Constraint Checking for Business Process Management
|
|
|
- Valentine Phillips
- 10 years ago
- Views:
Transcription
1 Constraint Checking for Business Process Management Wolfgang Runte 1, Marwane El Kharbili 2 1 Institute of Computer Science, University of Osnabrueck Albrechtstr. 28, Osnabrueck, Germany [email protected] 2 ARIS Research, IDS Scheer AG Altenkesselerstr. 17, Saarbruecken, Germany [email protected] Abstract: Compliance management tackles issues related to both modelling and enforcement of business constraints in enterprises. In the context of business process management, we propose and describe the use of constraint satisfaction problems as a formal mean for representing these business constraints. We propose a multi-level constraint satisfaction approach to handle different levels of abstraction in business process modelling. We elaborate on the modelling of compliance requirements using constraint satisfaction and discuss implications of this technique such as problem solving strategies. This work shows that a certain class of compliance problems which can be grounded to constraint satisfaction problems can be solved efficiently using the proposed approach. 1 Introduction Business Process Management (BPM) is the discipline of capturing, modelling, implementing, and controlling all activities taking place in an environment defining the enterprise, and this, in an integrated manner [Sch00, AHW03]. Several languages, frameworks, and tools that support one or many of the listed aspects are available. Organizations do not only own business processes, they are also subject to regulations. Companies are forced to implement measures ensuring they are compliant with these regulations, since non-compliance can cause judiciary pursuits or loss of market confidence and thus diminution in share value [KS+08]. Doing this, companies face two main problems: (i) finding suitable modelling formalisms and languages for expressing compliance constraints, while dealing with the complexity introduced by the various kinds of interdependencies between business processes. And (ii), proposing efficient means of compliance verification and enforcement that can both provide exact answers about the compliance status of business processes and this in a reasonable amount of time. Both authors are first authors and contributed equally to this work.
2 Among the various techniques already proposed for dealing with business constraints, modelling as constraint satisfaction problems (CSPs) is an attractive approach [Run09]. This position paper presents our ideas dealing with compliance in the context of business process management (BPM). In the following, we elaborate on compliance in BPM and focus on the use of CSP for this purpose in Section 2. Section 3 contains an explanation of the approach proposed in this work, while Section 4 provides an example of constraint checking as we propose it for BPM. An overview of related work is given in Section 5. Finally, Section 6 contains concluding remarks together with planned future work. 2 Problem 2.1 On Compliance as Constraint Enforcement Compliance means ensuring that structural and behavioural properties of business processes (BPs) (resp. business process architectures) are defined according to certain requirements. In the case of regulatory compliance, the latter requirements are provided by regulatory documents. Usually compliance requirements regard temporal properties of BPs, task selection criteria or resource allocation criteria as in [LS+06]. However, additionally to these requirements and to the dependencies between tasks in business processes, another aspect adds to the complexity of compliance management when observing business process in the context of BP architectures: dependencies between processes. In dealing with business process structures and compositions (which define architectures), inconsistencies may arise with regard to initial requirements on BPs as well as to compliance requirements. The problem we need to deal with is to (i) find out about these inconsistencies and to (ii) be able to propose configurations of BPs and BP architectures where these inconsistencies do not appear. CSPs take a set of variables and constraints on these variables and seek a solution to the problem of finding a consistent assignment to the values of these variables [Kum92]. If it is possible to represent compliance constraints as CSP problems by finding out which BPs and BP architecture variables and constraints relate on them (i. e. relations describing the dependencies between BPs), we may transform the problem of compliance to a CSP problem. This work examines cases where this reduction makes sense and where CSP can be a satisfying tool for answering the question of compliance. When related back to the problem definition above, the problem we face is to be able to find configurations in terms of variable domains that ensure that no inconsistencies in BPs and architectures can occur. One example of dependencies between business processes are sequential dependencies (i. e. ordering), which can be represented as constraint sets on values of input/output variables of processes that are executed in a sequence. There may be other kinds of dependencies as well, such as parallel execution dependencies, synchronisation dependencies or vertical dependencies (i. e. compositions of business processes where a BP task is in fact implemented by a BP).
