
<
:
num > 0
val > 0
val num
9
=
;
⇢
num < 3
num 6= val
· · ·
wait, cheat
· · ·
wa
wait,
· · ·
guess
init choose guess
r = 3((num < 3) ^ hwini(val = num)), requiring the chosen real to b
1. Veri
fi
cation: check whether there exists a
witness for f in the reachability graph of B.

2. Strategy synthesis: given an agent a, compute
a strategy for a so that, no matter how the
other agents behave, the execution of the
strategy in the reachability graph of B yields f.
Given a DDS B and a formula f
Reasoning tasks
Veri
fi
cation
Example
{(num 3), ¬win, (num = val)}
{(num 3), ¬win, (num 6= val)}
· · · · · · a a0
⇢
n
a1
8
<
:
num > 0
val = 0
val < num
9
=
;
⇢
num 3
num 6= val 8
<
:
num > 0
val > 0
val num
9
=
;
· · ·
guess
init choose
e 4: Left: D for = 3((num < 3) ^ hwini(val = num)), requiring the
uess to be exact. Dots are used for labels not already labelling other outg
ols labelling arcs) showing a winning run. States are associated to two con
DB and the constraint set A. State labels refer to the states of D and DB.
ugh only three are in CGB (see Figure 2): two outcomes disambiguate b
ded to the set of assumptions A. A winning strategy exists if at least num
oller game moves guaranteeing to satisfy is {}, {pick(num, {num > 0, n
roller (with X  Y = ;). The objective is to control, at
step, the values of variables in Y in such a way that for
ossible values of those in X a certain formula is true.
set o
then
ing g
0 1 2
1
4
3
choose
repeat
guess
wait cheat
win
[ numw > 0 ] [ valw ≥ valr ]
[ valr ≥ numr ]
[ numw ≥ valr ]
Strategy synthesis
Example
0 1 2
1
4
3
choose
repeat
guess
wait cheat
win
num val
[ numw > 0 ] [ valw ≥ valr ]
[ valr ≥ numr ]
[ numw ≥ valr ]
b c
= val)}
6= val)}
m = val)}
m 6= val)}
m = val)}
m 6= val)}
· · ·
{(num 3), win, (num = val)}
{(num < 3), win, (num = val)}
· · · a a0
⇢
num = 0
val = 0
b1
8
<
:
num > 0
val = 0
val < num
9
=
;
⇢
num < 3
num 6= val
a1
8
<
:
num > 0
val = 0
val < num
9
=
;
⇢
num 3
num 6= val
b2
8
<
:
num > 0
val = 0
val < num
9
=
;
⇢
num < 3
num 6= val b
8
<
:
⇢
b2
8
<
:
num > 0
val > 0
val num
9
=
;
⇢
num < 3
num 6= val
· · ·
wait, cheat
· · ·
w
wait
· · ·
guess
init choose guess
or = 3((num < 3) ^ hwini(val = num)), requiring the chosen real to b
c
3), win, (num = val)}
< 3), win, (num = val)}
· · · a a0
⇢
num = 0
val = 0
b1
8
<
:
num > 0
val = 0
val < num
9
=
;
⇢
num < 3
num 6= val
a1
8
<
:
num > 0
val = 0
val < num
9
=
;
⇢
num 3
num 6= val
b2
8
<
:
num > 0
val = 0
val < num
9
=
;
⇢
num < 3
num 6= val b2
8
<
:
num > 0
val > 0
val < num
9
=
;
⇢
n
b2
8
<
:
num > 0
val > 0
val num
9
=
;
⇢
num < 3
num = val
b2
8
<
:
num > 0
val > 0
val num
9
=
;
⇢
num < 3
num 6= val
8
<
:v
· · ·
wait, cheat
· · ·
wait, cheat
· · ·
wait, cheat
· · ·
guess
init choose guess
c
c
w
m < 3) ^ hwini(val = num)), requiring the chosen real to be smaller than
Veri
fi
cation reduces to strategy synthesis
with a single agent controlling everything.

To solve strategy synthesis we take
inspiration from classical approaches [Pnueli
and Rosner 1998]. However: 

• The reachability graph is in
fi
nite.

• We have to handle constraints: “data-
aware” alphabet.
Observations
Reasoning tasks
Symbolically group variable assignments using constraint sets.

Constraints de
fi
ned over variables and constants used in the DDS.
From reachability graph to (
fi
nite) constraint graph
Interval abstraction
…
…
…
…
…
…
…
…
…
choose
choose
choose
guess
guess
guess
⇢
num = 0
val = 0
⇢
num = 0.5
val = 0
⇢
num = 1
val = 0
⇢
num = 1
val = 0.75
⇢
num = 1
val = 3.4
⇢
num = 1
val = 0
⇢
num = 5
val = 0
0 1
1
2
2
2
1
…
…
…
…
…
…
…
…
…
…
…
…
Symbolically group variable assignments using constraint sets.

Constraints de
fi
ned over variables and constants used in the DDS.
From reachability graph to (
fi
nite) constraint graph
Interval abstraction
…
…
…
…
…
…
…
…
…
choose
choose
choose
guess
guess
guess
⇢
num = 0
val = 0
⇢
num = 0.5
val = 0
⇢
num = 1
val = 0
⇢
num = 1
val = 0.75
⇢
num = 1
val = 3.4
⇢
num = 1
val = 0
⇢
num = 5
val = 0
0 1
1
2
2
2
1
…
…
…
…
…
…
…
…
…
…
…
…
⇢
num > 0
val = 0
8
<
:
num > 0
val = 0
val < num
9
=
;
8
<
:
num > 0
val > 0
val num
9
=
;
8
<
:
num > 0
val > 0
val < num
9
=
;
Symbolically group variable assignments using constraint sets.

