Temporal Exception Prediction for Loops in Resource Constrained Concurrent Workflows
|
|
- Jonah Morton
- 5 years ago
- Views:
Transcription
1 emporal Exception Prediction for Loops in Resource Constrained Concurrent Workflows Iok-Fai Leong, Yain-Whar Si Faculty of Science and echnology, University of Macau {henryifl, Abstract Workflow management systems WfMS) are widely used for improving business processes and providing better quality of services. However, rapid changes in business environment can cause exceptions in WfMS leading to deadline violation and other consequences. In these circumstances, one of the crucial tasks for a workflow administrator is to detect any potential exceptions as early as possible so that corrective measures can be taken. However such detections can be extremely complex since a workflow process may consist of various control flow pattern and each pattern has its own way of influencing temporal properties of a task. In this paper, we describe a novel approach for predicting temporal exceptions for loops in concurrent workflows which are required to share limited identical resources. Our approach is divided into two phases; preparation phase and prediction phase. In the preparation phase, temporal and resource constraints are calculated for each task within the workflow schema. In the prediction phase, an algorithm is used to predict potential deadline violations by taking into account constraints calculated from the preparation phase. 1. Introduction Workflow Management Systems WfMS) enable the automation of business operations by allocating and dispatching work to users according to executable process models [8]. A workflow schema is the description of the business flow [1]. Workflow schemas are defined to support business s goals. A workflow instance, however, is an execution of the workflow schema. While executing a workflow instance, some events that are not defined in the workflow schema may occur. hese events are typically considered as exceptions in workflow management systems. Exceptions in a workflow management system can be classified into different categories. Fabio Casati [2] defines two types of exceptions; expected exceptions which are the results of predictable deviations from the normal behavior of a process and unexpected exceptions which are the outcomes of inconsistencies between the business process in the real world and its corresponding workflow description. Most of the researches mainly focus on detecting and handling of expected exceptions. Although unexpected exceptions are difficult to be handled, they usually occur during execution of a workflow. In general, an organization may need to execute different workflows simultaneously for different segments of the business and these concurrent workflows can be interdependent. For example, two concurrent workflows representing a purchase process and an inventory management process may share the same resources. Conflicts occur when a limited number of resources are available during a given interval. Recent work by Li et al. [8] addressed the problem of predicting unexpected exceptions in concurrent workflows by verifying temporal constraints. However, the approach described in [8] only considers single unique resources. In this paper, we address this issue by taking into account identical resources which are shared by one or more concurrent workflows. A loop refers to a recursive execution of one or more tasks within a workflow. Although loops are extensively used in workflow schemas, less attention has been devoted to understanding their impact on temporal exceptions. Indeed, looping of tasks within workflows can greatly increase the difficulty in exception prediction since rapid changes in the number of iterations can cause deadline violations as well as conflicts in resource usage. In [1], Jin Hyun Son et al. propose a method for identifying the critical path for a given workflow schema based on queuing theory. he critical path is then used for the assignment of deadlines for the activities in the workflow. In their approach, loops are transformed into a sequence control construct. However, to the best of authors knowledge, no work has been reported on predicting exception in concurrent workflows which contain loops. In this paper, we further extend the temporal checking algorithm from [8] to allow prediction of unexpected temporal exceptions in concurrent workflows which not only share identical resources but also contain one or more loops. Our approach can be basically divided into
2 two phases; preparation phase and prediction phase. In the preparation phase, temporal and resource constraints are calculated for each task within the workflow schema. In the prediction phase, an algorithm is used to predict potential deadline violations by taking into account constraints calculated from the preparation phase. his paper is organized into 6 sections. A brief introduction to resource and temporal constraints in a workflow is given in Section 2. We describe our proposed solution in Section 3 and 4. In Section 5, we briefly review recent work. In section 6, we summarize our ideas and future work. 2. Resource and temporal constraints Workflows within an organization can be designed to execute in parallel. In addition, they may share the same resources e.g., human resources, financial resources, etc.). Conflicts usually occur when tasks from instances of different workflows compete for limited resources. Figure 1a) shows an example of conflict involving tasks from two concurrent workflows when four units of identical resources are only available for sharing. In this example, resource conflicts occur at tasks 22, 23, 24 and 25. Furthermore, these resource conflicts are linked to the underlying temporal constraints of a task within the workflow. We denote the duration of a task by a boundary [d ),D )], where d ) and D ) are the minimum and maximum durations of a task respectively. In addition, we can define 4 temporal constraints for a task: a) Earliest Start ime ES), b) Latest Start ime LS), c) Earliest End ime EE), and d) Latest End ime LE) see figure 1b)). hese values are assumed to be defined in the workflow specification during design time by the workflow designers a) ime 0 ES LS D ask d b) EE LE ime Figure 1. a) Resource conflict in workflows b) emporal constraints of task hese constraints are crucial in determining the deadline of a workflow. For example, LE of a task can be used to determine the hard deadline of a workflow. Basically, temporal constraints of a task are related to its predecessor and successor tasks. For instance, if a task is scheduled to execute right after another task, its ES value can be set to the EE value of its predecessor task. However, depending on the control flow [7] within the workflow, derivation of these constraints can be different. A workflow may also have loops. A loop is a repeated execution of one or more tasks within a workflow. Such repetition has significant impact on temporal constraints of a task which may belong to one or more loops. Since tasks within a loop can be repeated a number of times, calculating temporal constraints of a task also needs to take into account possible repetition of its ancestors and descendants as well. Such calculation can be even more problematic when a task belongs to one or more nested loops. In the following sections, we describe how ES and LE values of a task can be calculated for simple control flow patterns and loops. 3. Calculating temporal constraints 3.1. Deriving ES and LE for simple control flow patterns Similar to [8], our approach predicts temporal exceptions in a workflow by creating a conflict free execution trace based on the workflow specification. he resulted execution trace defines the order of task execution with respect to the temporal and resource constraints and is free from any conflict. o do so, we first need to calculate the earliest start time ES) and latest end time LE) of every task in the workflow. hese values define the upper and lower boundaries of a time window in which a task may execute. According to this time frame, a task must not be executed before its ES value and after its LE value. Such underpinning is crucial in determining the hard deadline of the entire workflow and also in predicting whether or not a given workflow instance will violate the deadline. In our proposed algorithm, we assume that a task is predefined with a minimum duration d ), a maximum duration D ), and a resource usage R ). asks are linked by different types of flows. Different combinations of task-flow pairs within the workflow are defined as control patterns [7]. Our aim is to calculate ES and LE values for those control patterns which are commonly used in business process modeling. Figure 2 shows various types of control patterns and corresponding formulas for deriving ES and LE values.