3 2.2 Constraint Enforcement for Business Processes Constraint satisfaction problems have been in the focus of intensive research and experiences for decades. There exist efficient algorithms and heuristics for the reduction of problem size and for efficient generation of solutions. Overall, the techniques can be used to guarantee that specific relations hold [Kum92, Dec03]. A CSP is a triple (V, D, C) where V denotes a finite set of variables, D denotes a set of associated domains with possible values for each variable, and C denotes a set of constraints: V = {v 1,..., v n} a finite set of variables D = {D 1,..., D n} associated value domains {v 1 : D 1,...,v n : D n} C a finite set of constraints c i(v i), i {1,..., m}, with c i(v i) to set the subset V i = {v i 1,..., v i k} V in relation, solution space for c i(v i ): {D i 1... D i k} Each constraint defines a relation between a subset of variables and constrains the possible values for the involved variables. A constraint concerning only one variable is a unary constraint, constraints concerning two variables are binary constraints, constraints with three variables are ternary constraints, etc. A short example would be the following simple constraint problem: Let there be two variables a and b each with the assigned value domain {0, 1, 2, 3, 4, 5, 6, 7, 8, 9}, and the binary constraints c 1: a + b = 10 and c 2: a - b = 2. The solution for this simple constraint problem would be a = 6 and b = 4. Note that besides arithmetic domains also symbolic domains are feasible and that the principles are not restricted to discrete domains. Another widely used example is the map colouring problem: In figure 1 we see a small map consisting out of three parts x, y, and z each with the associated value domain {red, green, blue}. To generate solutions for the problem each part of the map has to be coloured in a way that direct neighbours have different colours. Figure 1: Graph colouring problem
4 The resulting constraint problem is represented by the constraint graph in figure 2: The constraint variables are represented as nodes, the edges of the graph are constraints between these variables. Possible solutions for this CSP would be: (1) x = red, y = green, z = blue, (2) x = green, y = blue, z = red, (3) x = blue, y = red, z = green,... etc. If for any reason the domain of a variable is reduced to a smaller number of values, this domain modification can be propagated through the constraint net using the available constraints to determine smaller value domains for the rest of the involved variables. Figure 2: Constraint graph For Example: If the domain of x in figure 2 is restricted to a single value, this value has to be removed from the domains of y and z because of the constraints between the involved variables. If further the domain of y or z is reduced by another value the respective domain is single-valued, too. In another propagation step this domain modification would be propagated to the domain of the remaining variable, so the result of the propagation would be a solution of the original CSP in this case. Constraint propagation is used to reduce the problem size of CSPs and to reach different levels of local consistency with respect to the value domains of the constraint variables. Another aspect is the application during search algorithms looking for solutions of a specific CSP. 3 Approach Dependencies between business processes relate the data flow and the input/output interface of processes. We propose the application of AI methods out of the area of knowledge based configuration [Stu97] to build consistent configurations of business processes. A consistent configuration of a business process is twofold: at modelling time it is a consistent static business process model; at runtime it is the consistent state of a business process instance.
5 We propose how to handle different levels of nested business processes. Flexibility is an important criteria, because different kinds of problem and/or sub-problem dependencies require the flexibility to define different solution strategies and the application of problem specific solving algorithms. 3.1 Ensure Consistent Configurations Using Constraint Satisfaction BP Architecture BP Models Dependencies Constraints Figure 3: Compliance problem as constraints on dependencies between processes To ensure consistent configurations of business processes there is the need of management of dependencies between business processes. To create a consistent business process architecture (containing several BP models with dependencies between them), individual requirements for each process have to be satisfied. Usually a process needs some input data to work on and often this input is the result of one or more preceding processes. The results of a process needed by a subsequent one are commonly saved as attribute values. So dependencies between business processes are represented as relations between arbitrary attributes of individual processes. Examples for dependencies are: 1. sequential dependencies: Relations between processes in a sequential order. These are relations between the input/output values: the output of a preceding process is needed as input of a subsequent process. 2. hierarchical dependencies: One or more processes can be sub-item(s) of a higher-ordered process. Relations between lower and higher-ordered processes. These are relations between the input/output values of the first/last sub-process and the input/output of the higher-ordered process. An open question is how to handle these dependencies and relations. An answer we propose is a technique out of the field of artificial intelligence (AI), namely constraint satisfaction. Constraint satisfaction is widely used for example in the field of knowledge based configuration, in this case to model relations between components and respectively their attributes [Stu97]. Compliance requirements on processes can be represented as complex relations between the processes. The set of compliance requirements this work deals with are the ones that can be represented as constraints on the dependencies between BP models (see figure 3).