Constraints de
fi
ned over variables and constants used in the DDS.
From reachability graph to (
fi
nite) constraint graph
Interval abstraction
…
…
…
choose guess
guess
guess
⇢
num = 0
val = 0
0 1 2
2
2
…
…
…
…
…
…
8
<
:
num > 0
val > 0
val num
9
=
;
8
<
:
num > 0
val = 0
val < num
9
=
;
8
<
:
num > 0
val > 0
val < num
9
=
;
⇢
num > 0
val = 0
The abstraction:

• is
fi
nite-state;

• preserves witnesses.
• f seen as an LTLf formula.
• First: constraints+tasks as syntactic
alphabet.
• Then: semantic curation to retain
only consistent transitions.
Given a DDS B and a formula f
Computing strategies
1
Formula to DFA
b c
3), ¬win, (num = val)}
3), ¬win, (num 6= val)}
3), ¬win, (num = val)}
3), ¬win, (num 6= val)}
· · ·
{(num 3), win, (num = val)}
{(num < 3), win, (num = val)}
· · · a a0
⇢
num = 0
val = 0
b1
8
<
:
num > 0
val = 0
val < num
⇢
num < 3
num 6= val
a1
8
<
:
num > 0
val = 0
val < num
9
=
;
⇢
num 3
num 6= val 8
<
:
num > 0
val > 0
val num
9
=
;
⇢
num <
num 6=
· · ·
guess
init choose
eft: D for = 3((num < 3) ^ hwini(val = num)), requiring the chose
o be exact. Dots are used for labels not already labelling other outgoing e
belling arcs) showing a winning run. States are associated to two constraint
d the constraint set A. State labels refer to the states of D and DB. Note
nly three are in CGB (see Figure 2): two outcomes disambiguate betwee
the set of assumptions A. A winning strategy exists if at least num, val 2
ame moves guaranteeing to satisfy is {}, {pick(num, {num > 0, num <
a b c
· · ·
{(num < 3), win, (num = val)}
{(num < 3), win, (num 6= val)}
{(num < 3), ¬win, (num = val)}
{(num < 3), ¬win, (num 6= val)}
{(num 3), ¬win, (num = val)}
{(num 3), ¬win, (num 6= val)}
· · ·
{(num 3), win, (num = val)}
{(num < 3), win, (num = val)}
· · · a
⇢
n
v
8
< num > 0
9
= ⇢
num 3
8
<
:
init
• f seen as an LTLf formula.
• First: constraints+tasks as syntactic
alphabet.
• Then: semantic curation to retain
only consistent transitions.
Given a DDS B and a formula f
Computing strategies
1
Formula to DFA
2 Constraint graph to DFA
• Variable assignments attached to
transitions to distinguish
nondeterminism on tasks.
• f seen as an LTLf formula.
• First: constraints+tasks as syntactic
alphabet.
• Then: semantic curation to retain
only consistent transitions.
Given a DDS B and a formula f
Computing strategies
1
Formula to DFA
2 Constraint graph to DFA
• Variable assignments attached to
transitions to distinguish
nondeterminism on tasks.
3
“data-aware” cross-product
• Semantic curation when combining
the two DFAs, retaining only
consistent combined transitions.
• Cross-products suitably “remembers”
the accumulated constraints.
• f seen as an LTLf formula.
• First: constraints+tasks as syntactic
alphabet.
• Then: semantic curation to retain
only consistent transitions.
Given a DDS B and a formula f
Computing strategies
1
Formula to DFA
2 Constraint graph to DFA
• Variable assignments attached to
transitions to distinguish
nondeterminism on tasks.
3
“data-aware” cross-product
• Semantic curation when combining
the two DFAs, retaining only
consistent combined transitions.
• Cross-products suitably “remembers”
the accumulated constraints.
4 Strategy extraction
• Classical backward computation of
winning sets.
• Gives an abstract strategy that
can be concretised step-wise.
Lower bound
2-EXPTIME from classical propositional setting.

Upper bound
Doubly-exponential in the formula.

Exponential in the compact DDS. Speci
fi
cally:
#variables, #used constants, #constraint 

[Constructions need to call constraint solver]
Complexity
Simple, relevant model for data-aware
dynamic systems.

Readily implementable, direct approach to
strategy synthesis, combining classical
strategy synthesis with data abstraction
techniques.

Application to BPM, also to repair process
models.
Conclusion

More Related Content

Similar to Strategy Synthesis for Data-Aware Dynamic Systems with Multiple Actors

ScalaMeter 2012
ScalaMeter 2012ScalaMeter 2012
ScalaMeter 2012
Aleksandar Prokopec
 
Search-driven String Constraint Solving for Vulnerability Detection
Search-driven String Constraint Solving for Vulnerability DetectionSearch-driven String Constraint Solving for Vulnerability Detection
Search-driven String Constraint Solving for Vulnerability Detection
Lionel Briand
 
R programming intro with examples
R programming intro with examplesR programming intro with examples
R programming intro with examples
Dennis
 
6. R data structures
6. R data structures6. R data structures
6. R data structures
ExternalEvents
 
RedisConf18 - CRDTs and Redis - From sequential to concurrent executions
RedisConf18 - CRDTs and Redis - From sequential to concurrent executionsRedisConf18 - CRDTs and Redis - From sequential to concurrent executions
RedisConf18 - CRDTs and Redis - From sequential to concurrent executions
Redis Labs
 
R and data mining
R and data miningR and data mining
R and data mining
Chaozhong Yang
 
A kernel-free particle method: Smile Problem Resolved
A kernel-free particle method: Smile Problem ResolvedA kernel-free particle method: Smile Problem Resolved
A kernel-free particle method: Smile Problem Resolved
Kaiju Capital Management
 
Processing Reachability Queries with Realistic Constraints on Massive Network...
Processing Reachability Queries with Realistic Constraints on Massive Network...Processing Reachability Queries with Realistic Constraints on Massive Network...
Processing Reachability Queries with Realistic Constraints on Massive Network...
BigMine
 
Bb2
Bb2Bb2
Bb2
brehot2
 
Efficient Data Stream Classification via Probabilistic Adaptive Windows
Efficient Data Stream Classification via Probabilistic Adaptive WindowsEfficient Data Stream Classification via Probabilistic Adaptive Windows
Efficient Data Stream Classification via Probabilistic Adaptive Windows
Albert Bifet
 
Vectors.pptx
Vectors.pptxVectors.pptx
Vectors.pptx
NivethithaM9
 
Xgboost
XgboostXgboost
Time Series Analysis and Mining with R
Time Series Analysis and Mining with RTime Series Analysis and Mining with R
Time Series Analysis and Mining with R
Yanchang Zhao
 
Schema anf
Schema anfSchema anf
Schema anf
Bank Industry
 
REDUCING TIMED AUTOMATA: A NEW APPROACH
REDUCING TIMED AUTOMATA: A NEW APPROACHREDUCING TIMED AUTOMATA: A NEW APPROACH
REDUCING TIMED AUTOMATA: A NEW APPROACH
ijistjournal
 
REDUCING TIMED AUTOMATA : A NEW APPROACH
REDUCING TIMED AUTOMATA : A NEW APPROACHREDUCING TIMED AUTOMATA : A NEW APPROACH
REDUCING TIMED AUTOMATA : A NEW APPROACH
ijistjournal
 
R Language Introduction
R Language IntroductionR Language Introduction
R Language Introduction
Khaled Al-Shamaa
 
Calculating Mine Probability in Minesweeper
Calculating Mine Probability in MinesweeperCalculating Mine Probability in Minesweeper
Calculating Mine Probability in Minesweeper
LukeVideckis
 