3 Sequence ES )=ES )+d ) LE )=LE )+D ) XOR-Join ES )=Max{ES )+d ), ES k )+d k )} LE )=Max{LE ),LE )}+D ) XOR-Split ES )=ES )+d );ES )=ES )+d ) LE )=LE )+D );LE )=LE )+D ) OR-Join ES )=Min{ES )+d ), ES )+d )} LE )=Min{LE ),LE )}+D ) OR-Split ES )=ES )+d );ES )=ES )+d ) LE )=LE )+D );LE )=LE )+D ) AND-Split ES )=ES )+d );ES )=ES )+d ) LE )=LE )+D );LE )=LE )+D ) AND-Join ES )=Max{ES )+d ), ES k )+d k )} LE )=Max{LE ),LE )}+D ) Figure 2. Deriving ES and LEn simple control flow patterns [8] 3.2. Deriving LE values for tasks within loops Based on the definition from [7], loops can be classified as structured loops, and arbitrary loops. In this paper, we further divide arbitrary loops into nested loops and crossing loops. In a nested loop, all tasks within a loop appear in another loop. In a crossing loop, only a certain number of tasks within a loop appear in another loop. In this section, we show how LE values for the tasks in these three types of loops can be derived. Let I N be the maximum number of iterations that a loop N within a workflow wf can be executed and let S N be the set of tasks in loop N in wf. We assume that I N > 0 and S N {} i.e., loop N should contain at least one task), and that the maximum number of iteration I N ) of a loop N will be reset once the execution flow leaves N e.g., when the flow leaves the last task in a loop). We also assume that each task within a workflow is atomic, i.e., a task must be executed entirely until it is completed and cannot be interleaved with other tasks. In the following sections, we show how LE value can be derived for three different types of loop Structured Loop. he simplest form of a loop is the Structured Loop [7]. An example of a structured loop is shown in Figure 3. Definition 1: Structured Loop. A loop N in a workflow wf is a Structured Loop if for all tasks n S N, does not exist in any other loop in wf. In Figure 3, if loop N can iterate for at most I N times, then each of the tasks in S N can be executed for at most I N +1 times. he calculation of ES for tasks in a loop is done according to their control patterns as shown in Figure 2. However, in calculating LE values, we need to consider the worst case since the loop can iterates for at most I N times. Let Φ N be the total maximum duration for executing all tasks within loop N for one iteration. Φ N = k = i D 1) We calculate the latest ending time LE) of the first task in loop N as follows: LE ) = LE ) + I Φ + D ) 2) ) i 0 N N i Since other tasks within the loop N inherit the LE values of, their LE values can be calculated as: LE ) = LE ) + D ) if i 3) Nested Loop. In a nested loop, all tasks within a loop are also members of another loop. Such loops are also classified as Arbitrary Loops [7]. For instance, in Figure 4, a loop N is nested within another loop M. Figure 3. Structured Loop Figure 4. Nested Loop
4 Definition 2: Nested loop: A loop M in a workflow wf is a nested loop if there exists another loop N such that all the tasks in N are also members of M and both M and N do not share the same initial task 1. When we calculate the ES and LE values of the tasks in loop M, we also need to take into account the time required to execute loop N. From Figure 4, we can define the latest ending time LE )) of the first task of loop M as follows: LE i ) = LE 0 ) + I MΦM + I M I NΦN + D i ) 4) his formula applies to the first task of an outermost loop M in Figure 4. Since remaining tasks in loop M inherit the LE values of, their LE values can be calculated as: LE ) = LE 1) + D ) if 5) i, S, M S N Since loop N in this case is a Structured Loop and there is no other nested loop inside N, LE values of tasks in S N can be calculated by using equation 3) Crossing loop. Crossing loops are also classified as Arbitrary Loops [7]. In Figure 5, an example of crossing loop is depicted with two loops N and M crossing each other at a and. Figure 5. Crossing Loop Definition 3: Crossing loop. Loop N and M in a workflow wf are crossing loops if 1) both N and M share at least one task and 2) there exists at least one task in wf which is a member of only either one of the loops 2. We calculate the LE values of the tasks in crossing loops by considering the worst case scenario, i.e., when loop N iterates for I N times and loop M iterates for I M times. Let be the first task in loop N in Figure 4 and loop N is crossing with another loop M. We derive the latest ending time of the first task of loop N as follows: LE ) = LE ) + I I + 1) Φ + I Φ + D ) 6) i 0 N M N M M i For the remaining tasks that are within loop N or loop M except a ), their LE values can be calculated as follows: 1 If M and N share the same initial task, we consider M as a crossing loop. 2 Both loops may begin at the same task, i.e. both flows from and b may point back to either or a in Figure 5. In this case, the loop whose last task ends earlier is considered as loop N. LE ) = LE ) + D ) if 1 SN SM, i, a Since a is the first task of the structured loop M, its LE value will be calculated by using equation 2) as follows: LE ) = LE ) + I Φ + D ) 8) a a 1 M M a Loops are defined in the workflow specification during design time. o identify the loop type in a workflow, we check whether tasks in a loop are contained in other loops or not. Figure 6 shows the algorithm for identifying the type of loop N. For each task t in loop N If t exists in other loop N then If all tasks in N exists in N then N is a Nested Loop Else N is a Crossing Lop End If Else N is a Structured Loop End If End Figure 6. Psudocode for identifying loop type In Figure 7, we describe the algorithm for calculating ES and LE values of tasks in an arbitrary workflow wf. Calculate the ES values of each task in wf, according to the control patterns defined in Section 3.1 For each task n wf If s the first task in a loop N then /* calculate LE) recursively */ Calculate LE) as calrecur N) + D) Else Calculate LE) according to the equations defined in Figure 2 Function calrecur N) Begin If N is a structure loop then return I N * Φ N.//eq.3) Else if N is a nested loop which contains another loop M then return I N*calRecurM)+I N* Φ N.//eq.4) Else if N is a crossing loop with loop M then return calrecurm)+i N*I M+1)* Φ N //eq.6) End Figure 7. Psudocode for calculating ES and LE value of a workflow which contains loops In this algorithm, we first calculate the ES values for every task. Next we check whether a task is within in a loop. If it is within a loop, we identify the type of loop for applying the appropriate equation in 7)
