Kees M. van Hee

Kees M. van Hee
Eindhoven University of Technology | TUE · Section Information Systems (IS)

About

205
Publications
29,193
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6,252
Citations

Publications

Publications (205)
Article
Full-text available
Aim: The aim of this paper is to describe the construction of a new system for digital currency governed by the central bank, Central Bank Digital Currency (CBDC). Although the system uses cryptography, it is a new alternative for crypto currency like the Bitcoin. Today there is a global discussion about the process of money creation by the commerc...
Article
Full-text available
Aim: This paper presupposes a purely Central Bank Digital Currency (CBDC) based system. Its aim is to describe how such a system facilitates complete new possibilities to design a suitable monetary policy. More specifically, the purpose is to show that the available monetary tools can be used to design a rule-based monetary policy that guarantees s...
Chapter
The author offers a short comment on the philosophical question: Did Carl Adam invent Petri nets or did he discover them?
Chapter
The behavior of a hybrid system is a mixture of continuous behavior and discrete event behavior. The Simulink/Stateflow toolset is a widely used industrial tool to design and validate hybrid control systems using numerical simulation methods for the continuous parts and an executable Stateflow (combination of Statecharts and Flowcharts) for the dis...
Article
Service robots are robots that are intended to perform tasks normally done by humans in an environment in which humans work as well. However, they are neither required to accomplish these tasks in the same way as humans nor need to look like a human being. A tele-operated robot is controlled from a distance (near or far) by a human operator. The hu...
Conference Paper
In this paper we discuss several approaches to time in Petri nets. If time is considered for performance analysis, probability distributions for choices should be included into the model and thus we need Petri nets with time and stochastics. In literature, most attention is paid to models where the time is expressed by delaying transitions and for...
Article
Stepwise refinement is a well-known strategy in system modeling. The refinement rules should preserve essential behavioral properties, such as deadlock freedom, boundedness and weak termination. A well-known example is the refinement rule that replaces a safe place of a Petri net with a sound workflow net. In this case a token on the refined place...
Article
Full-text available
Business process modeling has become a standard activity in many organizations. We start with going back into the history and explain why this activity appeared and became of such importance for organizations to achieve their business targets. We discuss the context in which business process modeling takes place and give a comprehensive overview of...
Chapter
Organizations often do not want to reveal the way a product is created or a service is delivered. As a consequence, if two organizations want to cooperate, they contact a trusted third party. Each specifies how it wants to communicate with the other party. The trusted third party then needs to assure that the two organizations cooperate correctly....
Conference Paper
Full-text available
Informatics is a relatively young �eld within science and engineering. Its research and development methodologies build on the scienti�c and design methodologies in the classical areas, often with new elements to it. We take an in-depth look at one of the less well-understood methodologies in informatics, namely experimentation. What does it mean...
Conference Paper
The Robot Operating System (ROS) is a popular software framework to develop and execute software for robot systems. ROS supports component-based development and provides a communication layer for easy integration. It supports three interaction patterns that are essential for control systems: the publish-subscribe pattern, the remote procedure call...
Article
Organizations often do not want to reveal the way a product is created or a service is delivered. As a consequence, if two organizations want to cooperate, they contact a trusted third party. Each specifies how it wants to communicate with the other party. The trusted third party then needs to assure that the two organizations cooperate correctly....
Conference Paper
Full-text available
Process models in organizational collections are typically created by the same team and using the same conventions. As such, these models share many characteristic features like size range, type and frequency of errors. In most cases merely small samples of these collections are available due to e.g. the sensitive information they contain. Because...
Conference Paper
Full-text available
Stepwise refinement is a well-known strategy in system modeling. The refinement rules should preserve essential behavioral properties, such as deadlock freedom, boundedness and weak termination. A well-known example is the refinement rule that replaces a safe place of a Petri net with a sound workflow net. In this case a token on the refined place...
Article
Full-text available
Workflow nets, a particular class of Petri nets, have become one of the standard ways to model and analyze workflows. Typically, they are used as an abstraction of the workflow that is used to check the so-called soundness property. This property guarantees the absence of livelocks, deadlocks, and other anomalies that can be detected without domain...