Towards Evaluating Size Reduction Techniques for Software Model Checking
Towards Evaluating Size Reduction Techniques for Software Model CheckingTowards Evaluating Size Reduction Techniques for Software Model Checking
Towards Evaluating Size Reduction Techniques for Software Model Checking
Akos Hajdu
 
MCQMC_talk_Chiheb_Ben_hammouda.pdf
MCQMC_talk_Chiheb_Ben_hammouda.pdfMCQMC_talk_Chiheb_Ben_hammouda.pdf
MCQMC_talk_Chiheb_Ben_hammouda.pdf
Chiheb Ben Hammouda
 

Similar to Strategy Synthesis for Data-Aware Dynamic Systems with Multiple Actors (20)

ScalaMeter 2012
ScalaMeter 2012ScalaMeter 2012
ScalaMeter 2012
 
Search-driven String Constraint Solving for Vulnerability Detection
Search-driven String Constraint Solving for Vulnerability DetectionSearch-driven String Constraint Solving for Vulnerability Detection
Search-driven String Constraint Solving for Vulnerability Detection
 
R programming intro with examples
R programming intro with examplesR programming intro with examples
R programming intro with examples
 
6. R data structures
6. R data structures6. R data structures
6. R data structures
 
RedisConf18 - CRDTs and Redis - From sequential to concurrent executions
RedisConf18 - CRDTs and Redis - From sequential to concurrent executionsRedisConf18 - CRDTs and Redis - From sequential to concurrent executions
RedisConf18 - CRDTs and Redis - From sequential to concurrent executions
 
R and data mining
R and data miningR and data mining
R and data mining
 
A kernel-free particle method: Smile Problem Resolved
A kernel-free particle method: Smile Problem ResolvedA kernel-free particle method: Smile Problem Resolved
A kernel-free particle method: Smile Problem Resolved
 
Processing Reachability Queries with Realistic Constraints on Massive Network...
Processing Reachability Queries with Realistic Constraints on Massive Network...Processing Reachability Queries with Realistic Constraints on Massive Network...
Processing Reachability Queries with Realistic Constraints on Massive Network...
 
Bb2
Bb2Bb2
Bb2
 
Efficient Data Stream Classification via Probabilistic Adaptive Windows
Efficient Data Stream Classification via Probabilistic Adaptive WindowsEfficient Data Stream Classification via Probabilistic Adaptive Windows
Efficient Data Stream Classification via Probabilistic Adaptive Windows
 
Vectors.pptx
Vectors.pptxVectors.pptx
Vectors.pptx
 
Xgboost
XgboostXgboost
Xgboost
 
Time Series Analysis and Mining with R
Time Series Analysis and Mining with RTime Series Analysis and Mining with R
Time Series Analysis and Mining with R
 
Schema anf
Schema anfSchema anf
Schema anf
 
REDUCING TIMED AUTOMATA: A NEW APPROACH
REDUCING TIMED AUTOMATA: A NEW APPROACHREDUCING TIMED AUTOMATA: A NEW APPROACH
REDUCING TIMED AUTOMATA: A NEW APPROACH
 
REDUCING TIMED AUTOMATA : A NEW APPROACH
REDUCING TIMED AUTOMATA : A NEW APPROACHREDUCING TIMED AUTOMATA : A NEW APPROACH
REDUCING TIMED AUTOMATA : A NEW APPROACH
 
R Language Introduction
R Language IntroductionR Language Introduction
R Language Introduction
 
Calculating Mine Probability in Minesweeper
Calculating Mine Probability in MinesweeperCalculating Mine Probability in Minesweeper
Calculating Mine Probability in Minesweeper
 
Towards Evaluating Size Reduction Techniques for Software Model Checking
Towards Evaluating Size Reduction Techniques for Software Model CheckingTowards Evaluating Size Reduction Techniques for Software Model Checking
Towards Evaluating Size Reduction Techniques for Software Model Checking
 
MCQMC_talk_Chiheb_Ben_hammouda.pdf
MCQMC_talk_Chiheb_Ben_hammouda.pdfMCQMC_talk_Chiheb_Ben_hammouda.pdf
MCQMC_talk_Chiheb_Ben_hammouda.pdf
 

More from Faculty of Computer Science - Free University of Bozen-Bolzano

From Case-Isolated to Object-Centric Processes - A Tale of two Models
From Case-Isolated to Object-Centric Processes - A Tale of two ModelsFrom Case-Isolated to Object-Centric Processes - A Tale of two Models
From Case-Isolated to Object-Centric Processes - A Tale of two Models
Faculty of Computer Science - Free University of Bozen-Bolzano
 
Reasoning on Labelled Petri Nets and Their Dynamics in a Stochastic Setting
Reasoning on Labelled Petri Nets and Their Dynamics in a Stochastic SettingReasoning on Labelled Petri Nets and Their Dynamics in a Stochastic Setting
Reasoning on Labelled Petri Nets and Their Dynamics in a Stochastic Setting
Faculty of Computer Science - Free University of Bozen-Bolzano
 
Constraints for Process Framing in Augmented BPM
Constraints for Process Framing in Augmented BPMConstraints for Process Framing in Augmented BPM
Constraints for Process Framing in Augmented BPM
Faculty of Computer Science - Free University of Bozen-Bolzano
 
Intelligent Systems for Process Mining
Intelligent Systems for Process MiningIntelligent Systems for Process Mining
Declarative process mining
Declarative process miningDeclarative process mining
Process Reasoning and Mining with Uncertainty
Process Reasoning and Mining with UncertaintyProcess Reasoning and Mining with Uncertainty
Process Reasoning and Mining with Uncertainty
Faculty of Computer Science - Free University of Bozen-Bolzano
 
From Case-Isolated to Object-Centric Processes
From Case-Isolated to Object-Centric ProcessesFrom Case-Isolated to Object-Centric Processes
From Case-Isolated to Object-Centric Processes
Faculty of Computer Science - Free University of Bozen-Bolzano
 
Modeling and Reasoning over Declarative Data-Aware Processes
Modeling and Reasoning over Declarative Data-Aware ProcessesModeling and Reasoning over Declarative Data-Aware Processes
Modeling and Reasoning over Declarative Data-Aware Processes
Faculty of Computer Science - Free University of Bozen-Bolzano
 
Soundness of Data-Aware Processes with Arithmetic Conditions
Soundness of Data-Aware Processes with Arithmetic ConditionsSoundness of Data-Aware Processes with Arithmetic Conditions
Soundness of Data-Aware Processes with Arithmetic Conditions
Faculty of Computer Science - Free University of Bozen-Bolzano
 