5 calculating the LE values accordingly. his algorithm also supports cases where loops are nested/crossed in more than two levels. 4. Predicting temporal exceptions he proposed prediction algorithm is separated into two steps as shown in Figure 8. In the conflict detection and resolution step, we extend the algorithm from [8] to re-enact a conflict free execution trace based on the pre-defined workflow specification during design time. In the prediction step, we use the generated execution trace from previous step to check possible deadline violations in run time for the two workflow instances which are executing in parallel. 4. Generate an execution trace by taking into account revised LE values and allowing each task to execute in maximum duration. An execution trace will be created in step I, where tasks are only permitted to use the maximum allowable resources. he execution trace guarantees that the concurrent workflows will not exceed the resource usage during execution. he latest end time of the resulted conflict-free execution trace is said to be the hard deadline HD) of the workflow. Step II Prediction 5. Pick a time point current time for workflow instances wi1 and wi2, which are instantiated from the workflow specification wf1 and wf2 respectively during run time. 6. Calculate the total minimum execution time required for all tasks including those which are currently being executed at current time and tasks which are planning to be executed after current time. 7. If current time + the total minimum execution time > HD), we can conclude that an exception is predicted, otherwise exception cannot be determined. 5. Related work Figure 8. Steps for predicting temporal exceptions Step I Conflict Detection and Resolution 1. Calculate the ES and LE values for each tasks in wf1 and wf2 according to the types of control patterns. 2. For each task in wf1 and wf2, we calculate dep ), which is a list of tasks which has resource conflicts with. A task t in wf1 and wf2 where t ) is a member of dep ) if i) resource usage of + resource usage of t > maximum number of available resources and ii) and t have overlapping execution time, i.e., μ, ES i ) μ LE i ), ES t') μ LE t' ) 3. If dep ) is not empty, then do the followings: i) For each task t in dep ), if execution time of and t overlap, modify [ESt ), LEt )] as [MAX{ESt ), ES )+d )}, MAX{LEt ), LE )+D )}]. ii) Modify the LE values for subsequent tasks of t using the new LEt ) value. In the area of programming languages, exceptions may interrupt the normal flow of a program, leading to unexpected abortion of a program. Exceptions in workflow management system are also similar to that of programming languages. Klein et al. [5] describe a knowledge-based approach that allows workflow designer to determine when a workflow may fail. In their approach, rules are created for detecting exceptions during workflow definition stage. he approach proposed in [5] mainly focuses on prediction of exceptions at the workflow definition. his kind of approach is static and not flexible enough to deal with changes in a workflow. However, in our approach, in addition to the workflow definition, we also make use of the audit trail information of the workflow instance to dynamically generate the execution trace, thus result in a prediction model that reflects the real situation more accurately. An alternative approach is proposed by Kammer et al. [3] for detecting exceptions during workflow execution. heir approach is implemented in Endeavors workflow support system by comparing its historical information with current workflow status and feedback data captured during the execution of a workflow. he system then uses the result for detecting exceptions.
6 Similar to [3], our approach extends XML Schema of YAWL [9] for modeling different kinds of loop. A prototype prediction system was also developed based on YAWL workflow management system. Exceptions can occur due to the modeling errors in workflow schemas. Shiyong Lu et al. [6] develop an algorithm for checking the validity of a workflow model represented in the form of a graph. By identifying the precondition and post-condition of a workflow, the algorithm checks if the input and output edges of the workflow follows a valid pattern or not. Our approach does not validate the correctness of the workflow specification. Instead, the proposed algorithms take into account several commonly used control patterns and loops for prediction. In [4], Grigori et al. propose an approach for exception prediction based on data warehousing and mining techniques. In their approach, WfMS log is extracted and stored in a relational database, which is then used in generating rules and decision trees for exception prediction in future workflow instances. he main difference between our approach and the approach proposed by [4] is that, our approach allows predicting of exceptions in concurrent workflows which are required to share identical resources. In the context of predicting temporal exceptions in concurrent workflows, our approach extends the algorithm given in [8] by taking into account different kinds of loops which are identified in [7]. he recursive algorithm outlined in our approach allows calculation of LE values for nested loops with arbitrary depth. In resource sharing, our approach allows sharing of identical resources whereas the approach proposed in [8] only considers sharing of single unique resources by concurrent workflows. 6. Conclusion In this paper, we describe a novel approach for predicting temporal exceptions for loops in resource constrained concurrent workflows. In our approach, we create a conflict free execution trace for concurrent workflows to resolve both time and resource constraints. We then use the generated execution trace to predict exceptions in workflow instances which are in the progress of executing. Our approach also takes into account identical resources and different types of loops that may exist within a workflow. A prototype exception prediction system was developed in JAVA and integrated with YAWL system [10]. We have also extended the definition of YAWL workflow schema for defining different types of loop. We are currently in the process of extending our algorithm to take into account other complex workflow patterns proposed in [7]. 