(Translated by https://www.hiragana.jp/)
Search | arXiv e-print repository
Skip to main content

Showing 1–7 of 7 results for author: Tessaris, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2202.10898  [pdf, other

    cs.DB cs.AI cs.LO

    Relational Algebra and Calculus with SQL Null Values

    Authors: Enrico Franconi, Sergio Tessaris

    Abstract: The logic of nulls in databases has been subject of investigation since their introduction in Codd's Relational Model, which is the foundation of the SQL standard. We show a logical characterisation of a first-order fragment of SQL with null values, by first focussing on a simple extension with null values of standard relational algebra, which captures exactly the SQL fragment, and then proposing… ▽ More

    Submitted 22 February, 2022; originally announced February 2022.

  2. arXiv:2109.14883  [pdf, other

    cs.LG cs.CL cs.LO

    Process discovery on deviant traces and other stranger things

    Authors: Federico Chesani, Chiara Di Francescomarino, Chiara Ghidini, Daniela Loreti, Fabrizio Maria Maggi, Paola Mello, Marco Montali, Sergio Tessaris

    Abstract: As the need to understand and formalise business processes into a model has grown over the last years, the process discovery research field has gained more and more importance, developing two different classes of approaches to model representation: procedural and declarative. Orthogonally to this classification, the vast majority of works envisage the discovery task as a one-class supervised learn… ▽ More

    Submitted 30 September, 2021; originally announced September 2021.

    Comments: Submitted for publication

  3. Reporting Revenge Porn: a Preliminary Expert Analysis

    Authors: A. De Angeli, M. Falduti, M. Menendez Blanco, S. Tessaris

    Abstract: In our research, we focus on the response to the non-consensual distribution of intimate or sexually explicit digital images of adults, also referred as revenge porn, from the point of view of the victims. In this paper, we present a preliminary expert analysis of the process for reporting revenge porn abuses in selected content sharing platforms. Among these, we included social networks, image ho… ▽ More

    Submitted 23 June, 2021; originally announced June 2021.

  4. arXiv:1909.12738  [pdf, other

    cs.AI cs.LO

    Solving reachability problems on data-aware workflows

    Authors: Riccardo De Masellis, Chiara Di Francescomarino, Chiara Ghidini, Sergio Tessaris

    Abstract: Recent advances in the field of Business Process Management have brought about several suites able to model complex data objects along with the traditional control flow perspective. Nonetheless, when it comes to formal verification there is still the lack of effective verification tools on imperative data-aware process models and executions: the data perspective is often abstracted away and verifi… ▽ More

    Submitted 3 September, 2020; v1 submitted 27 September, 2019; originally announced September 2019.

  5. arXiv:1706.00356  [pdf, other

    cs.AI

    Enhancing workflow-nets with data for trace completion

    Authors: Riccardo De Masellis, Chiara Di Francescomarino, Chiara Ghidini, Sergio Tessaris

    Abstract: The growing adoption of IT-systems for modeling and executing (business) processes or services has thrust the scientific investigation towards techniques and tools which support more complex forms of process analysis. Many of them, such as conformance checking, process alignment, mining and enhancement, rely on complete observation of past (tracked and logged) executions. In many real cases, howev… ▽ More

    Submitted 1 June, 2017; originally announced June 2017.

  6. arXiv:1606.05446  [pdf, other

    cs.AI

    Abducing Compliance of Incomplete Event Logs

    Authors: Federico Chesani, Riccardo De Masellis, Chiara Di Francescomarino, Chiara Ghidini, Paola Mello, Marco Montali, Sergio Tessaris

    Abstract: The capability to store data about business processes execution in so-called Event Logs has brought to the diffusion of tools for the analysis of process executions and for the assessment of the goodness of a process model. Nonetheless, these tools are often very rigid in dealing with with Event Logs that include incomplete information about the process execution. Thus, while the ability of handli… ▽ More

    Submitted 17 June, 2016; originally announced June 2016.

  7. arXiv:1304.1697  [pdf, other

    cs.SE cs.LO

    Verification of Artifact-Centric Systems: Decidability and Modeling Issues

    Authors: Dmitry Solomakhin, Marco Montali, Sergio Tessaris, Riccardo De Masellis

    Abstract: Artifact-centric business processes have recently emerged as an approach in which processes are centred around the evolution of business entities, called artifacts, giving equal importance to control-flow and data. The recent Guard-State-Milestone (GSM) approach provides means for specifying business artifacts lifecycles in a declarative manner, using constructs that match how executive-level stak… ▽ More

    Submitted 5 April, 2013; originally announced April 2013.

    Comments: artifact-centric systems, guard-stage-milestone, formal verification