Probabilistic Trace Alignment
Probabilistic Trace AlignmentProbabilistic Trace Alignment
Extending Temporal Business Constraints with Uncertainty
Extending Temporal Business Constraints with UncertaintyExtending Temporal Business Constraints with Uncertainty
Extending Temporal Business Constraints with Uncertainty
Faculty of Computer Science - Free University of Bozen-Bolzano
 
Extending Temporal Business Constraints with Uncertainty
Extending Temporal Business Constraints with UncertaintyExtending Temporal Business Constraints with Uncertainty
Extending Temporal Business Constraints with Uncertainty
Faculty of Computer Science - Free University of Bozen-Bolzano
 
Modeling and Reasoning over Declarative Data-Aware Processes with Object-Cent...
Modeling and Reasoning over Declarative Data-Aware Processes with Object-Cent...Modeling and Reasoning over Declarative Data-Aware Processes with Object-Cent...
Modeling and Reasoning over Declarative Data-Aware Processes with Object-Cent...
Faculty of Computer Science - Free University of Bozen-Bolzano
 
From legacy data to event data
From legacy data to event dataFrom legacy data to event data
Putting Decisions in Perspective(s)
Putting Decisions in Perspective(s)Putting Decisions in Perspective(s)
Enriching Data Models with Behavioral Constraints
Enriching Data Models with Behavioral ConstraintsEnriching Data Models with Behavioral Constraints
Enriching Data Models with Behavioral Constraints
Faculty of Computer Science - Free University of Bozen-Bolzano
 
Representing and querying norm states using temporal ontology-based data access
Representing and querying norm states using temporal ontology-based data accessRepresenting and querying norm states using temporal ontology-based data access
Representing and querying norm states using temporal ontology-based data access
Faculty of Computer Science - Free University of Bozen-Bolzano
 
Compliance monitoring of multi-perspective declarative process models
Compliance monitoring of multi-perspective declarative process modelsCompliance monitoring of multi-perspective declarative process models
Compliance monitoring of multi-perspective declarative process models
Faculty of Computer Science - Free University of Bozen-Bolzano
 
Processes and organizations - a look behind the paper wall
Processes and organizations - a look behind the paper wallProcesses and organizations - a look behind the paper wall
Processes and organizations - a look behind the paper wall
Faculty of Computer Science - Free University of Bozen-Bolzano
 
Formal modeling and SMT-based parameterized verification of Data-Aware BPMN
Formal modeling and SMT-based parameterized verification of Data-Aware BPMNFormal modeling and SMT-based parameterized verification of Data-Aware BPMN
Formal modeling and SMT-based parameterized verification of Data-Aware BPMN
Faculty of Computer Science - Free University of Bozen-Bolzano
 

More from Faculty of Computer Science - Free University of Bozen-Bolzano (20)

From Case-Isolated to Object-Centric Processes - A Tale of two Models
From Case-Isolated to Object-Centric Processes - A Tale of two ModelsFrom Case-Isolated to Object-Centric Processes - A Tale of two Models
From Case-Isolated to Object-Centric Processes - A Tale of two Models
 
Reasoning on Labelled Petri Nets and Their Dynamics in a Stochastic Setting
Reasoning on Labelled Petri Nets and Their Dynamics in a Stochastic SettingReasoning on Labelled Petri Nets and Their Dynamics in a Stochastic Setting
Reasoning on Labelled Petri Nets and Their Dynamics in a Stochastic Setting
 
Constraints for Process Framing in Augmented BPM
Constraints for Process Framing in Augmented BPMConstraints for Process Framing in Augmented BPM
Constraints for Process Framing in Augmented BPM
 
Intelligent Systems for Process Mining
Intelligent Systems for Process MiningIntelligent Systems for Process Mining
Intelligent Systems for Process Mining
 
Declarative process mining
Declarative process miningDeclarative process mining
Declarative process mining
 
Process Reasoning and Mining with Uncertainty
Process Reasoning and Mining with UncertaintyProcess Reasoning and Mining with Uncertainty
Process Reasoning and Mining with Uncertainty
 
From Case-Isolated to Object-Centric Processes
From Case-Isolated to Object-Centric ProcessesFrom Case-Isolated to Object-Centric Processes
From Case-Isolated to Object-Centric Processes
 
Modeling and Reasoning over Declarative Data-Aware Processes
Modeling and Reasoning over Declarative Data-Aware ProcessesModeling and Reasoning over Declarative Data-Aware Processes
Modeling and Reasoning over Declarative Data-Aware Processes
 
Soundness of Data-Aware Processes with Arithmetic Conditions
Soundness of Data-Aware Processes with Arithmetic ConditionsSoundness of Data-Aware Processes with Arithmetic Conditions
Soundness of Data-Aware Processes with Arithmetic Conditions
 
Probabilistic Trace Alignment
Probabilistic Trace AlignmentProbabilistic Trace Alignment
Probabilistic Trace Alignment
 
Extending Temporal Business Constraints with Uncertainty
Extending Temporal Business Constraints with UncertaintyExtending Temporal Business Constraints with Uncertainty
Extending Temporal Business Constraints with Uncertainty
 
Extending Temporal Business Constraints with Uncertainty
Extending Temporal Business Constraints with UncertaintyExtending Temporal Business Constraints with Uncertainty
Extending Temporal Business Constraints with Uncertainty
 
Modeling and Reasoning over Declarative Data-Aware Processes with Object-Cent...
Modeling and Reasoning over Declarative Data-Aware Processes with Object-Cent...Modeling and Reasoning over Declarative Data-Aware Processes with Object-Cent...
Modeling and Reasoning over Declarative Data-Aware Processes with Object-Cent...
 
From legacy data to event data
From legacy data to event dataFrom legacy data to event data
From legacy data to event data
 
Putting Decisions in Perspective(s)
Putting Decisions in Perspective(s)Putting Decisions in Perspective(s)
Putting Decisions in Perspective(s)
 
Enriching Data Models with Behavioral Constraints
Enriching Data Models with Behavioral ConstraintsEnriching Data Models with Behavioral Constraints
Enriching Data Models with Behavioral Constraints
 
Representing and querying norm states using temporal ontology-based data access
Representing and querying norm states using temporal ontology-based data accessRepresenting and querying norm states using temporal ontology-based data access
Representing and querying norm states using temporal ontology-based data access
 
Compliance monitoring of multi-perspective declarative process models
Compliance monitoring of multi-perspective declarative process modelsCompliance monitoring of multi-perspective declarative process models
Compliance monitoring of multi-perspective declarative process models
 
Processes and organizations - a look behind the paper wall
Processes and organizations - a look behind the paper wallProcesses and organizations - a look behind the paper wall
Processes and organizations - a look behind the paper wall
 