7. Acknowledgment his research is funded by the University of Macau under grant RG056/06-07S/SYW/FS Audit rail Data Management, Intelligent Deadline Escalation, and Exception Prediction in Workflows. 8. References [1] J.H. Son, J.S. Kim and M.H. Kim, Extracting the workflow critical path from the extended well-formed workflow schema, Journal of Computer and System Sciences, 701), pp , [2] F. Casati, Models, semantics, and formal methods for the design of workflows and their exceptions, PhD hesis, [3] P.J. Kammer, G.A. Bolcer, R.N. aylor, A.S. Hitomi and M. Bergman, echniques for supporting dynamic and adaptive workflow, Computer Supported Cooperative Work, 93-4), pp , [4] D. Grigori, F. Casati, U. Dayal and M.C. Shan, Improving business process quality through exception understanding, predication, and prevention, In Proceedings of the 27th International Conference on Very Large Data Bases, San Francisco, CA, USA, pp , [5] M. Klein and C. Dellarocas, A knowledge-based approach to handling exceptions in workflow systems, Journal of Computer Supported Collaborative Work, 93-4), pp , [6] S. Lua, A. Bernsteinb, and P. Lewis, Automatic workflow verification and generation, heoretical Computer Science, ), pp , 14, [7] W.M.P. van der Aalst, A.H.M. ter Hofstede, B. Kiepuszewski, and A.P. Barros, Workflow Patterns, Distributed and Parallel Databases, 143), pp. 5-51, [8] H. Li and Y. Yang, Dynamic Checking of emporal Constraints for Concurrent Workflows, Electronic Commerce Research and Applications, 42005), pp , [9] W.M.P. van der Aalst and A.H.M. ter Hofstede, YAWL: Yet Another Workflow Language, Information Systems, 304), pp , [10] YAWL,
Critical Path Based Approach for Predicting Temporal Exceptions in Resource Constrained Concurrent Workflows
International Journal of Information Technology and Web Engineering, 5(3), 27-48, July-September 2010 27 Critical Path Based Approach for Predicting Temporal Exceptions in Resource Constrained Concurrent
More informationWorkflow : Patterns and Specifications
Workflow : Patterns and Specifications Seminar Presentation by Ahana Pradhan Under the guidance of Prof. Rushikesh K. Joshi Department of Computer Science and Engineering Indian Institute of Technology,
More informationGeneration of Interactive Questionnaires Using YAWL-based Workflow Models
Management Studies, December 2015, Vol. 3, No. 11-12, 273-280 doi: 10.17265/2328-2185/2015.1112.002 D DAVID PUBLISHING Generation of Interactive Questionnaires Using YAWL-based Workflow Models Raimond
More informationSupporting the Workflow Management System Development Process with YAWL
Supporting the Workflow Management System Development Process with YAWL R.S. Mans 1, W.M.P. van der Aalst 1 Department of Mathematics and Computer Science, Eindhoven University of Technology, P.O. ox 513,
More informationOn Capturing Process Requirements of Workflow Based Business Information Systems *
On Capturing Process Requirements of Workflow Based Business Information Systems * Wasim Sadiq and Maria E. Orlowska Distributed Systems Technology Centre Department of Computer Science & Electrical Engineering
More informationTHE SELECTION OF THE ARCHITECTURE OF ELECTRONIC SERVICE CONSIDERING THE PROCESS FLOW
THE SELECTION OF THE ARCHITECTURE OF ELECTRONIC SERVICE CONSIDERING THE PROCESS FLOW PETERIS STIPRAVIETIS, MARIS ZIEMA Institute of Computer Control, Automation and Computer Engineering, Faculty of Computer
More informationWhite Paper Workflow Patterns and BPMN
White Paper Workflow Patterns and BPMN WP0121 December 2013 In general, a pattern describes a solution for a recurring problem. Patterns are commonly used in architecture as a formal way of documenting
More informationCover Page. The handle holds various files of this Leiden University dissertation
Cover Page The handle http://hdl.handle.net/1887/22891 holds various files of this Leiden University dissertation Author: Gouw, Stijn de Title: Combining monitoring with run-time assertion checking Issue
More informationFormal Foundation of Workflow Hyperpaths and a Graph Search Algorithm for Workflow Hyperpath Generation
Formal Foundation of Workflow Hyperpaths and a Graph Search Algorithm for Workflow Hyperpath Generation Sinnakkrishnan Perumal and Ambuj Mahanti Indian Institute of Management Calcutta, Joka, D.H. Road,
More informationProcess Modelling using Petri Nets
Process Modelling using Petri Nets Katalina Grigorova Abstract: This paper discusses the reasons, which impose Petri nets as a conceptual standard for modelling and analysis of workflow. Petri nets notation
More informationTowards a Task-Oriented, Policy-Driven Business Requirements Specification for Web Services
Towards a Task-Oriented, Policy-Driven Business Requirements Specification for Web Services Stephen Gorton and Stephan Reiff-Marganiec Department of Computer Science, University of Leicester University
More informationHierarchical Clustering of Process Schemas
Hierarchical Clustering of Process Schemas Claudia Diamantini, Domenico Potena Dipartimento di Ingegneria Informatica, Gestionale e dell'automazione M. Panti, Università Politecnica delle Marche - via
More informationDESIGN AND OVERHEAD ANALYSIS OF WORKFLOWS IN GRID
I J D M S C L Volume 6, o. 1, January-June 2015 DESIG AD OVERHEAD AALYSIS OF WORKFLOWS I GRID S. JAMUA 1, K. REKHA 2, AD R. KAHAVEL 3 ABSRAC Grid workflow execution is approached as a pure best effort
More informationIntegration of UML and Petri Net for the Process Modeling and Analysis in Workflow Applications
Integration of UML and Petri Net for the Process Modeling and Analysis in Workflow Applications KWAN-HEE HAN *, SEOCK-KYU YOO **, BOHYUN KIM *** Department of Industrial & Systems Engineering, Gyeongsang
More informationAdaptive Selection of Necessary and Sufficient Checkpoints for Dynamic Verification of Temporal Constraints in Grid Workflow Systems
Adaptive Selection of Necessary and Sufficient Checkpoints for Dynamic Verification of Temporal Constraints in Grid Workflow Systems JINJUN CHEN, YUN YANG Swinburne University of Technology In grid workflow
More informationSeamless (and Temporal) Conceptual Modeling of Business Process Information
Seamless (and Temporal) Conceptual Modeling of Business Process Information Carlo Combi and Sara Degani Department of Computer Science - University of Verona Strada le Grazie 15, 37134 Verona, Italy carlo.combi@univr.it,sara.degani@gmail.com