6 In business process modelling we can use constraints to model relations between the attributes of processes. This means, for algebraic constraints, simple equations and inequations, so called intensional constraints. 1 Besides, all types of operators are feasible and fully depend on the implementation of the constraint solver used. Constraints may be used: to reduce the possible assignments to variables, which leads to a reduction of problem size, for the (early) detection of inconsistencies in the business process model and the business processes at runtime, to generate solutions for a certain problem. Constraint satisfaction in particular supports the propagation of changes to the attribute values and the associated domains throughout a net of constraints to reach problem reduction. The techniques to restrict the domains to a fewer number of values are available for numerous domains (in general finite domains and infinite domains). So the issue to generate consistent configurations of the involved business processes can be handled for combinatorial and numerical problems. 3.2 Static and Dynamic Use of Constraints The usage of constraint relations for business processes may be a static use at modelling time or dynamic use at runtime. At modelling time a consistent configuration of a business process is a consistent static process model. The constraints connect input/output variables or attributes of the business processes. Constraint satisfaction is used to check for inconsistencies of the static model like in the following example: Two attributes a and b of two different business processes are connected by the constraint c 1: a < b. The process model would be consistent only if for each value in the value domain of variable a there is a valid value in the domain of b so that the constraint is satisfied. Consistent value domains for example would be the following intervals: a = [0..4], b = [5..9]. Obviously this mechanism can be used for user assistance to optimize problem size of the process model. At runtime a consistent configuration of a business process is the consistent state of a business process instance. In this case constraint satisfaction is used to check for inconsistencies during the execution of the business processes. User input, external data and calculation results may lead to a reduced solution space. 1 Which is the implicit definition of a constraint. In contradiction explicit definitions of constraints, e. g. as tables, are called extensional constraints.
7 For example: Given the constraint relation c 2: a b connecting the attributes of two processes. Given further value domains a = [0..9] and b = [0..9], if some input will set b = 5 the value domains can be reduced to a = [5..9] and b = [5]. Further problem reduction may be reached by propagating these changes through the constraint net by constraint propagation. Like in static use this may also show inconsistencies of the current business process configuration. 3.3 Multi-Level Constraint Problem Different levels of a hierarchy in a business process architecture can be seen as different levels in a hierarchy of constraint problems. Each level of the constraint problem represents a level of the business process architecture. Each business process may consist out of a set of sub-processes, which are sub-problems in the constraint hierarchy. The resulting hierarchy of processes and constraint relations leads to a multi-level constraint problem. The goal using a multi-level constraint problem is to handle different levels of nested business processes. For this task flexibility is needed, because different kinds of problem dependencies require the need to define different solution strategies and the application of problem specific solving algorithms: Different layers in the hierarchy could define different sub-problems. For each sub-problem another solution strategy depending on the value domain of the variables (e. g. finite, infinite, symbolic, Boolean) and the problem structure defined by the constraint net can be applied. At the higher-order levels, the integration of local solutions has to be done in order to achieve globally consistent configurations of business processes. 4 Checking a Business Process Against Constraint Rules First, we will outline an example for a sequential dependency. A sequential dependency means a constraint has to be satisfied in order that a process is allowed to be the successor of a preceding process. In figure 4 we see process 1 and process 2 with the attributes a and b. They are connected via a constraint connector which contains the constraint relation and the assignments of the attributes to the constraint variables in so called constraint pins. Process 2 is allowed to be the successor of process 1 only if the constraint relation is satisfied and vice versa: process 1 is allowed to be the predecessor of process 2 only if the constraint relation is satisfied.
8 Figure 4: Example for sequential dependency Our second example is a hierarchical dependency. In figure 5, we have a super-process and two sub-processes and constraint connectors between the processes. 2 The subprocesses are allowed to be sub-items of the super-process only if the constraints hold and vice-versa, the super-process is allowed to be super-item only if the constraints are satisfied. We obtain two levels in a hierarchy of processes and constraint relations, which leads in extension to a multi-level constraint problem. Figure 5: Example for hierarchical dependency Notice that these techniques can be used at business process design- and runtime. 2 Details like attributes and constraint relations are left in figure 5 for simplifying reasons.