Conference Paper
Process mining is a technique for extracting process models from event logs recorded by information systems. Process mining approaches normally rely on the assumption that the log to be mined is complete. Checking log completeness is known to be a difficult issue. Except for some trivial cases, checkable criteria for log completeness are not known....
Article
The independent veriflcation of the right applications of business rules in an information system is a task for auditors. The increasing complexity of information systems, and the high risks associated with violations of business rules, have created the need for on line auditing tools. In this paper we sketch a conceptual design for such a tool. Th...
Conference Paper
Full-text available
The design and verification of an asynchronous communicating system can be very complex. In this paper we focus on weak termination: in each reachable state, the system has the option to eventually terminate. We present a component framework and construction method that guarantees weak termination. In the framework, communication between components...
Conference Paper
Full-text available
Soundness is one of the well-studied properties of processes; it denotes that a final state can be reached from every state that is reachable from the initial state. Soundness-preserving refinements are important for enabling the compositional design of systems. In this paper we concentrate on refinements of service compositions. We model service...
Conference Paper
Correctness of asynchronously communicating systems (ACS) is known to be a hard problem, which became even more actual after the introduction of Service Oriented Architectures and Service Oriented Computing. In this paper, we focus on one particular correctness property, namely weak termination: at any moment of the system execution, at least one o...
Article
Full-text available
Auditors validate information about organizations and their business processes. Reliable information is needed to determine whether these processes are executed within certain boundaries set by managers, governments, and other stakeholders. Violations of specific rules enforced by law or company policies may indicate fraud, malpractice, risks, or i...
Article
Information systems supporting business processes are usually very complex. If we have to ensure that certain business rules are enforced in a business process, it is often easier to design a separate system, called a monitor, that collects the events of the business processes and verifies whether the rules are satisfied or not. This requires a bu...
Conference Paper
Full-text available
The quality of algorithms is often determined by benchmarking, i.e., testing the algorithm on a predetermined data set. In contrast to traditional benchmarking, with fixed data set, we present a way to generate random sets of test data. In this paper we present random classes of Petri nets and a method to generate finite samples from such a class....
Article
Business information systems are mostly very complex and difficult to modify. As a consequence, if we would like to ensure that certain business rules are enforced in a business, it is often easier to design a separate information system, called a monitor, that collects the business events from the business information system in a log and verifies...
Conference Paper
Full-text available
In the world of Service Oriented Architectures, one deals with networks of cooperating components. A component offers services; to deliver a service it possibly needs services of other components, thus forming a service tree. This tree is built dynamically and not known beforehand. It is hard to verify the behavior of a service tree by using standa...
Conference Paper
Full-text available
Stochastic Petri Nets are a useful and well-known tool for performance analysis. However, an implicit assumption in the different types of Stochastic Petri Nets is the Markov property. It is assumed that a choice in the Petri net only depends on the current state and not on earlier choices. For many real-life processes, choices made in the past can...
Article
The best practice in information system development is to model the business processes that have to be supported and the database of the information system separately. This is inefficient because they are closely related. Therefore we present a framework in which it is possible to derive one from the other. To this end we introduce a special class...
Article
Full-text available
Petri nets are often used to model and analyze workflows. Many workflow languages have been mapped onto Petri nets in order to provide formal semantics or to verify correctness properties. Typically, the so-called Workflow nets are used to model and analyze workflows and variants of the classical soundness property are used as a correctness notion....
Article
Full-text available
In this paper, we present a framework that allows us to orchestrate web services such that the web services involved in this orchestration interact properly. To achieve this, we predefine service interfaces and certain routing constructs. Furthermore, we define a number of rules to incrementally compute the price of such a properly interacting orch...
Article
Full-text available
In this paper we show how we can generate models for the execution of database transactions. We describe a transaction goal by a data model and we give algorithms to generate Petri nets models that specify the execution of these transactions. This is done in such a way that database constraints, in particular referential integrity constraints, are...