More informationDiscovering Workflow Patterns from Timed Logs
Discovering Workflow Patterns from Timed Logs Walid Gaaloul, Sami Bhiri and Claude Godart LORIA INRIA CNRS (UMR 7503) BP 239 F-54506 Vandoeuvre-lès-Nancy Cedex, France gaaloul@loria.fr bhiri@loria.fr godart@loria.fr
More informationExtending Workflow Systems with QoS Management
599 Advances in Extending Workflow Systems with QoS Management Jorge Cardoso 1 Summary As organizations adopt new working models, such as e-commerce, new challenges arise for workflow management systems
More informationAN EFFICIENT DEADLOCK DETECTION AND RESOLUTION ALGORITHM FOR GENERALIZED DEADLOCKS. Wei Lu, Chengkai Yu, Weiwei Xing, Xiaoping Che and Yong Yang
International Journal of Innovative Computing, Information and Control ICIC International c 2017 ISSN 1349-4198 Volume 13, Number 2, April 2017 pp. 703 710 AN EFFICIENT DEADLOCK DETECTION AND RESOLUTION
More informationCorrection of Data-flow Errors in Workflows
Abstract Correction of Data-flow Errors in Workflows Divya Sharma, Srujana Pinjala and Anup K Sen Indian Institute of Management Calcutta Joka, D.H. Road, Kolkata 700104, India Email: {divyas12, pinjalas10,
More informationA Graph-search Based Approach to BPEL4WS Test Generation
A Graph-search Based Approach to BPEL4WS Test Generation Yuan Yuan, Zhongjie Li, Wei Sun China Research Lab IBM Beijing, P.R.C. {yyuan, lizhongj, weisun}@cn.ibm.com Abstract Business Process Execution
More informationQueue Theory based Response Time Analyses for Geo-Information Processing Chain
Queue Theory based Response Time Analyses for Geo-Information Processing Chain Jie Chen, Jian Peng, Min Deng, Chao Tao, Haifeng Li a School of Civil Engineering, School of Geosciences Info-Physics, Central
More informationUNIT I. Introduction
UNIT I Introduction Objective To know the need for database system. To study about various data models. To understand the architecture of database system. To introduce Relational database system. Introduction
More informationBaseline Scheduling with ProTrack
Baseline Scheduling with ProTrack 1.0 (last update: 11/11/08) 1 Baseline Scheduling with ProTrack by Mario Vanhoucke Professor at Ghent University and Vlerick Leuven Gent Management School (Belgium) Partner
More informationCorrectness Criteria Beyond Serializability
Correctness Criteria Beyond Serializability Mourad Ouzzani Cyber Center, Purdue University http://www.cs.purdue.edu/homes/mourad/ Brahim Medjahed Department of Computer & Information Science, The University
More informationThis is the author s version of a work that was submitted/accepted for publication in the following source:
This is the author s version of a work that was submitted/accepted for publication in the following source: Marrella, Andrea, Mecella, Massimo, Russo, Alessandro, ter Hofstede, Arthur H.M., & Sardina,
More informationA Declarative Approach for Flexible Business Processes Management
A Declarative Approach for Flexible Business Processes Management M. Pesic and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology, P.O.Box 513, NL-5600 MB, Eindhoven,
More informationTowards Process Instances Building for Spaghetti Processes
Towards Process Instances Building for Spaghetti Processes Claudia Diamantini 1, Laura Genga 1, Domenico Potena 1, and Wil M.P. van der Aalst 2 1 Information Engineering Department Università Politecnica
More informationCOVER SHEET. This is the author version of article published as:
COVER SHEET This is the author version of article published as: Ouyang, Chun and Verbeek, Eric and van der Aalst, Wil M.P. and Breutel, Stephan W. and Dumas, Marlon and ter Hofstede, Arthur H. (2005) WofBPEL:
More information2015 International Conference on Computer, Control, Informatics and Its Applications
2015 International Conference on Computer, Control, Informatics and Its Applications Business Process Optimization from Single Timestamp Event Log Riyanarto Sarno *, Fitrianing Haryadita, Kartini, Sarwosri
More informationBusiness Process Management Seminar 2007/ Oktober 2007
Business Process Management Seminar 2007/2008 22. Oktober 2007 Process 2 Today Presentation of topics Deadline 29.10.2007 9:00 Rank up to 3 topics - send to hagen.overdick@hpi.uni-potsdam.de 3.12.2007
More informationJoint Entity Resolution
Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute
More informationNOTES ON OBJECT-ORIENTED MODELING AND DESIGN
NOTES ON OBJECT-ORIENTED MODELING AND DESIGN Stephen W. Clyde Brigham Young University Provo, UT 86402 Abstract: A review of the Object Modeling Technique (OMT) is presented. OMT is an object-oriented
More informationQualitative Analysis of WorkFlow nets using Linear Logic: Soundness Verification
Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Qualitative Analysis of WorkFlow nets using Linear Logic: Soundness Verification
More informationProcess Model Consistency Measurement
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 7, Issue 6 (Nov. - Dec. 2012), PP 40-44 Process Model Consistency Measurement Sukanth Sistla CSE Department, JNTUniversity,
More informationWorkflow Modeling for Virtual Processes: an Order-Preserving Process-View Approach
In: Information Systems Workflow Modeling for Virtual Processes: an Order-Preserving Process-View Approach Duen-Ren Liu Minxin Shen Institute of Information Management, National Chiao Tung University 1001
More informationModeling Routing Constructs to Represent Distributed Workflow Processes Using Extended Petri Nets
Modeling Routing Constructs to Represent Distributed Workflow Processes Using Extended Petri Nets Mehmet Karay * Final International University, Business Administrative, Toroslar Avenue, No:6, 99370, Catalkoy,
More informationPetri-net-based Workflow Management Software
Petri-net-based Workflow Management Software W.M.P. van der Aalst Department of Mathematics and Computing Science, Eindhoven University of Technology, P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands,
More informationChapter 1: Introduction
Chapter 1: Introduction Database System Concepts, 6 th Ed. See www.db-book.com for conditions on re-use Outline The Need for Databases Data Models Relational Databases Database Design Storage Manager Query
More informationFormal Model. Figure 1: The target concept T is a subset of the concept S = [0, 1]. The search agent needs to search S for a point in T.