Formal modeling and SMT-based parameterized verification of Data-Aware BPMN
Formal modeling and SMT-based parameterized verification of Data-Aware BPMNFormal modeling and SMT-based parameterized verification of Data-Aware BPMN
Formal modeling and SMT-based parameterized verification of Data-Aware BPMN
 

Recently uploaded

Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
University of Maribor
 
The binding of cosmological structures by massless topological defects
The binding of cosmological structures by massless topological defectsThe binding of cosmological structures by massless topological defects
The binding of cosmological structures by massless topological defects
Sérgio Sacani
 
Oedema_types_causes_pathophysiology.pptx
Oedema_types_causes_pathophysiology.pptxOedema_types_causes_pathophysiology.pptx
Oedema_types_causes_pathophysiology.pptx
muralinath2
 
Sharlene Leurig - Enabling Onsite Water Use with Net Zero Water
Sharlene Leurig - Enabling Onsite Water Use with Net Zero WaterSharlene Leurig - Enabling Onsite Water Use with Net Zero Water
Sharlene Leurig - Enabling Onsite Water Use with Net Zero Water
Texas Alliance of Groundwater Districts
 
Applied Science: Thermodynamics, Laws & Methodology.pdf
Applied Science: Thermodynamics, Laws & Methodology.pdfApplied Science: Thermodynamics, Laws & Methodology.pdf
Applied Science: Thermodynamics, Laws & Methodology.pdf
University of Hertfordshire
 
20240520 Planning a Circuit Simulator in JavaScript.pptx
20240520 Planning a Circuit Simulator in JavaScript.pptx20240520 Planning a Circuit Simulator in JavaScript.pptx
20240520 Planning a Circuit Simulator in JavaScript.pptx
Sharon Liu
 
Equivariant neural networks and representation theory
Equivariant neural networks and representation theoryEquivariant neural networks and representation theory
Equivariant neural networks and representation theory
Daniel Tubbenhauer
 
Travis Hills' Endeavors in Minnesota: Fostering Environmental and Economic Pr...
Travis Hills' Endeavors in Minnesota: Fostering Environmental and Economic Pr...Travis Hills' Endeavors in Minnesota: Fostering Environmental and Economic Pr...
Travis Hills' Endeavors in Minnesota: Fostering Environmental and Economic Pr...
Travis Hills MN
 
bordetella pertussis.................................ppt
bordetella pertussis.................................pptbordetella pertussis.................................ppt
bordetella pertussis.................................ppt
kejapriya1
 
The use of Nauplii and metanauplii artemia in aquaculture (brine shrimp).pptx
The use of Nauplii and metanauplii artemia in aquaculture (brine shrimp).pptxThe use of Nauplii and metanauplii artemia in aquaculture (brine shrimp).pptx
The use of Nauplii and metanauplii artemia in aquaculture (brine shrimp).pptx
MAGOTI ERNEST
 
Micronuclei test.M.sc.zoology.fisheries.
Micronuclei test.M.sc.zoology.fisheries.Micronuclei test.M.sc.zoology.fisheries.
Micronuclei test.M.sc.zoology.fisheries.
Aditi Bajpai
 
Nucleophilic Addition of carbonyl compounds.pptx
Nucleophilic Addition of carbonyl  compounds.pptxNucleophilic Addition of carbonyl  compounds.pptx
Nucleophilic Addition of carbonyl compounds.pptx
SSR02
 
Phenomics assisted breeding in crop improvement
Phenomics assisted breeding in crop improvementPhenomics assisted breeding in crop improvement
Phenomics assisted breeding in crop improvement
IshaGoswami9
 
NuGOweek 2024 Ghent programme overview flyer
NuGOweek 2024 Ghent programme overview flyerNuGOweek 2024 Ghent programme overview flyer
NuGOweek 2024 Ghent programme overview flyer
pablovgd
 
ANAMOLOUS SECONDARY GROWTH IN DICOT ROOTS.pptx
ANAMOLOUS SECONDARY GROWTH IN DICOT ROOTS.pptxANAMOLOUS SECONDARY GROWTH IN DICOT ROOTS.pptx
ANAMOLOUS SECONDARY GROWTH IN DICOT ROOTS.pptx
RASHMI M G
 
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
yqqaatn0
 
8.Isolation of pure cultures and preservation of cultures.pdf
8.Isolation of pure cultures and preservation of cultures.pdf8.Isolation of pure cultures and preservation of cultures.pdf
8.Isolation of pure cultures and preservation of cultures.pdf
by6843629
 
ESR spectroscopy in liquid food and beverages.pptx
ESR spectroscopy in liquid food and beverages.pptxESR spectroscopy in liquid food and beverages.pptx
ESR spectroscopy in liquid food and beverages.pptx
PRIYANKA PATEL
 
Chapter 12 - climate change and the energy crisis
Chapter 12 - climate change and the energy crisisChapter 12 - climate change and the energy crisis
Chapter 12 - climate change and the energy crisis
tonzsalvador2222
 
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
University of Maribor
 

Recently uploaded (20)

Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
 
The binding of cosmological structures by massless topological defects
The binding of cosmological structures by massless topological defectsThe binding of cosmological structures by massless topological defects
The binding of cosmological structures by massless topological defects
 
Oedema_types_causes_pathophysiology.pptx
Oedema_types_causes_pathophysiology.pptxOedema_types_causes_pathophysiology.pptx
Oedema_types_causes_pathophysiology.pptx
 
Sharlene Leurig - Enabling Onsite Water Use with Net Zero Water
Sharlene Leurig - Enabling Onsite Water Use with Net Zero WaterSharlene Leurig - Enabling Onsite Water Use with Net Zero Water
Sharlene Leurig - Enabling Onsite Water Use with Net Zero Water
 
Applied Science: Thermodynamics, Laws & Methodology.pdf
Applied Science: Thermodynamics, Laws & Methodology.pdfApplied Science: Thermodynamics, Laws & Methodology.pdf
Applied Science: Thermodynamics, Laws & Methodology.pdf
 
20240520 Planning a Circuit Simulator in JavaScript.pptx
20240520 Planning a Circuit Simulator in JavaScript.pptx20240520 Planning a Circuit Simulator in JavaScript.pptx
20240520 Planning a Circuit Simulator in JavaScript.pptx
 
Equivariant neural networks and representation theory
Equivariant neural networks and representation theoryEquivariant neural networks and representation theory
Equivariant neural networks and representation theory
 
Travis Hills' Endeavors in Minnesota: Fostering Environmental and Economic Pr...
Travis Hills' Endeavors in Minnesota: Fostering Environmental and Economic Pr...Travis Hills' Endeavors in Minnesota: Fostering Environmental and Economic Pr...
Travis Hills' Endeavors in Minnesota: Fostering Environmental and Economic Pr...
 
bordetella pertussis.................................ppt
bordetella pertussis.................................pptbordetella pertussis.................................ppt
bordetella pertussis.................................ppt
 
The use of Nauplii and metanauplii artemia in aquaculture (brine shrimp).pptx
The use of Nauplii and metanauplii artemia in aquaculture (brine shrimp).pptxThe use of Nauplii and metanauplii artemia in aquaculture (brine shrimp).pptx
The use of Nauplii and metanauplii artemia in aquaculture (brine shrimp).pptx
 
Micronuclei test.M.sc.zoology.fisheries.
Micronuclei test.M.sc.zoology.fisheries.Micronuclei test.M.sc.zoology.fisheries.
Micronuclei test.M.sc.zoology.fisheries.
 
