Temporal Exception Prediction for Loops in Resource Constrained Concurrent Workflows

Size: px
Start display at page:

Download "Temporal Exception Prediction for Loops in Resource Constrained Concurrent Workflows"

Transcription

1 emporal Exception Prediction for Loops in Resource Constrained Concurrent Workflows Iok-Fai Leong, Yain-Whar Si Faculty of Science and echnology, University of Macau {henryifl, Abstract Workflow management systems WfMS) are widely used for improving business processes and providing better quality of services. However, rapid changes in business environment can cause exceptions in WfMS leading to deadline violation and other consequences. In these circumstances, one of the crucial tasks for a workflow administrator is to detect any potential exceptions as early as possible so that corrective measures can be taken. However such detections can be extremely complex since a workflow process may consist of various control flow pattern and each pattern has its own way of influencing temporal properties of a task. In this paper, we describe a novel approach for predicting temporal exceptions for loops in concurrent workflows which are required to share limited identical resources. Our approach is divided into two phases; preparation phase and prediction phase. In the preparation phase, temporal and resource constraints are calculated for each task within the workflow schema. In the prediction phase, an algorithm is used to predict potential deadline violations by taking into account constraints calculated from the preparation phase. 1. Introduction Workflow Management Systems WfMS) enable the automation of business operations by allocating and dispatching work to users according to executable process models [8]. A workflow schema is the description of the business flow [1]. Workflow schemas are defined to support business s goals. A workflow instance, however, is an execution of the workflow schema. While executing a workflow instance, some events that are not defined in the workflow schema may occur. hese events are typically considered as exceptions in workflow management systems. Exceptions in a workflow management system can be classified into different categories. Fabio Casati [2] defines two types of exceptions; expected exceptions which are the results of predictable deviations from the normal behavior of a process and unexpected exceptions which are the outcomes of inconsistencies between the business process in the real world and its corresponding workflow description. Most of the researches mainly focus on detecting and handling of expected exceptions. Although unexpected exceptions are difficult to be handled, they usually occur during execution of a workflow. In general, an organization may need to execute different workflows simultaneously for different segments of the business and these concurrent workflows can be interdependent. For example, two concurrent workflows representing a purchase process and an inventory management process may share the same resources. Conflicts occur when a limited number of resources are available during a given interval. Recent work by Li et al. [8] addressed the problem of predicting unexpected exceptions in concurrent workflows by verifying temporal constraints. However, the approach described in [8] only considers single unique resources. In this paper, we address this issue by taking into account identical resources which are shared by one or more concurrent workflows. A loop refers to a recursive execution of one or more tasks within a workflow. Although loops are extensively used in workflow schemas, less attention has been devoted to understanding their impact on temporal exceptions. Indeed, looping of tasks within workflows can greatly increase the difficulty in exception prediction since rapid changes in the number of iterations can cause deadline violations as well as conflicts in resource usage. In [1], Jin Hyun Son et al. propose a method for identifying the critical path for a given workflow schema based on queuing theory. he critical path is then used for the assignment of deadlines for the activities in the workflow. In their approach, loops are transformed into a sequence control construct. However, to the best of authors knowledge, no work has been reported on predicting exception in concurrent workflows which contain loops. In this paper, we further extend the temporal checking algorithm from [8] to allow prediction of unexpected temporal exceptions in concurrent workflows which not only share identical resources but also contain one or more loops. Our approach can be basically divided into

2 two phases; preparation phase and prediction phase. In the preparation phase, temporal and resource constraints are calculated for each task within the workflow schema. In the prediction phase, an algorithm is used to predict potential deadline violations by taking into account constraints calculated from the preparation phase. his paper is organized into 6 sections. A brief introduction to resource and temporal constraints in a workflow is given in Section 2. We describe our proposed solution in Section 3 and 4. In Section 5, we briefly review recent work. In section 6, we summarize our ideas and future work. 2. Resource and temporal constraints Workflows within an organization can be designed to execute in parallel. In addition, they may share the same resources e.g., human resources, financial resources, etc.). Conflicts usually occur when tasks from instances of different workflows compete for limited resources. Figure 1a) shows an example of conflict involving tasks from two concurrent workflows when four units of identical resources are only available for sharing. In this example, resource conflicts occur at tasks 22, 23, 24 and 25. Furthermore, these resource conflicts are linked to the underlying temporal constraints of a task within the workflow. We denote the duration of a task by a boundary [d ),D )], where d ) and D ) are the minimum and maximum durations of a task respectively. In addition, we can define 4 temporal constraints for a task: a) Earliest Start ime ES), b) Latest Start ime LS), c) Earliest End ime EE), and d) Latest End ime LE) see figure 1b)). hese values are assumed to be defined in the workflow specification during design time by the workflow designers a) ime 0 ES LS D ask d b) EE LE ime Figure 1. a) Resource conflict in workflows b) emporal constraints of task hese constraints are crucial in determining the deadline of a workflow. For example, LE of a task can be used to determine the hard deadline of a workflow. Basically, temporal constraints of a task are related to its predecessor and successor tasks. For instance, if a task is scheduled to execute right after another task, its ES value can be set to the EE value of its predecessor task. However, depending on the control flow [7] within the workflow, derivation of these constraints can be different. A workflow may also have loops. A loop is a repeated execution of one or more tasks within a workflow. Such repetition has significant impact on temporal constraints of a task which may belong to one or more loops. Since tasks within a loop can be repeated a number of times, calculating temporal constraints of a task also needs to take into account possible repetition of its ancestors and descendants as well. Such calculation can be even more problematic when a task belongs to one or more nested loops. In the following sections, we describe how ES and LE values of a task can be calculated for simple control flow patterns and loops. 3. Calculating temporal constraints 3.1. Deriving ES and LE for simple control flow patterns Similar to [8], our approach predicts temporal exceptions in a workflow by creating a conflict free execution trace based on the workflow specification. he resulted execution trace defines the order of task execution with respect to the temporal and resource constraints and is free from any conflict. o do so, we first need to calculate the earliest start time ES) and latest end time LE) of every task in the workflow. hese values define the upper and lower boundaries of a time window in which a task may execute. According to this time frame, a task must not be executed before its ES value and after its LE value. Such underpinning is crucial in determining the hard deadline of the entire workflow and also in predicting whether or not a given workflow instance will violate the deadline. In our proposed algorithm, we assume that a task is predefined with a minimum duration d ), a maximum duration D ), and a resource usage R ). asks are linked by different types of flows. Different combinations of task-flow pairs within the workflow are defined as control patterns [7]. Our aim is to calculate ES and LE values for those control patterns which are commonly used in business process modeling. Figure 2 shows various types of control patterns and corresponding formulas for deriving ES and LE values.