Although this paper analyzes shaping with respect to its benefits on search problems, the reader should recognize that shaping is often intimately related to reinforcement learning. The objective in reinforcement
More informationFlowBack: Providing Backward Recovery for Workflow Management Systems
FlowBack: Providing Backward Recovery for Workflow Management Systems Bartek Kiepuszewski, Ralf Muhlberger, Maria E. Orlowska Distributed Systems Technology Centre Distributed Databases Unit ABSTRACT The
More informationVisual support for work assignment in YAWL
Visual support for work assignment in YAWL Citation for published version (APA): Cardi, F., Leoni, de, M., Adams, M., Hofstede, ter, A. H. M., & Aalst, van der, W. M. P. (2009). Visual support for work
More informationScan Scheduling Specification and Analysis
Scan Scheduling Specification and Analysis Bruno Dutertre System Design Laboratory SRI International Menlo Park, CA 94025 May 24, 2000 This work was partially funded by DARPA/AFRL under BAE System subcontract
More informationYAWL in the Cloud. 1 Introduction. D.M.M. Schunselaar, T.F. van der Avoort, H.M.W. Verbeek, and W.M.P. van der Aalst
YAWL in the Cloud D.M.M. Schunselaar, T.F. van der Avoort, H.M.W. Verbeek, and W.M.P. van der Aalst Eindhoven University of Technology, P.O. Box 513, 5600 MB, Eindhoven, The Netherlands {d.m.m.schunselaar,
More informationChapter 6 Declarative Workflow
Chapter 6 Declarative Workflow Maja Pesic, Helen Schonenberg, and Wil van der Aalst 6.1 Introduction During the design of any information system, it is important to balance between flexibility and support.
More informationDiscovering Periodic Patterns in System Logs
Discovering Periodic Patterns in System Logs Marcin Zimniak 1, Janusz R. Getta 2, and Wolfgang Benn 1 1 Faculty of Computer Science, TU Chemnitz, Germany {marcin.zimniak,benn}@cs.tu-chemnitz.de 2 School
More informationSUPPORTING DELEGATION IN SECURE WORKFLOW MANAGEMENT SYSTEMS
SUPPORTING DELEGATION IN SECURE WORKFLOW MANAGEMENT SYSTEMS Vijayalakshmi Atluri 1, Elisa Bertino 2, Elena Ferrari 3 Pietro Mazzoleni 2 1 MSIS Department CIMIC, Rutgers University, atluri@cimic.rutgers.edu
More informationREAL-TIME DATABASES (RTDB)
REAL-TIME DATABASES (RTDB) Prof. Fabio A. Schreiber Politecnico di Milano REAL-TIME DATABASE SYSTEMS DATABASE SYSTEMS WHICH MANAGE TIME CONSTRAINED DATA SPECIFIC TIME INTERVALS FOR DATA VALIDITY VALIDITY
More informationMappings from BPEL to PMR for Business Process Registration
Mappings from BPEL to PMR for Business Process Registration Jingwei Cheng 1, Chong Wang 1 +, Keqing He 1, Jinxu Jia 2, Peng Liang 1 1 State Key Lab. of Software Engineering, Wuhan University, China cinfiniter@gmail.com,
More informationTool Support for Design Inspection: Automatic Generation of Questions
Tool Support for Design Inspection: Automatic Generation of Questions Tim Heyer Department of Computer and Information Science, Linköping University, S-581 83 Linköping, Email: Tim.Heyer@ida.liu.se Contents
More informationWeb Service Usage Mining: Mining For Executable Sequences
7th WSEAS International Conference on APPLIED COMPUTER SCIENCE, Venice, Italy, November 21-23, 2007 266 Web Service Usage Mining: Mining For Executable Sequences MOHSEN JAFARI ASBAGH, HASSAN ABOLHASSANI
More informationConformance Checking Evaluation of Process Discovery Using Modified Alpha++ Miner Algorithm
Conformance Checking Evaluation of Process Discovery Using Modified Alpha++ Miner Algorithm Yutika Amelia Effendi and Riyanarto Sarno Department of Informatics, Faculty of Information and Communication
More informationModule 14: Approaches to Control Flow Analysis Lecture 27: Algorithm and Interval. The Lecture Contains: Algorithm to Find Dominators.