Nucleophilic Addition of carbonyl compounds.pptx
Nucleophilic Addition of carbonyl  compounds.pptxNucleophilic Addition of carbonyl  compounds.pptx
Nucleophilic Addition of carbonyl compounds.pptx
 
Phenomics assisted breeding in crop improvement
Phenomics assisted breeding in crop improvementPhenomics assisted breeding in crop improvement
Phenomics assisted breeding in crop improvement
 
NuGOweek 2024 Ghent programme overview flyer
NuGOweek 2024 Ghent programme overview flyerNuGOweek 2024 Ghent programme overview flyer
NuGOweek 2024 Ghent programme overview flyer
 
ANAMOLOUS SECONDARY GROWTH IN DICOT ROOTS.pptx
ANAMOLOUS SECONDARY GROWTH IN DICOT ROOTS.pptxANAMOLOUS SECONDARY GROWTH IN DICOT ROOTS.pptx
ANAMOLOUS SECONDARY GROWTH IN DICOT ROOTS.pptx
 
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
 
8.Isolation of pure cultures and preservation of cultures.pdf
8.Isolation of pure cultures and preservation of cultures.pdf8.Isolation of pure cultures and preservation of cultures.pdf
8.Isolation of pure cultures and preservation of cultures.pdf
 
ESR spectroscopy in liquid food and beverages.pptx
ESR spectroscopy in liquid food and beverages.pptxESR spectroscopy in liquid food and beverages.pptx
ESR spectroscopy in liquid food and beverages.pptx
 
Chapter 12 - climate change and the energy crisis
Chapter 12 - climate change and the energy crisisChapter 12 - climate change and the energy crisis
Chapter 12 - climate change and the energy crisis
 