3 Sequence ES )=ES )+d ) LE )=LE )+D ) XOR-Join ES )=Max{ES )+d ), ES k )+d k )} LE )=Max{LE ),LE )}+D ) XOR-Split ES )=ES )+d );ES )=ES )+d ) LE )=LE )+D );LE )=LE )+D ) OR-Join ES )=Min{ES )+d ), ES )+d )} LE )=Min{LE ),LE )}+D ) OR-Split ES )=ES )+d );ES )=ES )+d ) LE )=LE )+D );LE )=LE )+D ) AND-Split ES )=ES )+d );ES )=ES )+d ) LE )=LE )+D );LE )=LE )+D ) AND-Join ES )=Max{ES )+d ), ES k )+d k )} LE )=Max{LE ),LE )}+D ) Figure 2. Deriving ES and LEn simple control flow patterns [8] 3.2. Deriving LE values for tasks within loops Based on the definition from [7], loops can be classified as structured loops, and arbitrary loops. In this paper, we further divide arbitrary loops into nested loops and crossing loops. In a nested loop, all tasks within a loop appear in another loop. In a crossing loop, only a certain number of tasks within a loop appear in another loop. In this section, we show how LE values for the tasks in these three types of loops can be derived. Let I N be the maximum number of iterations that a loop N within a workflow wf can be executed and let S N be the set of tasks in loop N in wf. We assume that I N > 0 and S N {} i.e., loop N should contain at least one task), and that the maximum number of iteration I N ) of a loop N will be reset once the execution flow leaves N e.g., when the flow leaves the last task in a loop). We also assume that each task within a workflow is atomic, i.e., a task must be executed entirely until it is completed and cannot be interleaved with other tasks. In the following sections, we show how LE value can be derived for three different types of loop Structured Loop. he simplest form of a loop is the Structured Loop [7]. An example of a structured loop is shown in Figure 3. Definition 1: Structured Loop. A loop N in a workflow wf is a Structured Loop if for all tasks n S N, does not exist in any other loop in wf. In Figure 3, if loop N can iterate for at most I N times, then each of the tasks in S N can be executed for at most I N +1 times. he calculation of ES for tasks in a loop is done according to their control patterns as shown in Figure 2. However, in calculating LE values, we need to consider the worst case since the loop can iterates for at most I N times. Let Φ N be the total maximum duration for executing all tasks within loop N for one iteration. Φ N = k = i D 1) We calculate the latest ending time LE) of the first task in loop N as follows: LE ) = LE ) + I Φ + D ) 2) ) i 0 N N i Since other tasks within the loop N inherit the LE values of, their LE values can be calculated as: LE ) = LE ) + D ) if i 3) Nested Loop. In a nested loop, all tasks within a loop are also members of another loop. Such loops are also classified as Arbitrary Loops [7]. For instance, in Figure 4, a loop N is nested within another loop M. Figure 3. Structured Loop Figure 4. Nested Loop

4 Definition 2: Nested loop: A loop M in a workflow wf is a nested loop if there exists another loop N such that all the tasks in N are also members of M and both M and N do not share the same initial task 1. When we calculate the ES and LE values of the tasks in loop M, we also need to take into account the time required to execute loop N. From Figure 4, we can define the latest ending time LE )) of the first task of loop M as follows: LE i ) = LE 0 ) + I MΦM + I M I NΦN + D i ) 4) his formula applies to the first task of an outermost loop M in Figure 4. Since remaining tasks in loop M inherit the LE values of, their LE values can be calculated as: LE ) = LE 1) + D ) if 5) i, S, M S N Since loop N in this case is a Structured Loop and there is no other nested loop inside N, LE values of tasks in S N can be calculated by using equation 3) Crossing loop. Crossing loops are also classified as Arbitrary Loops [7]. In Figure 5, an example of crossing loop is depicted with two loops N and M crossing each other at a and. Figure 5. Crossing Loop Definition 3: Crossing loop. Loop N and M in a workflow wf are crossing loops if 1) both N and M share at least one task and 2) there exists at least one task in wf which is a member of only either one of the loops 2. We calculate the LE values of the tasks in crossing loops by considering the worst case scenario, i.e., when loop N iterates for I N times and loop M iterates for I M times. Let be the first task in loop N in Figure 4 and loop N is crossing with another loop M. We derive the latest ending time of the first task of loop N as follows: LE ) = LE ) + I I + 1) Φ + I Φ + D ) 6) i 0 N M N M M i For the remaining tasks that are within loop N or loop M except a ), their LE values can be calculated as follows: 1 If M and N share the same initial task, we consider M as a crossing loop. 2 Both loops may begin at the same task, i.e. both flows from and b may point back to either or a in Figure 5. In this case, the loop whose last task ends earlier is considered as loop N. LE ) = LE ) + D ) if 1 SN SM, i, a Since a is the first task of the structured loop M, its LE value will be calculated by using equation 2) as follows: LE ) = LE ) + I Φ + D ) 8) a a 1 M M a Loops are defined in the workflow specification during design time. o identify the loop type in a workflow, we check whether tasks in a loop are contained in other loops or not. Figure 6 shows the algorithm for identifying the type of loop N. For each task t in loop N If t exists in other loop N then If all tasks in N exists in N then N is a Nested Loop Else N is a Crossing Lop End If Else N is a Structured Loop End If End Figure 6. Psudocode for identifying loop type In Figure 7, we describe the algorithm for calculating ES and LE values of tasks in an arbitrary workflow wf. Calculate the ES values of each task in wf, according to the control patterns defined in Section 3.1 For each task n wf If s the first task in a loop N then /* calculate LE) recursively */ Calculate LE) as calrecur N) + D) Else Calculate LE) according to the equations defined in Figure 2 Function calrecur N) Begin If N is a structure loop then return I N * Φ N.//eq.3) Else if N is a nested loop which contains another loop M then return I N*calRecurM)+I N* Φ N.//eq.4) Else if N is a crossing loop with loop M then return calrecurm)+i N*I M+1)* Φ N //eq.6) End Figure 7. Psudocode for calculating ES and LE value of a workflow which contains loops In this algorithm, we first calculate the ES values for every task. Next we check whether a task is within in a loop. If it is within a loop, we identify the type of loop for applying the appropriate equation in 7)