The Lecture Contains: Algorithm to Find Dominators Loop Detection Algorithm to Detect Loops Extended Basic Block Pre-Header Loops With Common eaders Reducible Flow Graphs Node Splitting Interval Analysis
More informationOn The Theoretical Foundation for Data Flow Analysis in Workflow Management
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2005 Proceedings Americas Conference on Information Systems (AMCIS) 2005 On The Theoretical Foundation for Data Flow Analysis in
More informationDealing with Artifact-Centric Systems: a Process Mining Approach
Dealing with Artifact-Centric Systems: a Process Mining Approach Guangming Li and Renata Medeiros de Carvalho 2 Abstract: Process mining provides a series of techniques to analyze business processes based
More informationTowards Automated Process Modeling based on BPMN Diagram Composition
Towards Automated Process Modeling based on BPMN Diagram Composition Piotr Wiśniewski, Krzysztof Kluza and Antoni Ligęza AGH University of Science and Technology al. A. Mickiewicza 30, 30-059 Krakow, Poland
More informationIndistinguishability: Friend and Foe of Concurrent Data Structures. Hagit Attiya CS, Technion
Indistinguishability: Friend and Foe of Concurrent Data Structures Hagit Attiya CS, Technion Uncertainty is a main obstacle for designing correct applications in concurrent systems Formally captured by
More informationA Mobile Agent-based Model for Service Management in Virtual Active Networks
A Mobile Agent-based Model for Service Management in Virtual Active Networks Fábio Luciano Verdi and Edmundo R. M. Madeira Institute of Computing, University of Campinas (UNICAMP), Campinas-SP, Brazil
More informationAdaptive Building of Decision Trees by Reinforcement Learning
Proceedings of the 7th WSEAS International Conference on Applied Informatics and Communications, Athens, Greece, August 24-26, 2007 34 Adaptive Building of Decision Trees by Reinforcement Learning MIRCEA
More informationControl. CS432: Distributed Systems Spring 2017
Transactions and Concurrency Control Reading Chapter 16, 17 (17.2,17.4,17.5 ) [Coulouris 11] Chapter 12 [Ozsu 10] 2 Objectives Learn about the following: Transactions in distributed systems Techniques
More informationTemporal Databases. Week 8. (Chapter 22 & Notes)
Temporal Databases Week 8 (Chapter 22 & Notes) 1 Introduction Temporal database contains historical,timevarying as well as current data. Note: historical record is a misleading term - a temporal database
More informationUNIT-IV BASIC BEHAVIORAL MODELING-I
UNIT-IV BASIC BEHAVIORAL MODELING-I CONTENTS 1. Interactions Terms and Concepts Modeling Techniques 2. Interaction Diagrams Terms and Concepts Modeling Techniques Interactions: Terms and Concepts: An interaction
More informationDiscovering Periodic Patterns in Database Audit Trails
Vol.29 (DTA 2013), pp.365-371 http://dx.doi.org/10.14257/astl.2013.29.76 Discovering Periodic Patterns in Database Audit Trails Marcin Zimniak 1, Janusz R. Getta 2, and Wolfgang Benn 1 1 Faculty of Computer
More informationCOST ESTIMATION FOR DISTRIBUTED SYSTEMS USING USE CASE DIAGRAM
S. V. Pingale et al. : Cost Estimation for Distributed Systems using Use Case Diagram Journal of Advances in Engineering Science 41 Section C (3), July - December 2010, PP 41-48 COST ESTIMATION FOR DISTRIBUTED
More informationINTRODUCING A MULTIVIEW SOFTWARE ARCHITECTURE PROCESS BY EXAMPLE Ahmad K heir 1, Hala Naja 1 and Mourad Oussalah 2
INTRODUCING A MULTIVIEW SOFTWARE ARCHITECTURE PROCESS BY EXAMPLE Ahmad K heir 1, Hala Naja 1 and Mourad Oussalah 2 1 Faculty of Sciences, Lebanese University 2 LINA Laboratory, University of Nantes ABSTRACT:
More informationEnterprise System Integration. Lecture 10: Implementing Process-Centric Composite Services in BPEL
MTAT.03.229 Enterprise System Integration Lecture 10: Implementing Process-Centric Composite Services in BPEL Marlon Dumas marlon. dumas ät ut. ee Questions about reading material Week 8: Zimmermann, Doubrovski,
More informationA Two-phase Distributed Training Algorithm for Linear SVM in WSN
Proceedings of the World Congress on Electrical Engineering and Computer Systems and Science (EECSS 015) Barcelona, Spain July 13-14, 015 Paper o. 30 A wo-phase Distributed raining Algorithm for Linear
More informationA Tool for Supporting Object-Aware Processes
A Tool for Supporting Object-Aware Processes Carolina Ming Chiao, Vera Künzle, Kevin Andrews, Manfred Reichert Institute of Databases and Information Systems University of Ulm, Germany Email: {carolina.chiao,
More informationUpdates through Views
1 of 6 15 giu 2010 00:16 Encyclopedia of Database Systems Springer Science+Business Media, LLC 2009 10.1007/978-0-387-39940-9_847 LING LIU and M. TAMER ÖZSU Updates through Views Yannis Velegrakis 1 (1)
More informationOptimized Query Plan Algorithm for the Nested Query
Optimized Query Plan Algorithm for the Nested Query Chittaranjan Pradhan School of Computer Engineering, KIIT University, Bhubaneswar, India Sushree Sangita Jena School of Computer Engineering, KIIT University,
More informationARELAY network consists of a pair of source and destination
158 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 1, JANUARY 2009 Parity Forwarding for Multiple-Relay Networks Peyman Razaghi, Student Member, IEEE, Wei Yu, Senior Member, IEEE Abstract This paper
More informationA Concurrency Control for Transactional Mobile Agents
A Concurrency Control for Transactional Mobile Agents Jeong-Joon Yoo and Dong-Ik Lee Department of Information and Communications, Kwang-Ju Institute of Science and Technology (K-JIST) Puk-Gu Oryong-Dong
More informationBusiness process modeling and automation IDU0330 Lecture 3 BPMN Enn Õunapuu ICT-643
Business process modeling and automation IDU0330 Lecture 3 BPMN Enn Õunapuu enn.ounapuu@ttu.ee ICT-643 Agenda for BPMN BPM reference model BPMN basic elements Modelling methodology BPMN diagramming style
More informationProposal for Business Transaction Protocol Version 1.0
Proposal for Business Transaction Protocol Version 1.0 Sanjay Dalal (sanjay.dalal@bea.com) Pal Takacsi-Nagy (pal.takacsi@bea.com) Abstract Long lasting business transactions spanning multiple enterprises
More informationOn Utilizing Web Service Equivalence for Supporting the Composition Life Cycle
On Utilizing Web Service Equivalence for Supporting the Composition Life Cycle Stefanie Rinderle-Ma 1, Manfred Reichert 2, Martin Jurisch 3 1 Workflow Systems and Technology Group, University of Vienna,
More informationA MAS Based ETL Approach for Complex Data
A MAS Based ETL Approach for Complex Data O. Boussaid, F. Bentayeb, J. Darmont Abstract : In a data warehousing process, the phase of data integration is crucial. Many methods for data integration have