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
 

Strategy Synthesis for Data-Aware Dynamic Systems with Multiple Actors

  • 1. Strategy Synthesis for Data-Aware Dynamic Systems with Multiple Actors KR 2020 Paolo Felli Marco Montali Massimiliano de Leoni
  • 2. Data-process divide in dynamic systems Data Structural aspects In fi nite quanti fi cation domain Process Actions and updates System dynamics
  • 3. Data-process divide in dynamic systems Data Structural aspects In fi nite quanti fi cation domain Process Actions and updates System dynamics Explosive mix Undecidability of basic tasks A-priori propositionalisation
  • 4. The case of Business Process Management Data-process divide Cer. Exp. (date) Length (m) Draft (m) Capacity (TEU) Cargo (mg/cm2) 0 0 0 0 0 Enter y, n U Ship Clearance  today > today < 260 < 10 < 1000 > today < 260 < 10 1000 > today < 260 [10,12] < 4000  0.75 > today < 260 [10,12] < 4000 > 0.75 > today [260,320) (10,13] < 6000  0.5 > today [260,320) (10,13] < 6000 > 0.5 > today [320,400) 13 > 4000  0.25 > today [320,400) 13 > 4000 > 0.25 n y n y n y n y n 1 2 3 4 5 6 7 8 9 Table 1: DMN representation of the ship clearance decision of Figure 1b Enter Length (m) Cargo (mg/cm2) y,n 0 0 Refuel Area none, indoor, outdoor U Refuel area determination n y  350 y > 350  0.3 y > 350 > 0.3 none indoor indoor outdoor 1 2 3 4 Table 2: DMN representation of the refuel area determination decision of Figure 1b er their corresponding datatypes. In Table 1, the input attributes are: (i) the certificate expira- on date, (ii) the length, (iii) the size, (iv) the capacity, and (v) the amount of cargo residuals of ship. Such attributes are nonnegative real numbers; this is captured by typing them as reals, ding restriction “ 0” as facet. The rightmost, red cell represents the output attribute. In both ses, there is only one output attribute, of type string. The cell below enumerates the possible tput values produced by the decision table, in descending priority order. If a default output is fined, it is underlined. This is the case for the none string in Table 2. Every other row models a rule. The intuitive interpretation of such rules relies on the usual f . ..then ...” pattern. For example, the first rule of Table 1 states that, if the certificate of the ip is expired, then the ship cannot enter the port, that is, the enter output attribute is set to n egardless of the other input attributes). The second rule, instead, states that, if the ship has a lid certificate, a length shorter than 260 m, a draft smaller than 10 m, and a capacity smaller an 1000 TEU, then the ship is allowed to enter the port (regardless of the cargo residuals it rries). Other rules are interpreted similarly. Ship id-code name Certi fi cate exp-date Harbor location Attempt when outcome tried entering into owns 1 0..1 * * receive entrance request record ship info inspect ship ship id acquire certificate record cargo residuals record exp. date cargo residuals certificate exp. date decice clearance enter refuel area enter? send refusal send fuel area info open dock N Y ship type (short name)
  • 5. The case of Business Process Management Data-process divide Tasks read and write data. Some choices depend on data. Other choices are
 resolved by agents. Agents are not always cooperative.
  • 6. Which model for data-aware dynamic systems? How to verify properties of data- aware dynamic systems? How to account for multiple agents and reason strategically? Three main questions
  • 7. Process: fi nite-state, labelled transition system Data-Aware Dynamic Systems 0 1 2 1 4 3 choose repeat guess wait cheat win
  • 8. Data: real variables Data-Aware Dynamic Systems 0 1 2 1 4 3 choose repeat guess wait cheat win num val
  • 9. Glue: read/write guards Data-Aware Dynamic Systems 0 1 2 1 4 3 choose repeat guess wait cheat win num val [ numw > 0 ] [ valw ≥ valr ] [ valr ≥ numr ] [ numw ≥ valr ]
  • 10. Agents: control of actions, choices, variables Data-Aware Dynamic Systems 0 1 2 1 4 3 choose repeat guess wait cheat win num val [ numw > 0 ] [ valw ≥ valr ] [ valr ≥ numr ] [ numw ≥ valr ]
  • 11. Agents: control of actions, choices, variables Data-Aware Dynamic Systems 0 1 2 1 4 3 choose repeat guess wait cheat win num val [ numw > 0 ] [ valw ≥ valr ] [ valr ≥ numr ] [ numw ≥ valr ]
  • 12. Simple and useful Corresponds to a model of data-aware Petri nets studied in the literature (bounded, with interleaving semantics). [Mannhardt, PhD Thesis 2018] Captures BPMN with case data + DMN: two OMG standard for process and decision modelling. [_, ER2018] A fragment can be discovered from event logs using existing process discovery techniques. [Mannhardt et al, CAiSE2016] Why this model? Interlude
  • 13. Con fi guration: state+variable assignment Executing a DDS 0 1 2 1 4 3 choose repeat guess wait cheat win num val [ numw > 0 ] [ valw ≥ valr ] [ valr ≥ numr ] [ numw ≥ valr ] t o k e n o n s t a t e variable assignment
  • 14. Run: a fi nite trace with legal assignments Executing a DDS 0 1 2 1 4 3 choose repeat guess wait cheat win num val [ numw > 0 ] [ valw ≥ valr ] [ valr ≥ numr ] [ numw ≥ valr ] ✓ s1, ⇢ num 50 val 0 ◆
  • 15. Conceptual reason (from BPM) Each process execution is expected to eventually terminate. Technical reason (from KR) Moving from in fi nite to fi nite traces usually does not impact worst-case complexity… … But has a huge impact in terms of practical algorithms! • Direct application of fi nite-state automata, without the need of detouring to automata over in fi nite structures. Why fi nite traces? Interlude
  • 16. … … … … … … … … … Reachability graph (in fi nite in two dimensions) Execution semantics 0 1 2 choose guess [ numw > 0 ] [ valw ≥ valr ] choose choose choose guess guess guess ⇢ num = 0 val = 0 ⇢ num = 0.5 val = 0 ⇢ num = 1 val = 0 ⇢ num = 1 val = 0.75 ⇢ num = 1 val = 3.4 ⇢ num = 1 val = 0 ⇢ num = 5 val = 0 0 1 1 2 2 2 1 … … … … … … … … … … … …
  • 17. • Atoms: check control state, check constraints. • Standard temporal operators: labelled next, eventually, globally. • Interpreted over fi nite traces. Linear temporal properties over the DDS fi nite traces Specification language me st, ss of le is ri- ), a- d, by rd le di by d, nt ment ↵ such that for each (v k) 2 C we have ↵(v) k and, for each (v1 v2) 2 C, we have ↵(v1) ↵(v2). 4 Specification language Given a DDS B, let LB be the language with grammar: = true | C | b | ¬ | 1 ^ 2 | 1 _ 2 | hai | 3 | 2 where a 2 A, C is a constraint set over the variables in B and b 2 B is a system state of B. We now give the semantics on finite runs on RGB, for expressing properties on these runs. For brevity, in what follows it is often convenient to represent a constraint variable assignment ↵ as a constraint set. Hence we define C↵ . = S v2V {(v = ↵(v))}. Intuitively, a formula = C is true when C is satisfiable together with the current constraint variable assignment ↵ in the run of RGB, i.e., constraint variable assignment is a solution of C (C [ C↵ is satisfiable). Similarly, an atomic formula b requires the current system state to be b. hai requires that is true in the run after executing action a (in the next configuration, which must exist). 2 and 3 are read as ‘for each step in the run’ and ‘eventually in the run’. 0 1 2 1 4 3 choose repeat guess wait cheat win [ numw > 0 ] [ valw ≥ valr ] [ valr ≥ numr ] [ numw ≥ valr ] b c = val)} = val)} m = val)} m 6= val)} m = val)} m 6= val)} · · · {(num 3), win, (num = val)} {(num < 3), win, (num = val)} · · · a a0 ⇢ num = 0 val = 0 b1 8 < : num > 0 val = 0 val < num 9 = ; ⇢ num < 3 num 6= val a1 8 < : num > 0 val = 0 val < num 9 = ; ⇢ num 3 num 6= val b2 8 < : num > 0 val = 0 val < num 9 = ; ⇢ num < 3 num 6= val b2 8 < :v ⇢ n b2 8 < : num > 0 val > 0 val num 9 = ; ⇢ num < 3 num 6= val · · · wait, cheat · · · wa wait, · · · guess init choose guess r = 3((num < 3) ^ hwini(val = num)), requiring the chosen real to b