5 calculating the LE values accordingly. his algorithm also supports cases where loops are nested/crossed in more than two levels. 4. Predicting temporal exceptions he proposed prediction algorithm is separated into two steps as shown in Figure 8. In the conflict detection and resolution step, we extend the algorithm from [8] to re-enact a conflict free execution trace based on the pre-defined workflow specification during design time. In the prediction step, we use the generated execution trace from previous step to check possible deadline violations in run time for the two workflow instances which are executing in parallel. 4. Generate an execution trace by taking into account revised LE values and allowing each task to execute in maximum duration. An execution trace will be created in step I, where tasks are only permitted to use the maximum allowable resources. he execution trace guarantees that the concurrent workflows will not exceed the resource usage during execution. he latest end time of the resulted conflict-free execution trace is said to be the hard deadline HD) of the workflow. Step II Prediction 5. Pick a time point current time for workflow instances wi1 and wi2, which are instantiated from the workflow specification wf1 and wf2 respectively during run time. 6. Calculate the total minimum execution time required for all tasks including those which are currently being executed at current time and tasks which are planning to be executed after current time. 7. If current time + the total minimum execution time > HD), we can conclude that an exception is predicted, otherwise exception cannot be determined. 5. Related work Figure 8. Steps for predicting temporal exceptions Step I Conflict Detection and Resolution 1. Calculate the ES and LE values for each tasks in wf1 and wf2 according to the types of control patterns. 2. For each task in wf1 and wf2, we calculate dep ), which is a list of tasks which has resource conflicts with. A task t in wf1 and wf2 where t ) is a member of dep ) if i) resource usage of + resource usage of t > maximum number of available resources and ii) and t have overlapping execution time, i.e., μ, ES i ) μ LE i ), ES t') μ LE t' ) 3. If dep ) is not empty, then do the followings: i) For each task t in dep ), if execution time of and t overlap, modify [ESt ), LEt )] as [MAX{ESt ), ES )+d )}, MAX{LEt ), LE )+D )}]. ii) Modify the LE values for subsequent tasks of t using the new LEt ) value. In the area of programming languages, exceptions may interrupt the normal flow of a program, leading to unexpected abortion of a program. Exceptions in workflow management system are also similar to that of programming languages. Klein et al. [5] describe a knowledge-based approach that allows workflow designer to determine when a workflow may fail. In their approach, rules are created for detecting exceptions during workflow definition stage. he approach proposed in [5] mainly focuses on prediction of exceptions at the workflow definition. his kind of approach is static and not flexible enough to deal with changes in a workflow. However, in our approach, in addition to the workflow definition, we also make use of the audit trail information of the workflow instance to dynamically generate the execution trace, thus result in a prediction model that reflects the real situation more accurately. An alternative approach is proposed by Kammer et al. [3] for detecting exceptions during workflow execution. heir approach is implemented in Endeavors workflow support system by comparing its historical information with current workflow status and feedback data captured during the execution of a workflow. he system then uses the result for detecting exceptions.

6 Similar to [3], our approach extends XML Schema of YAWL [9] for modeling different kinds of loop. A prototype prediction system was also developed based on YAWL workflow management system. Exceptions can occur due to the modeling errors in workflow schemas. Shiyong Lu et al. [6] develop an algorithm for checking the validity of a workflow model represented in the form of a graph. By identifying the precondition and post-condition of a workflow, the algorithm checks if the input and output edges of the workflow follows a valid pattern or not. Our approach does not validate the correctness of the workflow specification. Instead, the proposed algorithms take into account several commonly used control patterns and loops for prediction. In [4], Grigori et al. propose an approach for exception prediction based on data warehousing and mining techniques. In their approach, WfMS log is extracted and stored in a relational database, which is then used in generating rules and decision trees for exception prediction in future workflow instances. he main difference between our approach and the approach proposed by [4] is that, our approach allows predicting of exceptions in concurrent workflows which are required to share identical resources. In the context of predicting temporal exceptions in concurrent workflows, our approach extends the algorithm given in [8] by taking into account different kinds of loops which are identified in [7]. he recursive algorithm outlined in our approach allows calculation of LE values for nested loops with arbitrary depth. In resource sharing, our approach allows sharing of identical resources whereas the approach proposed in [8] only considers sharing of single unique resources by concurrent workflows. 6. Conclusion In this paper, we describe a novel approach for predicting temporal exceptions for loops in resource constrained concurrent workflows. In our approach, we create a conflict free execution trace for concurrent workflows to resolve both time and resource constraints. We then use the generated execution trace to predict exceptions in workflow instances which are in the progress of executing. Our approach also takes into account identical resources and different types of loops that may exist within a workflow. A prototype exception prediction system was developed in JAVA and integrated with YAWL system [10]. We have also extended the definition of YAWL workflow schema for defining different types of loop. We are currently in the process of extending our algorithm to take into account other complex workflow patterns proposed in [7]. 7. Acknowledgment his research is funded by the University of Macau under grant RG056/06-07S/SYW/FS Audit rail Data Management, Intelligent Deadline Escalation, and Exception Prediction in Workflows. 8. References [1] J.H. Son, J.S. Kim and M.H. Kim, Extracting the workflow critical path from the extended well-formed workflow schema, Journal of Computer and System Sciences, 701), pp , [2] F. Casati, Models, semantics, and formal methods for the design of workflows and their exceptions, PhD hesis, [3] P.J. Kammer, G.A. Bolcer, R.N. aylor, A.S. Hitomi and M. Bergman, echniques for supporting dynamic and adaptive workflow, Computer Supported Cooperative Work, 93-4), pp , [4] D. Grigori, F. Casati, U. Dayal and M.C. Shan, Improving business process quality through exception understanding, predication, and prevention, In Proceedings of the 27th International Conference on Very Large Data Bases, San Francisco, CA, USA, pp , [5] M. Klein and C. Dellarocas, A knowledge-based approach to handling exceptions in workflow systems, Journal of Computer Supported Collaborative Work, 93-4), pp , [6] S. Lua, A. Bernsteinb, and P. Lewis, Automatic workflow verification and generation, heoretical Computer Science, ), pp , 14, [7] W.M.P. van der Aalst, A.H.M. ter Hofstede, B. Kiepuszewski, and A.P. Barros, Workflow Patterns, Distributed and Parallel Databases, 143), pp. 5-51, [8] H. Li and Y. Yang, Dynamic Checking of emporal Constraints for Concurrent Workflows, Electronic Commerce Research and Applications, 42005), pp , [9] W.M.P. van der Aalst and A.H.M. ter Hofstede, YAWL: Yet Another Workflow Language, Information Systems, 304), pp , [10] YAWL,

Critical Path Based Approach for Predicting Temporal Exceptions in Resource Constrained Concurrent Workflows

Critical Path Based Approach for Predicting Temporal Exceptions in Resource Constrained Concurrent Workflows International Journal of Information Technology and Web Engineering, 5(3), 27-48, July-September 2010 27 Critical Path Based Approach for Predicting Temporal Exceptions in Resource Constrained Concurrent

More information

Workflow : Patterns and Specifications

Workflow : Patterns and Specifications Workflow : Patterns and Specifications Seminar Presentation by Ahana Pradhan Under the guidance of Prof. Rushikesh K. Joshi Department of Computer Science and Engineering Indian Institute of Technology,

More information

Generation of Interactive Questionnaires Using YAWL-based Workflow Models

Generation of Interactive Questionnaires Using YAWL-based Workflow Models Management Studies, December 2015, Vol. 3, No. 11-12, 273-280 doi: 10.17265/2328-2185/2015.1112.002 D DAVID PUBLISHING Generation of Interactive Questionnaires Using YAWL-based Workflow Models Raimond