More informationAutomatic Merging of Specification Documents in a Parallel Development Environment
Automatic Merging of Specification Documents in a Parallel Development Environment Rickard Böttcher Linus Karnland Department of Computer Science Lund University, Faculty of Engineering December 16, 2008
More informationIntelligent Risk Identification and Analysis in IT Network Systems
Intelligent Risk Identification and Analysis in IT Network Systems Masoud Mohammadian University of Canberra, Faculty of Information Sciences and Engineering, Canberra, ACT 2616, Australia masoud.mohammadian@canberra.edu.au
More informationBPMN2BPEL transformation with Fujaba - a Case Study
BPMN2BPEL transformation with Fujaba - a Case Study Ruben Jubeh SE, Kassel University Wilhelmshöher Allee 73 34121 Kassel ruben.jubeh@uni-kassel.de ABSTRACT We have modeled a BPMN to BPEL synthesis transformation
More informationECE519 Advanced Operating Systems
IT 540 Operating Systems ECE519 Advanced Operating Systems Prof. Dr. Hasan Hüseyin BALIK (10 th Week) (Advanced) Operating Systems 10. Multiprocessor, Multicore and Real-Time Scheduling 10. Outline Multiprocessor
More informationESO207A: Data Structures and Algorithms End-semester exam
ESO207A: Data Structures and Algorithms End-semester exam Max marks: 120 Time: 180 mins. 17-July-2017 1. Answer all 7 questions. Questions 1 to 3 are from module 3 and questions 4 to 7 are from module
More informationAn Improved Priority Ceiling Protocol to Reduce Context Switches in Task Synchronization 1
An Improved Priority Ceiling Protocol to Reduce Context Switches in Task Synchronization 1 Albert M.K. Cheng and Fan Jiang Computer Science Department University of Houston Houston, TX, 77204, USA http://www.cs.uh.edu
More informationCHAPTER 5 GENERATING TEST SCENARIOS AND TEST CASES FROM AN EVENT-FLOW MODEL
CHAPTER 5 GENERATING TEST SCENARIOS AND TEST CASES FROM AN EVENT-FLOW MODEL 5.1 INTRODUCTION The survey presented in Chapter 1 has shown that Model based testing approach for automatic generation of test
More informationThe Encoding Complexity of Network Coding
The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network
More informationNew Bucket Join Algorithm for Faster Join Query Results
The International Arab Journal of Information Technology, Vol. 12, No. 6A, 2015 701 New Bucket Algorithm for Faster Query Results Hemalatha Gunasekaran 1 and ThanushkodiKeppana Gowder 2 1 Department Of
More informationUC Irvine UC Irvine Previously Published Works
UC Irvine UC Irvine Previously Published Works Title Differencing and merging within an evolving product line architecture Permalink https://escholarship.org/uc/item/0k73r951 Authors Chen, Ping H Critchlow,
More informationA CORBA-based Multidatabase System - Panorama Project
A CORBA-based Multidatabase System - Panorama Project Lou Qin-jian, Sarem Mudar, Li Rui-xuan, Xiao Wei-jun, Lu Zheng-ding, Chen Chuan-bo School of Computer Science and Technology, Huazhong University of
More informationAn algorithm for Performance Analysis of Single-Source Acyclic graphs
An algorithm for Performance Analysis of Single-Source Acyclic graphs Gabriele Mencagli September 26, 2011 In this document we face with the problem of exploiting the performance analysis of acyclic graphs
More informationA Transaction Processing Technique in Real-Time Object- Oriented Databases
122 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.1, January 2008 A Transaction Processing Technique in Real-Time Object- Oriented Databases Woochun Jun Dept. of Computer
More informationProcessing and Others. Xiaojun Qi -- REU Site Program in CVMA
Advanced Digital Image Processing and Others Xiaojun Qi -- REU Site Program in CVMA (0 Summer) Segmentation Outline Strategies and Data Structures Overview of Algorithms Region Splitting Region Merging
More informationLike scalar processor Processes individual data items Item may be single integer or floating point number. - 1 of 15 - Superscalar Architectures
Superscalar Architectures Have looked at examined basic architecture concepts Starting with simple machines Introduced concepts underlying RISC machines From characteristics of RISC instructions Found
More informationChapter 1: Introduction
This image cannot currently be displayed. Chapter 1: Introduction Database System Concepts, 5th Ed. See www.db-book.com for conditions on re-use Chapter 1: Introduction Purpose of Database Systems View
More informationCanonization Service for AProMoRe
QUT Faculty of Science and Technology Canonization Service for AProMoRe Done by: Abdurrahman Alshareef Supervised by: Marcello La Rosa Semester 2-2010 Table of Contents Versions history...3 Preview...4
More informationModeling Choreographies: BPMN 2.0 versus BPEL-based Approaches
Institute of Architecture of Application Systems Modeling Choreographies: BPMN 2.0 versus BPEL-based Approaches Oliver Kopp, Frank Leymann, Sebastian Wagner Institute of Architecture of Application Systems,
More informationIMPLEMENTING TASK AND RESOURCE ALLOCATION ALGORITHM BASED ON NON-COOPERATIVE GAME THEORY IN CLOUD COMPUTING
DOI: http://dx.doi.org/10.26483/ijarcs.v9i1.5389 ISSN No. 0976 5697 Volume 9, No. 1, January-February 2018 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online
More informationWorkflow Time Patterns for Process-Aware Information Systems
Workflow Time Patterns for Process-Aware Information Systems Andreas Lanz 1,BarbaraWeber 2, and Manfred Reichert 1 1 Institute of Databases and Information Systems, Ulm University, Germany {Andreas.Lanz,Manfred.Reichert}@uni-ulm.de
More informationInteractions A link message
Interactions An interaction is a behavior that is composed of a set of messages exchanged among a set of objects within a context to accomplish a purpose. A message specifies the communication between
More informationReport on the paper Summarization-based Mining Bipartite Graphs
Report on the paper Summarization-based Mining Bipartite Graphs Annika Glauser ETH Zuerich Spring 2015 Extract from the paper [1]: Introduction The paper Summarization-based Mining Bipartite Graphs introduces
More informationModule 3. Requirements Analysis and Specification. Version 2 CSE IIT, Kharagpur
Module 3 Requirements Analysis and Specification Lesson 6 Formal Requirements Specification Specific Instructional Objectives At the end of this lesson the student will be able to: Explain what a formal
More informationJava PathFinder JPF 2 Second Generation of Java Model Checker
Java PathFinder JPF 2 Second Generation of Java Model Checker Guenther Brand Mat. Nr. 9430535 27. 06. 2003 Abstract This essay is based on the papers Java PathFinder, Second Generation of Java Model Checker
More information