  • 18. 1. Veri fi cation: check whether there exists a witness for f in the reachability graph of B. 2. Strategy synthesis: given an agent a, compute a strategy for a so that, no matter how the other agents behave, the execution of the strategy in the reachability graph of B yields f. Given a DDS B and a formula f Reasoning tasks
  • 19. Veri fi cation Example {(num 3), ¬win, (num = val)} {(num 3), ¬win, (num 6= val)} · · · · · · a a0 ⇢ n a1 8 < : num > 0 val = 0 val < num 9 = ; ⇢ num 3 num 6= val 8 < : num > 0 val > 0 val num 9 = ; · · · guess init choose e 4: Left: D for = 3((num < 3) ^ hwini(val = num)), requiring the uess to be exact. Dots are used for labels not already labelling other outg ols labelling arcs) showing a winning run. States are associated to two con DB and the constraint set A. State labels refer to the states of D and DB. ugh only three are in CGB (see Figure 2): two outcomes disambiguate b ded to the set of assumptions A. A winning strategy exists if at least num oller game moves guaranteeing to satisfy is {}, {pick(num, {num > 0, n roller (with X Y = ;). The objective is to control, at step, the values of variables in Y in such a way that for ossible values of those in X a certain formula is true. set o then ing g 0 1 2 1 4 3 choose repeat guess wait cheat win [ numw > 0 ] [ valw ≥ valr ] [ valr ≥ numr ] [ numw ≥ valr ]
  • 20. Strategy synthesis Example 0 1 2 1 4 3 choose repeat guess wait cheat win num val [ numw > 0 ] [ valw ≥ valr ] [ valr ≥ numr ] [ numw ≥ valr ] b c = val)} 6= val)} m = val)} m 6= val)} m = val)} m 6= val)} · · · {(num 3), win, (num = val)} {(num < 3), win, (num = val)} · · · a a0 ⇢ num = 0 val = 0 b1 8 < : num > 0 val = 0 val < num 9 = ; ⇢ num < 3 num 6= val a1 8 < : num > 0 val = 0 val < num 9 = ; ⇢ num 3 num 6= val b2 8 < : num > 0 val = 0 val < num 9 = ; ⇢ num < 3 num 6= val b 8 < : ⇢ b2 8 < : num > 0 val > 0 val num 9 = ; ⇢ num < 3 num 6= val · · · wait, cheat · · · w wait · · · guess init choose guess or = 3((num < 3) ^ hwini(val = num)), requiring the chosen real to b c 3), win, (num = val)} < 3), win, (num = val)} · · · a a0 ⇢ num = 0 val = 0 b1 8 < : num > 0 val = 0 val < num 9 = ; ⇢ num < 3 num 6= val a1 8 < : num > 0 val = 0 val < num 9 = ; ⇢ num 3 num 6= val b2 8 < : num > 0 val = 0 val < num 9 = ; ⇢ num < 3 num 6= val b2 8 < : num > 0 val > 0 val < num 9 = ; ⇢ n b2 8 < : num > 0 val > 0 val num 9 = ; ⇢ num < 3 num = val b2 8 < : num > 0 val > 0 val num 9 = ; ⇢ num < 3 num 6= val 8 < :v · · · wait, cheat · · · wait, cheat · · · wait, cheat · · · guess init choose guess c c w m < 3) ^ hwini(val = num)), requiring the chosen real to be smaller than
  • 21. Veri fi cation reduces to strategy synthesis with a single agent controlling everything. To solve strategy synthesis we take inspiration from classical approaches [Pnueli and Rosner 1998]. However: • The reachability graph is in fi nite. • We have to handle constraints: “data- aware” alphabet. Observations Reasoning tasks
  • 22. Symbolically group variable assignments using constraint sets. Constraints de fi ned over variables and constants used in the DDS. From reachability graph to ( fi nite) constraint graph Interval abstraction … … … … … … … … … choose choose choose guess guess guess ⇢ num = 0 val = 0 ⇢ num = 0.5 val = 0 ⇢ num = 1 val = 0 ⇢ num = 1 val = 0.75 ⇢ num = 1 val = 3.4 ⇢ num = 1 val = 0 ⇢ num = 5 val = 0 0 1 1 2 2 2 1 … … … … … … … … … … … …
  • 23. Symbolically group variable assignments using constraint sets. Constraints de fi ned over variables and constants used in the DDS. From reachability graph to ( fi nite) constraint graph Interval abstraction … … … … … … … … … choose choose choose guess guess guess ⇢ num = 0 val = 0 ⇢ num = 0.5 val = 0 ⇢ num = 1 val = 0 ⇢ num = 1 val = 0.75 ⇢ num = 1 val = 3.4 ⇢ num = 1 val = 0 ⇢ num = 5 val = 0 0 1 1 2 2 2 1 … … … … … … … … … … … … ⇢ num > 0 val = 0 8 < : num > 0 val = 0 val < num 9 = ; 8 < : num > 0 val > 0 val num 9 = ; 8 < : num > 0 val > 0 val < num 9 = ;
  • 24. Symbolically group variable assignments using constraint sets. Constraints de fi ned over variables and constants used in the DDS. From reachability graph to ( fi nite) constraint graph Interval abstraction … … … choose guess guess guess ⇢ num = 0 val = 0 0 1 2 2 2 … … … … … … 8 < : num > 0 val > 0 val num 9 = ; 8 < : num > 0 val = 0 val < num 9 = ; 8 < : num > 0 val > 0 val < num 9 = ; ⇢ num > 0 val = 0 The abstraction: • is fi nite-state; • preserves witnesses.
  • 25. • f seen as an LTLf formula. • First: constraints+tasks as syntactic alphabet. • Then: semantic curation to retain only consistent transitions. Given a DDS B and a formula f Computing strategies 1 Formula to DFA b c 3), ¬win, (num = val)} 3), ¬win, (num 6= val)} 3), ¬win, (num = val)} 3), ¬win, (num 6= val)} · · · {(num 3), win, (num = val)} {(num < 3), win, (num = val)} · · · a a0 ⇢ num = 0 val = 0 b1 8 < : num > 0 val = 0 val < num ⇢ num < 3 num 6= val a1 8 < : num > 0 val = 0 val < num 9 = ; ⇢ num 3 num 6= val 8 < : num > 0 val > 0 val num 9 = ; ⇢ num < num 6= · · · guess init choose eft: D for = 3((num < 3) ^ hwini(val = num)), requiring the chose o be exact. Dots are used for labels not already labelling other outgoing e belling arcs) showing a winning run. States are associated to two constraint d the constraint set A. State labels refer to the states of D and DB. Note nly three are in CGB (see Figure 2): two outcomes disambiguate betwee the set of assumptions A. A winning strategy exists if at least num, val 2 ame moves guaranteeing to satisfy is {}, {pick(num, {num > 0, num < a b c · · · {(num < 3), win, (num = val)} {(num < 3), win, (num 6= val)} {(num < 3), ¬win, (num = val)} {(num < 3), ¬win, (num 6= val)} {(num 3), ¬win, (num = val)} {(num 3), ¬win, (num 6= val)} · · · {(num 3), win, (num = val)} {(num < 3), win, (num = val)} · · · a ⇢ n v 8 < num > 0 9 = ⇢ num 3 8 < : init
  • 26. • f seen as an LTLf formula. • First: constraints+tasks as syntactic alphabet. • Then: semantic curation to retain only consistent transitions. Given a DDS B and a formula f Computing strategies 1 Formula to DFA 2 Constraint graph to DFA • Variable assignments attached to transitions to distinguish nondeterminism on tasks.
  • 27. • f seen as an LTLf formula. • First: constraints+tasks as syntactic alphabet. • Then: semantic curation to retain only consistent transitions. Given a DDS B and a formula f Computing strategies 1 Formula to DFA 2 Constraint graph to DFA • Variable assignments attached to transitions to distinguish nondeterminism on tasks. 3 “data-aware” cross-product • Semantic curation when combining the two DFAs, retaining only consistent combined transitions. • Cross-products suitably “remembers” the accumulated constraints.
  • 28. • f seen as an LTLf formula. • First: constraints+tasks as syntactic alphabet. • Then: semantic curation to retain only consistent transitions. Given a DDS B and a formula f Computing strategies 1 Formula to DFA 2 Constraint graph to DFA • Variable assignments attached to transitions to distinguish nondeterminism on tasks. 3 “data-aware” cross-product • Semantic curation when combining the two DFAs, retaining only consistent combined transitions. • Cross-products suitably “remembers” the accumulated constraints. 4 Strategy extraction • Classical backward computation of winning sets. • Gives an abstract strategy that can be concretised step-wise.
  • 29. Lower bound 2-EXPTIME from classical propositional setting. Upper bound Doubly-exponential in the formula. Exponential in the compact DDS. Speci fi cally: #variables, #used constants, #constraint [Constructions need to call constraint solver] Complexity
  • 30. Simple, relevant model for data-aware dynamic systems. Readily implementable, direct approach to strategy synthesis, combining classical strategy synthesis with data abstraction techniques. Application to BPM, also to repair process models. Conclusion