More information

Supporting the Workflow Management System Development Process with YAWL

Supporting the Workflow Management System Development Process with YAWL Supporting the Workflow Management System Development Process with YAWL R.S. Mans 1, W.M.P. van der Aalst 1 Department of Mathematics and Computer Science, Eindhoven University of Technology, P.O. ox 513,

More information

On Capturing Process Requirements of Workflow Based Business Information Systems *

On Capturing Process Requirements of Workflow Based Business Information Systems * On Capturing Process Requirements of Workflow Based Business Information Systems * Wasim Sadiq and Maria E. Orlowska Distributed Systems Technology Centre Department of Computer Science & Electrical Engineering

More information

THE SELECTION OF THE ARCHITECTURE OF ELECTRONIC SERVICE CONSIDERING THE PROCESS FLOW

THE SELECTION OF THE ARCHITECTURE OF ELECTRONIC SERVICE CONSIDERING THE PROCESS FLOW THE SELECTION OF THE ARCHITECTURE OF ELECTRONIC SERVICE CONSIDERING THE PROCESS FLOW PETERIS STIPRAVIETIS, MARIS ZIEMA Institute of Computer Control, Automation and Computer Engineering, Faculty of Computer

More information

White Paper Workflow Patterns and BPMN

White Paper Workflow Patterns and BPMN White Paper Workflow Patterns and BPMN WP0121 December 2013 In general, a pattern describes a solution for a recurring problem. Patterns are commonly used in architecture as a formal way of documenting

More information

Cover Page. The handle holds various files of this Leiden University dissertation

Cover Page. The handle   holds various files of this Leiden University dissertation Cover Page The handle http://hdl.handle.net/1887/22891 holds various files of this Leiden University dissertation Author: Gouw, Stijn de Title: Combining monitoring with run-time assertion checking Issue

More information

Formal Foundation of Workflow Hyperpaths and a Graph Search Algorithm for Workflow Hyperpath Generation

Formal Foundation of Workflow Hyperpaths and a Graph Search Algorithm for Workflow Hyperpath Generation Formal Foundation of Workflow Hyperpaths and a Graph Search Algorithm for Workflow Hyperpath Generation Sinnakkrishnan Perumal and Ambuj Mahanti Indian Institute of Management Calcutta, Joka, D.H. Road,

More information

Process Modelling using Petri Nets

Process Modelling using Petri Nets Process Modelling using Petri Nets Katalina Grigorova Abstract: This paper discusses the reasons, which impose Petri nets as a conceptual standard for modelling and analysis of workflow. Petri nets notation

More information

Towards a Task-Oriented, Policy-Driven Business Requirements Specification for Web Services

Towards a Task-Oriented, Policy-Driven Business Requirements Specification for Web Services Towards a Task-Oriented, Policy-Driven Business Requirements Specification for Web Services Stephen Gorton and Stephan Reiff-Marganiec Department of Computer Science, University of Leicester University

More information

Hierarchical Clustering of Process Schemas

Hierarchical Clustering of Process Schemas Hierarchical Clustering of Process Schemas Claudia Diamantini, Domenico Potena Dipartimento di Ingegneria Informatica, Gestionale e dell'automazione M. Panti, Università Politecnica delle Marche - via

More information

DESIGN AND OVERHEAD ANALYSIS OF WORKFLOWS IN GRID

DESIGN AND OVERHEAD ANALYSIS OF WORKFLOWS IN GRID I J D M S C L Volume 6, o. 1, January-June 2015 DESIG AD OVERHEAD AALYSIS OF WORKFLOWS I GRID S. JAMUA 1, K. REKHA 2, AD R. KAHAVEL 3 ABSRAC Grid workflow execution is approached as a pure best effort

More information

Integration of UML and Petri Net for the Process Modeling and Analysis in Workflow Applications

Integration of UML and Petri Net for the Process Modeling and Analysis in Workflow Applications Integration of UML and Petri Net for the Process Modeling and Analysis in Workflow Applications KWAN-HEE HAN *, SEOCK-KYU YOO **, BOHYUN KIM *** Department of Industrial & Systems Engineering, Gyeongsang

More information

Adaptive Selection of Necessary and Sufficient Checkpoints for Dynamic Verification of Temporal Constraints in Grid Workflow Systems

Adaptive Selection of Necessary and Sufficient Checkpoints for Dynamic Verification of Temporal Constraints in Grid Workflow Systems Adaptive Selection of Necessary and Sufficient Checkpoints for Dynamic Verification of Temporal Constraints in Grid Workflow Systems JINJUN CHEN, YUN YANG Swinburne University of Technology In grid workflow

More information

Seamless (and Temporal) Conceptual Modeling of Business Process Information

Seamless (and Temporal) Conceptual Modeling of Business Process Information Seamless (and Temporal) Conceptual Modeling of Business Process Information Carlo Combi and Sara Degani Department of Computer Science - University of Verona Strada le Grazie 15, 37134 Verona, Italy carlo.combi@univr.it,sara.degani@gmail.com

More information

Discovering Workflow Patterns from Timed Logs

Discovering Workflow Patterns from Timed Logs Discovering Workflow Patterns from Timed Logs Walid Gaaloul, Sami Bhiri and Claude Godart LORIA INRIA CNRS (UMR 7503) BP 239 F-54506 Vandoeuvre-lès-Nancy Cedex, France gaaloul@loria.fr bhiri@loria.fr godart@loria.fr

More information

Extending Workflow Systems with QoS Management

Extending Workflow Systems with QoS Management 599 Advances in Extending Workflow Systems with QoS Management Jorge Cardoso 1 Summary As organizations adopt new working models, such as e-commerce, new challenges arise for workflow management systems

More information

AN EFFICIENT DEADLOCK DETECTION AND RESOLUTION ALGORITHM FOR GENERALIZED DEADLOCKS. Wei Lu, Chengkai Yu, Weiwei Xing, Xiaoping Che and Yong Yang

AN EFFICIENT DEADLOCK DETECTION AND RESOLUTION ALGORITHM FOR GENERALIZED DEADLOCKS. Wei Lu, Chengkai Yu, Weiwei Xing, Xiaoping Che and Yong Yang International Journal of Innovative Computing, Information and Control ICIC International c 2017 ISSN 1349-4198 Volume 13, Number 2, April 2017 pp. 703 710 AN EFFICIENT DEADLOCK DETECTION AND RESOLUTION

More information

Correction of Data-flow Errors in Workflows

Correction of Data-flow Errors in Workflows Abstract Correction of Data-flow Errors in Workflows Divya Sharma, Srujana Pinjala and Anup K Sen Indian Institute of Management Calcutta Joka, D.H. Road, Kolkata 700104, India Email: {divyas12, pinjalas10,

More information

A Graph-search Based Approach to BPEL4WS Test Generation

A Graph-search Based Approach to BPEL4WS Test Generation A Graph-search Based Approach to BPEL4WS Test Generation Yuan Yuan, Zhongjie Li, Wei Sun China Research Lab IBM Beijing, P.R.C. {yyuan, lizhongj, weisun}@cn.ibm.com Abstract Business Process Execution