Article
Full-text available
We present a sequential software release procedure that certifies with some confidence level that the next error is not occurring within a certain time interval. Our procedure is defined in such a way that the release time is optimal for single stages and the global risk can be controlled. We assume that the failure detection process can be modeled...
Article
Full-text available
Common software release procedures based on statistical techniques try to optimise the trade-o between further testing costs and costs due to remaining errors. We propose new software release procedures where the aim is to certify that the software does not contain errors. The underlying model is a new discrete-time model similar to the Jelinski- M...
Article
A case handling system is an information system supporting the handling of cases. The (sub) tasks for a particular case are performed by persons or software agents and the result of a task is the updating of the case data. Case handling systems consist of three parts: (1) a workflow engine that executes the process of a case, (2) a document manager...
Article
Full-text available
We consider software systems consisting of a set of components running as a sequential process. We model such software systems as a special class of transition systems. The difference with existing approaches is that we propose a test procedure based on the structure of the model and the prior test history that can be used for exhaustive testing in...
Article
Full-text available
Most information systems that are driven by processmodels (e.g., workflowmanagement systems) record events in event logs, also known as transaction logs or audit trails. We consider processes that not only keep track of their history in a log, but also make decisions based on this log. To model such processes we extend the basic Petri net framework...
Article
Full-text available
State of the art information system commonly record events in log files, also known as audit trails. Moreover, business processes often go beyond the sole recording the events and base decisions on the events observed in the past. To model such processes we extend the basic Petri net framework with the notion of history by associating tokens with h...
Article
Petri nets are often used to model and analyze workflows. Many workflow languages have been mapped onto Petri nets in order to provide formal semantics or to verify correctness properties. Typically, the so-called Workflow nets are used to model and analyze workflows and variants of the classical soundness property are used as a correctness notion....
Conference Paper
Full-text available
Most information systems that are driven by process models (e.g., workflow management systems) record events in event logs, also known as transaction logs or audit trails. We consider processes that not only keep track of their history in a log, but also make decisions based on this log. Extending our previous work on history-dependent Petri nets w...
Conference Paper
Full-text available
Existing grid applications commonly use workflows for the orchestration of grid services. Existing workflow models however suffer from the lack of adaptivity. In this paper we define Adaptive Grid Workflow nets (AGWF nets) appropriate for modeling grid workflows and allowing changes in the process structure as a response to triggering events/except...
Conference Paper
Most information systems that are driven by process models (e.g., workflow management systems) record events in event logs, also known as transaction logs or audit trails. We consider processes that not only keep track of their history in a log, but also make decisions based on this log. To model such processes we extend the basic Petri net framewo...
Article
Full-text available
The best practice in information system development is to model the business processes that have to be supported and the database of the information system separately. This is inecient because they are closely related. Therefore we present a framework in which it is possible to derive one from the other. To this end we introduce a special class of...
Article
We investigate a resource management policy that allocates resources based on the number of available resources only. We formulate a condition on resource requesting processes, called solidity that guarantees successful termination. Processes that do not satisfy this condition can be modified to become solid. We investigate performance of the resou...
Article
Choices in business processes are often based on the process history saved as a log-file listing events and their time stamps. In this paper we introduce LogLogics, a finite-path variant of the Timed Propositional Temporal Logic with Past, which can be in particular used for specifying guards in business process models. The novelty is due to the pr...
Article
Full-text available
We present an Service-Oriented Architecture (SOA)– based architecture framework. The architecture framework is designed to be close to industry standards, especially to the Service Component Architecture (SCA). The framework is language independent and the building blocks of each system, activities and data, are first class citizens. We present a...
Article
Full-text available
In this paper we consider adaptive workflow nets, a subclass of nested nets that allows more comfort and expressive power for mod- elling adaptation and exception handling in workflow nets. We define two important behavioral properties of adaptive workflow nets: sound- ness and circumspectness. Soundness means that a proper final marking (state) ca...
Conference Paper
Full-text available
Current challenges in Healthcare Information Systems (HIS) include supplying patients with personalized medical information, creating means for efficient information flow between different healthcare providers in order to lower risks of medical errors and increase the quality of care. To address these challenges, the information about patient-relat...