More information

Queue Theory based Response Time Analyses for Geo-Information Processing Chain

Queue Theory based Response Time Analyses for Geo-Information Processing Chain Queue Theory based Response Time Analyses for Geo-Information Processing Chain Jie Chen, Jian Peng, Min Deng, Chao Tao, Haifeng Li a School of Civil Engineering, School of Geosciences Info-Physics, Central

More information

UNIT I. Introduction

UNIT I. Introduction UNIT I Introduction Objective To know the need for database system. To study about various data models. To understand the architecture of database system. To introduce Relational database system. Introduction

More information

Baseline Scheduling with ProTrack

Baseline Scheduling with ProTrack Baseline Scheduling with ProTrack 1.0 (last update: 11/11/08) 1 Baseline Scheduling with ProTrack by Mario Vanhoucke Professor at Ghent University and Vlerick Leuven Gent Management School (Belgium) Partner

More information

Correctness Criteria Beyond Serializability

Correctness Criteria Beyond Serializability Correctness Criteria Beyond Serializability Mourad Ouzzani Cyber Center, Purdue University http://www.cs.purdue.edu/homes/mourad/ Brahim Medjahed Department of Computer & Information Science, The University

More information

This is the author s version of a work that was submitted/accepted for publication in the following source:

This is the author s version of a work that was submitted/accepted for publication in the following source: This is the author s version of a work that was submitted/accepted for publication in the following source: Marrella, Andrea, Mecella, Massimo, Russo, Alessandro, ter Hofstede, Arthur H.M., & Sardina,

More information

A Declarative Approach for Flexible Business Processes Management

A Declarative Approach for Flexible Business Processes Management A Declarative Approach for Flexible Business Processes Management M. Pesic and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology, P.O.Box 513, NL-5600 MB, Eindhoven,

More information

Towards Process Instances Building for Spaghetti Processes

Towards Process Instances Building for Spaghetti Processes Towards Process Instances Building for Spaghetti Processes Claudia Diamantini 1, Laura Genga 1, Domenico Potena 1, and Wil M.P. van der Aalst 2 1 Information Engineering Department Università Politecnica

More information

COVER SHEET. This is the author version of article published as:

COVER SHEET. This is the author version of article published as: COVER SHEET This is the author version of article published as: Ouyang, Chun and Verbeek, Eric and van der Aalst, Wil M.P. and Breutel, Stephan W. and Dumas, Marlon and ter Hofstede, Arthur H. (2005) WofBPEL:

More information

2015 International Conference on Computer, Control, Informatics and Its Applications

2015 International Conference on Computer, Control, Informatics and Its Applications 2015 International Conference on Computer, Control, Informatics and Its Applications Business Process Optimization from Single Timestamp Event Log Riyanarto Sarno *, Fitrianing Haryadita, Kartini, Sarwosri

More information

Business Process Management Seminar 2007/ Oktober 2007

Business Process Management Seminar 2007/ Oktober 2007 Business Process Management Seminar 2007/2008 22. Oktober 2007 Process 2 Today Presentation of topics Deadline 29.10.2007 9:00 Rank up to 3 topics - send to hagen.overdick@hpi.uni-potsdam.de 3.12.2007

More information

Joint Entity Resolution

Joint Entity Resolution Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute

More information

NOTES ON OBJECT-ORIENTED MODELING AND DESIGN

NOTES ON OBJECT-ORIENTED MODELING AND DESIGN NOTES ON OBJECT-ORIENTED MODELING AND DESIGN Stephen W. Clyde Brigham Young University Provo, UT 86402 Abstract: A review of the Object Modeling Technique (OMT) is presented. OMT is an object-oriented

More information

Qualitative Analysis of WorkFlow nets using Linear Logic: Soundness Verification

Qualitative Analysis of WorkFlow nets using Linear Logic: Soundness Verification Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Qualitative Analysis of WorkFlow nets using Linear Logic: Soundness Verification

More information

Process Model Consistency Measurement

Process Model Consistency Measurement IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 7, Issue 6 (Nov. - Dec. 2012), PP 40-44 Process Model Consistency Measurement Sukanth Sistla CSE Department, JNTUniversity,

More information

Workflow Modeling for Virtual Processes: an Order-Preserving Process-View Approach

Workflow Modeling for Virtual Processes: an Order-Preserving Process-View Approach In: Information Systems Workflow Modeling for Virtual Processes: an Order-Preserving Process-View Approach Duen-Ren Liu Minxin Shen Institute of Information Management, National Chiao Tung University 1001

More information

Modeling Routing Constructs to Represent Distributed Workflow Processes Using Extended Petri Nets

Modeling Routing Constructs to Represent Distributed Workflow Processes Using Extended Petri Nets Modeling Routing Constructs to Represent Distributed Workflow Processes Using Extended Petri Nets Mehmet Karay * Final International University, Business Administrative, Toroslar Avenue, No:6, 99370, Catalkoy,

More information

Petri-net-based Workflow Management Software

Petri-net-based Workflow Management Software Petri-net-based Workflow Management Software W.M.P. van der Aalst Department of Mathematics and Computing Science, Eindhoven University of Technology, P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands,

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1: Introduction Database System Concepts, 6 th Ed. See www.db-book.com for conditions on re-use Outline The Need for Databases Data Models Relational Databases Database Design Storage Manager Query

More information

Formal Model. Figure 1: The target concept T is a subset of the concept S = [0, 1]. The search agent needs to search S for a point in T.

Formal Model. Figure 1: The target concept T is a subset of the concept S = [0, 1]. The search agent needs to search S for a point in T. Although this paper analyzes shaping with respect to its benefits on search problems, the reader should recognize that shaping is often intimately related to reinforcement learning. The objective in reinforcement

More information

FlowBack: Providing Backward Recovery for Workflow Management Systems

FlowBack: Providing Backward Recovery for Workflow Management Systems FlowBack: Providing Backward Recovery for Workflow Management Systems Bartek Kiepuszewski, Ralf Muhlberger, Maria E. Orlowska Distributed Systems Technology Centre Distributed Databases Unit ABSTRACT The

More information

Visual support for work assignment in YAWL

Visual support for work assignment in YAWL Visual support for work assignment in YAWL Citation for published version (APA): Cardi, F., Leoni, de, M., Adams, M., Hofstede, ter, A. H. M., & Aalst, van der, W. M. P. (2009). Visual support for work

More information

Scan Scheduling Specification and Analysis

Scan Scheduling Specification and Analysis Scan Scheduling Specification and Analysis Bruno Dutertre System Design Laboratory SRI International Menlo Park, CA 94025 May 24, 2000 This work was partially funded by DARPA/AFRL under BAE System subcontract

More information

YAWL in the Cloud. 1 Introduction. D.M.M. Schunselaar, T.F. van der Avoort, H.M.W. Verbeek, and W.M.P. van der Aalst

YAWL in the Cloud. 1 Introduction. D.M.M. Schunselaar, T.F. van der Avoort, H.M.W. Verbeek, and W.M.P. van der Aalst YAWL in the Cloud D.M.M. Schunselaar, T.F. van der Avoort, H.M.W. Verbeek, and W.M.P. van der Aalst Eindhoven University of Technology, P.O. Box 513, 5600 MB, Eindhoven, The Netherlands {d.m.m.schunselaar,

More information

Chapter 6 Declarative Workflow

Chapter 6 Declarative Workflow Chapter 6 Declarative Workflow Maja Pesic, Helen Schonenberg, and Wil van der Aalst 6.1 Introduction During the design of any information system, it is important to balance between flexibility and support.

More information

Discovering Periodic Patterns in System Logs

Discovering Periodic Patterns in System Logs Discovering Periodic Patterns in System Logs Marcin Zimniak 1, Janusz R. Getta 2, and Wolfgang Benn 1 1 Faculty of Computer Science, TU Chemnitz, Germany {marcin.zimniak,benn}@cs.tu-chemnitz.de 2 School

More information

SUPPORTING DELEGATION IN SECURE WORKFLOW MANAGEMENT SYSTEMS

SUPPORTING DELEGATION IN SECURE WORKFLOW MANAGEMENT SYSTEMS SUPPORTING DELEGATION IN SECURE WORKFLOW MANAGEMENT SYSTEMS Vijayalakshmi Atluri 1, Elisa Bertino 2, Elena Ferrari 3 Pietro Mazzoleni 2 1 MSIS Department CIMIC, Rutgers University, atluri@cimic.rutgers.edu

More information

REAL-TIME DATABASES (RTDB)

REAL-TIME DATABASES (RTDB) REAL-TIME DATABASES (RTDB) Prof. Fabio A. Schreiber Politecnico di Milano REAL-TIME DATABASE SYSTEMS DATABASE SYSTEMS WHICH MANAGE TIME CONSTRAINED DATA SPECIFIC TIME INTERVALS FOR DATA VALIDITY VALIDITY

More information

Mappings from BPEL to PMR for Business Process Registration

Mappings from BPEL to PMR for Business Process Registration Mappings from BPEL to PMR for Business Process Registration Jingwei Cheng 1, Chong Wang 1 +, Keqing He 1, Jinxu Jia 2, Peng Liang 1 1 State Key Lab. of Software Engineering, Wuhan University, China cinfiniter@gmail.com,

More information

Tool Support for Design Inspection: Automatic Generation of Questions

Tool Support for Design Inspection: Automatic Generation of Questions Tool Support for Design Inspection: Automatic Generation of Questions Tim Heyer Department of Computer and Information Science, Linköping University, S-581 83 Linköping, Email: Tim.Heyer@ida.liu.se Contents

More information

Web Service Usage Mining: Mining For Executable Sequences

Web Service Usage Mining: Mining For Executable Sequences 7th WSEAS International Conference on APPLIED COMPUTER SCIENCE, Venice, Italy, November 21-23, 2007 266 Web Service Usage Mining: Mining For Executable Sequences MOHSEN JAFARI ASBAGH, HASSAN ABOLHASSANI

More information

Conformance Checking Evaluation of Process Discovery Using Modified Alpha++ Miner Algorithm

Conformance Checking Evaluation of Process Discovery Using Modified Alpha++ Miner Algorithm Conformance Checking Evaluation of Process Discovery Using Modified Alpha++ Miner Algorithm Yutika Amelia Effendi and Riyanarto Sarno Department of Informatics, Faculty of Information and Communication

More information

Module 14: Approaches to Control Flow Analysis Lecture 27: Algorithm and Interval. The Lecture Contains: Algorithm to Find Dominators.

Module 14: Approaches to Control Flow Analysis Lecture 27: Algorithm and Interval. The Lecture Contains: Algorithm to Find Dominators. The Lecture Contains: Algorithm to Find Dominators Loop Detection Algorithm to Detect Loops Extended Basic Block Pre-Header Loops With Common eaders Reducible Flow Graphs Node Splitting Interval Analysis

More information

On The Theoretical Foundation for Data Flow Analysis in Workflow Management

On The Theoretical Foundation for Data Flow Analysis in Workflow Management Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2005 Proceedings Americas Conference on Information Systems (AMCIS) 2005 On The Theoretical Foundation for Data Flow Analysis in

More information

Dealing with Artifact-Centric Systems: a Process Mining Approach

Dealing with Artifact-Centric Systems: a Process Mining Approach Dealing with Artifact-Centric Systems: a Process Mining Approach Guangming Li and Renata Medeiros de Carvalho 2 Abstract: Process mining provides a series of techniques to analyze business processes based

More information

Towards Automated Process Modeling based on BPMN Diagram Composition

Towards Automated Process Modeling based on BPMN Diagram Composition Towards Automated Process Modeling based on BPMN Diagram Composition Piotr Wiśniewski, Krzysztof Kluza and Antoni Ligęza AGH University of Science and Technology al. A. Mickiewicza 30, 30-059 Krakow, Poland

More information

Indistinguishability: Friend and Foe of Concurrent Data Structures. Hagit Attiya CS, Technion

Indistinguishability: Friend and Foe of Concurrent Data Structures. Hagit Attiya CS, Technion Indistinguishability: Friend and Foe of Concurrent Data Structures Hagit Attiya CS, Technion Uncertainty is a main obstacle for designing correct applications in concurrent systems Formally captured by

More information

A Mobile Agent-based Model for Service Management in Virtual Active Networks

A Mobile Agent-based Model for Service Management in Virtual Active Networks A Mobile Agent-based Model for Service Management in Virtual Active Networks Fábio Luciano Verdi and Edmundo R. M. Madeira Institute of Computing, University of Campinas (UNICAMP), Campinas-SP, Brazil

More information

Adaptive Building of Decision Trees by Reinforcement Learning

Adaptive Building of Decision Trees by Reinforcement Learning Proceedings of the 7th WSEAS International Conference on Applied Informatics and Communications, Athens, Greece, August 24-26, 2007 34 Adaptive Building of Decision Trees by Reinforcement Learning MIRCEA

More information

Control. CS432: Distributed Systems Spring 2017

Control. CS432: Distributed Systems Spring 2017 Transactions and Concurrency Control Reading Chapter 16, 17 (17.2,17.4,17.5 ) [Coulouris 11] Chapter 12 [Ozsu 10] 2 Objectives Learn about the following: Transactions in distributed systems Techniques

More information

Temporal Databases. Week 8. (Chapter 22 & Notes)

Temporal Databases. Week 8. (Chapter 22 & Notes) Temporal Databases Week 8 (Chapter 22 & Notes) 1 Introduction Temporal database contains historical,timevarying as well as current data. Note: historical record is a misleading term - a temporal database