Article
Full-text available
In this paper we propose a framework for SOA covering such important features as proper termination (soundness) and correct corre-lation of tasks. Within this framework, we define a method for the cal-culation of the price of services. Our framework is compositional in the sense that composing a system from subsystems that meet our correct-ness req...
Chapter
Full-text available
We describe a formal framework for modeling and prototyping complex systems, notably decision support systems. Our framework consists of a meta-model for discrete event systems, a language based upon this meta-model and a software environment for editing and validating system descriptions. The possibilities for using our framework for modelling and...
Conference Paper
In this paper we study the use of case history for control structures in workflow processes. In particular we introduce a history-dependent join. History dependent control offers much more modeling power than classical control structures and it solves several semantical problems of industrial modeling frameworks. We study the modeling power by mean...
Chapter
In this paper we are trying to make a step towards a concise theory of genetic algorithms (GAs) and simulated annealing (SA). First, we set up an abstract stochastic algorithm for treating combinatorial optimization problems. This algorithm generalizes and unifies genetic algorithms and simulated annealing, such that any GA or SA algorithm at hand...
Conference Paper
Full-text available
We improve the decision procedure from (7) for the problem of generalized soundness for work∞ow nets: \Every marking reachable from an initial marking with k tokens on the initial place terminates properly, i.e. it can reach a marking with k tokens on the flnal place, for an arbitrary natural number k". Moreover, our new decision procedure returns...
Conference Paper
This paper describes Petriweb, a web application for managing collections of Petri nets. When a collection of nets is large or has multiple users, it becomes difficult for users to survey the collection and to find specific nets. Petriweb addresses this issue by supporting arbitrary content-based filtering. Nets can be assigned properties with val...
Conference Paper
Full-text available
We consider nested nets, i.e. Petri nets in which tokens can be Petri nets themselves. We study the value semantics of nested nets rather than the reference semantics, and apply nested nets to model adaptive workflow, i.e. flexible workflow that can be modified during the execution. A typical domain with a great need for this kind of workflow is he...
Article
Full-text available
We study concurrent processes modelled as workflow Petri nets extended with resource constrains. Resources are durable units that can be neither created nor destroyed: they are claimed during the handling procedure and then released again. Typical kinds of resources are manpower, machinery, computer memory. We define structural criteria based on tr...
Article
State-of-the-art systems engineering uses many models reflecting various aspects of the modeled system. A major task of system engineers is to ensure consistency between the many models. We present an approach to the engineering of complex systems based on the modeling of use cases and object life cycles as Petri nets. Synchronization by place fusi...
Chapter
High level Petri nets have tokens with values, traditionally called colors, and transitions that produce tokens in a functional way, using the consumed tokens as arguments of the function application. Large nets should be designed in a topdown approach and therefore we introduce a hierarchical net model which combines a data flow diagram technique...
Conference Paper
Choices in business processes are often based on the process history saved as a log-file listing events and their time stamps. In this paper we intro- duce a finite-path variant of the timed propositional logics with past for spe ci- fying guards in business process models. The novelty is due to the introduction of boundary points start and now cor...
Article
Full-text available
This paper presents Yasper, a tool for modeling, analyzing and simulating workflow systems, based on Petri nets. Yasper puts Petri net modeling in the hands of business analysts and software architecture designers. They can specify systems in familiar terms (XOR choice, workflow, cases, roles, processing time and cost), and can directly run manual...
Conference Paper
Full-text available
Business processes are becoming more and more complex and at the same time their correctness is becoming a critical issue: The costs of errors in business information systems are growing due to the growing scale of their application and the growing degree of automation. In this paper we consider Extended Event-driven Process Chains (eEPCs), a langu...
Conference Paper
Form documents or screen forms bring essential information on the data manipulated by an organization. They can be considered as dierent but often overlapping views of its whole data. This paper presents a non-destructive approach of their integration. The main idea of our approach is to keep the original views intact and to specify con- straints b...