More information

UNIT-IV BASIC BEHAVIORAL MODELING-I

UNIT-IV BASIC BEHAVIORAL MODELING-I UNIT-IV BASIC BEHAVIORAL MODELING-I CONTENTS 1. Interactions Terms and Concepts Modeling Techniques 2. Interaction Diagrams Terms and Concepts Modeling Techniques Interactions: Terms and Concepts: An interaction

More information

Discovering Periodic Patterns in Database Audit Trails

Discovering Periodic Patterns in Database Audit Trails Vol.29 (DTA 2013), pp.365-371 http://dx.doi.org/10.14257/astl.2013.29.76 Discovering Periodic Patterns in Database Audit Trails Marcin Zimniak 1, Janusz R. Getta 2, and Wolfgang Benn 1 1 Faculty of Computer

More information

COST ESTIMATION FOR DISTRIBUTED SYSTEMS USING USE CASE DIAGRAM

COST ESTIMATION FOR DISTRIBUTED SYSTEMS USING USE CASE DIAGRAM S. V. Pingale et al. : Cost Estimation for Distributed Systems using Use Case Diagram Journal of Advances in Engineering Science 41 Section C (3), July - December 2010, PP 41-48 COST ESTIMATION FOR DISTRIBUTED

More information

INTRODUCING A MULTIVIEW SOFTWARE ARCHITECTURE PROCESS BY EXAMPLE Ahmad K heir 1, Hala Naja 1 and Mourad Oussalah 2

INTRODUCING A MULTIVIEW SOFTWARE ARCHITECTURE PROCESS BY EXAMPLE Ahmad K heir 1, Hala Naja 1 and Mourad Oussalah 2 INTRODUCING A MULTIVIEW SOFTWARE ARCHITECTURE PROCESS BY EXAMPLE Ahmad K heir 1, Hala Naja 1 and Mourad Oussalah 2 1 Faculty of Sciences, Lebanese University 2 LINA Laboratory, University of Nantes ABSTRACT:

More information

Enterprise System Integration. Lecture 10: Implementing Process-Centric Composite Services in BPEL

Enterprise System Integration. Lecture 10: Implementing Process-Centric Composite Services in BPEL MTAT.03.229 Enterprise System Integration Lecture 10: Implementing Process-Centric Composite Services in BPEL Marlon Dumas marlon. dumas ät ut. ee Questions about reading material Week 8: Zimmermann, Doubrovski,

More information

A Two-phase Distributed Training Algorithm for Linear SVM in WSN

A Two-phase Distributed Training Algorithm for Linear SVM in WSN Proceedings of the World Congress on Electrical Engineering and Computer Systems and Science (EECSS 015) Barcelona, Spain July 13-14, 015 Paper o. 30 A wo-phase Distributed raining Algorithm for Linear

More information

A Tool for Supporting Object-Aware Processes

A Tool for Supporting Object-Aware Processes A Tool for Supporting Object-Aware Processes Carolina Ming Chiao, Vera Künzle, Kevin Andrews, Manfred Reichert Institute of Databases and Information Systems University of Ulm, Germany Email: {carolina.chiao,

More information

Updates through Views

Updates through Views 1 of 6 15 giu 2010 00:16 Encyclopedia of Database Systems Springer Science+Business Media, LLC 2009 10.1007/978-0-387-39940-9_847 LING LIU and M. TAMER ÖZSU Updates through Views Yannis Velegrakis 1 (1)

More information

Optimized Query Plan Algorithm for the Nested Query

Optimized Query Plan Algorithm for the Nested Query Optimized Query Plan Algorithm for the Nested Query Chittaranjan Pradhan School of Computer Engineering, KIIT University, Bhubaneswar, India Sushree Sangita Jena School of Computer Engineering, KIIT University,

More information

ARELAY network consists of a pair of source and destination

ARELAY network consists of a pair of source and destination 158 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 1, JANUARY 2009 Parity Forwarding for Multiple-Relay Networks Peyman Razaghi, Student Member, IEEE, Wei Yu, Senior Member, IEEE Abstract This paper

More information

A Concurrency Control for Transactional Mobile Agents

A Concurrency Control for Transactional Mobile Agents A Concurrency Control for Transactional Mobile Agents Jeong-Joon Yoo and Dong-Ik Lee Department of Information and Communications, Kwang-Ju Institute of Science and Technology (K-JIST) Puk-Gu Oryong-Dong

More information

Business process modeling and automation IDU0330 Lecture 3 BPMN Enn Õunapuu ICT-643

Business process modeling and automation IDU0330 Lecture 3 BPMN Enn Õunapuu ICT-643 Business process modeling and automation IDU0330 Lecture 3 BPMN Enn Õunapuu enn.ounapuu@ttu.ee ICT-643 Agenda for BPMN BPM reference model BPMN basic elements Modelling methodology BPMN diagramming style

More information

Proposal for Business Transaction Protocol Version 1.0

Proposal for Business Transaction Protocol Version 1.0 Proposal for Business Transaction Protocol Version 1.0 Sanjay Dalal (sanjay.dalal@bea.com) Pal Takacsi-Nagy (pal.takacsi@bea.com) Abstract Long lasting business transactions spanning multiple enterprises

More information

On Utilizing Web Service Equivalence for Supporting the Composition Life Cycle

On Utilizing Web Service Equivalence for Supporting the Composition Life Cycle On Utilizing Web Service Equivalence for Supporting the Composition Life Cycle Stefanie Rinderle-Ma 1, Manfred Reichert 2, Martin Jurisch 3 1 Workflow Systems and Technology Group, University of Vienna,

More information

A MAS Based ETL Approach for Complex Data

A MAS Based ETL Approach for Complex Data A MAS Based ETL Approach for Complex Data O. Boussaid, F. Bentayeb, J. Darmont Abstract : In a data warehousing process, the phase of data integration is crucial. Many methods for data integration have

More information

Automatic Merging of Specification Documents in a Parallel Development Environment

Automatic Merging of Specification Documents in a Parallel Development Environment Automatic Merging of Specification Documents in a Parallel Development Environment Rickard Böttcher Linus Karnland Department of Computer Science Lund University, Faculty of Engineering December 16, 2008

More information

Intelligent Risk Identification and Analysis in IT Network Systems

Intelligent Risk Identification and Analysis in IT Network Systems Intelligent Risk Identification and Analysis in IT Network Systems Masoud Mohammadian University of Canberra, Faculty of Information Sciences and Engineering, Canberra, ACT 2616, Australia masoud.mohammadian@canberra.edu.au

More information

BPMN2BPEL transformation with Fujaba - a Case Study

BPMN2BPEL transformation with Fujaba - a Case Study BPMN2BPEL transformation with Fujaba - a Case Study Ruben Jubeh SE, Kassel University Wilhelmshöher Allee 73 34121 Kassel ruben.jubeh@uni-kassel.de ABSTRACT We have modeled a BPMN to BPEL synthesis transformation

More information

ECE519 Advanced Operating Systems

ECE519 Advanced Operating Systems IT 540 Operating Systems ECE519 Advanced Operating Systems Prof. Dr. Hasan Hüseyin BALIK (10 th Week) (Advanced) Operating Systems 10. Multiprocessor, Multicore and Real-Time Scheduling 10. Outline Multiprocessor

More information

ESO207A: Data Structures and Algorithms End-semester exam

ESO207A: Data Structures and Algorithms End-semester exam ESO207A: Data Structures and Algorithms End-semester exam Max marks: 120 Time: 180 mins. 17-July-2017 1. Answer all 7 questions. Questions 1 to 3 are from module 3 and questions 4 to 7 are from module

More information

An Improved Priority Ceiling Protocol to Reduce Context Switches in Task Synchronization 1

An Improved Priority Ceiling Protocol to Reduce Context Switches in Task Synchronization 1 An Improved Priority Ceiling Protocol to Reduce Context Switches in Task Synchronization 1 Albert M.K. Cheng and Fan Jiang Computer Science Department University of Houston Houston, TX, 77204, USA http://www.cs.uh.edu

More information

CHAPTER 5 GENERATING TEST SCENARIOS AND TEST CASES FROM AN EVENT-FLOW MODEL

CHAPTER 5 GENERATING TEST SCENARIOS AND TEST CASES FROM AN EVENT-FLOW MODEL CHAPTER 5 GENERATING TEST SCENARIOS AND TEST CASES FROM AN EVENT-FLOW MODEL 5.1 INTRODUCTION The survey presented in Chapter 1 has shown that Model based testing approach for automatic generation of test

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

New Bucket Join Algorithm for Faster Join Query Results

New Bucket Join Algorithm for Faster Join Query Results The International Arab Journal of Information Technology, Vol. 12, No. 6A, 2015 701 New Bucket Algorithm for Faster Query Results Hemalatha Gunasekaran 1 and ThanushkodiKeppana Gowder 2 1 Department Of

More information

UC Irvine UC Irvine Previously Published Works

UC Irvine UC Irvine Previously Published Works UC Irvine UC Irvine Previously Published Works Title Differencing and merging within an evolving product line architecture Permalink https://escholarship.org/uc/item/0k73r951 Authors Chen, Ping H Critchlow,

More information

A CORBA-based Multidatabase System - Panorama Project

A CORBA-based Multidatabase System - Panorama Project A CORBA-based Multidatabase System - Panorama Project Lou Qin-jian, Sarem Mudar, Li Rui-xuan, Xiao Wei-jun, Lu Zheng-ding, Chen Chuan-bo School of Computer Science and Technology, Huazhong University of

More information

An algorithm for Performance Analysis of Single-Source Acyclic graphs

An algorithm for Performance Analysis of Single-Source Acyclic graphs An algorithm for Performance Analysis of Single-Source Acyclic graphs Gabriele Mencagli September 26, 2011 In this document we face with the problem of exploiting the performance analysis of acyclic graphs

More information

A Transaction Processing Technique in Real-Time Object- Oriented Databases

A Transaction Processing Technique in Real-Time Object- Oriented Databases 122 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.1, January 2008 A Transaction Processing Technique in Real-Time Object- Oriented Databases Woochun Jun Dept. of Computer

More information

Processing and Others. Xiaojun Qi -- REU Site Program in CVMA

Processing and Others. Xiaojun Qi -- REU Site Program in CVMA Advanced Digital Image Processing and Others Xiaojun Qi -- REU Site Program in CVMA (0 Summer) Segmentation Outline Strategies and Data Structures Overview of Algorithms Region Splitting Region Merging

More information

Like scalar processor Processes individual data items Item may be single integer or floating point number. - 1 of 15 - Superscalar Architectures

Like scalar processor Processes individual data items Item may be single integer or floating point number. - 1 of 15 - Superscalar Architectures Superscalar Architectures Have looked at examined basic architecture concepts Starting with simple machines Introduced concepts underlying RISC machines From characteristics of RISC instructions Found

More information

Chapter 1: Introduction

Chapter 1: Introduction This image cannot currently be displayed. Chapter 1: Introduction Database System Concepts, 5th Ed. See www.db-book.com for conditions on re-use Chapter 1: Introduction Purpose of Database Systems View

More information

Canonization Service for AProMoRe

Canonization Service for AProMoRe QUT Faculty of Science and Technology Canonization Service for AProMoRe Done by: Abdurrahman Alshareef Supervised by: Marcello La Rosa Semester 2-2010 Table of Contents Versions history...3 Preview...4

More information

Modeling Choreographies: BPMN 2.0 versus BPEL-based Approaches

Modeling Choreographies: BPMN 2.0 versus BPEL-based Approaches Institute of Architecture of Application Systems Modeling Choreographies: BPMN 2.0 versus BPEL-based Approaches Oliver Kopp, Frank Leymann, Sebastian Wagner Institute of Architecture of Application Systems,

More information

IMPLEMENTING TASK AND RESOURCE ALLOCATION ALGORITHM BASED ON NON-COOPERATIVE GAME THEORY IN CLOUD COMPUTING

IMPLEMENTING TASK AND RESOURCE ALLOCATION ALGORITHM BASED ON NON-COOPERATIVE GAME THEORY IN CLOUD COMPUTING DOI: http://dx.doi.org/10.26483/ijarcs.v9i1.5389 ISSN No. 0976 5697 Volume 9, No. 1, January-February 2018 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online

More information

Workflow Time Patterns for Process-Aware Information Systems

Workflow Time Patterns for Process-Aware Information Systems Workflow Time Patterns for Process-Aware Information Systems Andreas Lanz 1,BarbaraWeber 2, and Manfred Reichert 1 1 Institute of Databases and Information Systems, Ulm University, Germany {Andreas.Lanz,Manfred.Reichert}@uni-ulm.de

More information

Interactions A link message

Interactions A link message Interactions An interaction is a behavior that is composed of a set of messages exchanged among a set of objects within a context to accomplish a purpose. A message specifies the communication between

More information

Report on the paper Summarization-based Mining Bipartite Graphs

Report on the paper Summarization-based Mining Bipartite Graphs Report on the paper Summarization-based Mining Bipartite Graphs Annika Glauser ETH Zuerich Spring 2015 Extract from the paper [1]: Introduction The paper Summarization-based Mining Bipartite Graphs introduces

More information

Module 3. Requirements Analysis and Specification. Version 2 CSE IIT, Kharagpur

Module 3. Requirements Analysis and Specification. Version 2 CSE IIT, Kharagpur Module 3 Requirements Analysis and Specification Lesson 6 Formal Requirements Specification Specific Instructional Objectives At the end of this lesson the student will be able to: Explain what a formal

More information

Java PathFinder JPF 2 Second Generation of Java Model Checker

Java PathFinder JPF 2 Second Generation of Java Model Checker Java PathFinder JPF 2 Second Generation of Java Model Checker Guenther Brand Mat. Nr. 9430535 27. 06. 2003 Abstract This essay is based on the papers Java PathFinder, Second Generation of Java Model Checker

More information