9 5 Related Work The paper proposes the application of constraint satisfaction to ensure the consistency in sequential and hierarchical relations of business processes. Related work to this approach therefore may be found in the domain of constraint satisfaction [Dec03]. Existing constraint satisfaction approaches may be employed to achieve the goals outlined in this paper. Hierarchies of constraint problems can be described by the composite CSP whose main application is in the configuration domain [SF96]. Regarding the aspect of flexibility with respect to problem specific solving algorithms an interesting field is the research on the coordination of cooperative constraint solvers [AM98]. Existing approaches combining business process modelling with constraint satisfaction methods do not focus on different levels in problem hierarchies, solving sub-problems and the integration of solving results. In his approach, Edward P. K. Tsang uses open constraint satisfaction, a branch of constraints research for open-world scenarios, for business process modelling [Tsa03]. Another approach is to use temporal constraint networks to model the temporal relations in business process models [LS+06]. Tools with integrated temporal constraint networks already exist such as workflow management systems [RRD03]. Planning algorithms from the field of AI [RN02] would be an alternative to describe the orderings of sequences of business processes. So another way to handle temporal aspects is the combination of the planning paradigm and the constraint satisfaction paradigm [NN+07]. In this case the planning paradigm is adopted to control the sequence of processes. The constraint satisfaction paradigm is used to keep the objects consistent. It should be considered that the CSP paradigm is sufficient if temporal constraints are used. In our case CSP is employed to handle hierarchies and provide more flexibility in expressing consistency requirements. Existing application fields of business process modelling in combination with constraint satisfaction methods are the support of workflow collaboration with constraint solving capabilities [CH+04] and dynamic web service composition [CL+05].
10 6 Conclusion & Outlook In this position paper we have discussed the problem of compliance in the context of business process management. We have motivated the use of CSP as a formal means for modelling and verifying a certain range of compliance problems. Then the types of problems we tackle are discussed, namely dependencies between business processes. We also provide related thoughts on static and dynamic constraint solving, on multi-level constraint solving as well as on problem solving strategies. Although several work in the context of BPM proposed and provided techniques for using CSP as a tool for verifying constraints on business processes, these approaches mostly focus on the use of one specific technique and do not take a generic approach to the problem. This is the goal of this research. Our aim is to empower compliance and BP experts with a framework for modelling and verifying compliance requirements. Based on the observations made in Section 2, we plan to extend the fundamental part of this work by conducting a survey of the different kinds of compliance requirements and BP dependencies for which the use of CSP techniques can prove useful. Additionally to this part of the research, a review of the state of the art of CSP techniques will also be conducted. Based on this output, we will study the adequacy of different CSP techniques for the different BP compliance problems. Another important aspect will be a graphical notation for expressing compliance constraints on business processes, which can then be automatically transformed into CSPs. We plan to start validating this work by tackling the modelling and verification of quality of service based selection of services and resources in compositions of business processes. References [AHW03]Wil M. P. van der Aalst, Arthur H. M. ter Hofstede, Mathias Weske. Business Process Management: A Survey. Wil M. P. van der Aalst, Arthur H. M. ter Hofstede, Mathias Weske, editors, Business Process Management, International Conference, BPM 2003, Eindhoven, The Netherlands, June 26-27, 2003, Proceedings, pages 1 12, LNCS 2678, Springer. [AM98] Farhad Arbab and Eric Monfroy. Coordination of Heterogeneous Distributed Cooperative Constraint Solving. ACM SIGAPP Applied Computing Review, 6(2):4 17, [CH+04] Yun-Heh Chen-Burger, Kit-ying Hui, Alun D. Preece, Peter M. D. Gray, Austin Tate. Supporting Collaboration Through Semantic-Based Workflow and Constraint Solving. In Enrico Motta, Nigel Shadbolt, Arthur Stutt, Nicholas Gibbins, editors, Engineering Knowledge in the Age of the Semantic Web, 14th International Conference, EKAW 2004, Whittlebury Hall, UK, October 5-8, 2004, Proceedings, pages , LNCS 3257, Springer. [CL+05] Nizamuddin Channa, Shanping Li, Abdul Wasim Shaikh, Xiangjun Fu. Constraint Satisfaction in Dynamic Web Service Composition. Asian Journal of Information Technology, 4(10): , [Dec03] Rina Dechter. Constraint Processing. The Morgan Kaufmann Series in Artificial Intelligence. Morgan Kaufmann Publishers, San Francisco, California, USA, 2003.
11 [KS+08] Marwane El Kharbili, Sebastian Stein, Ivan Markovic, Elke Pulvermueller. Towards a Framework for Semantic Business Process Compliance Management. In Shazia Sadiq, Marta Indulska, Michael zur Muehlen, editors, Proceedings of the Workshop on Governance, Risk and Compliance for Information Systems (GRCIS 2008), pages 1 15, CEUR Workshop Proceedings Vol-339, Montpellier, France, June [Kum92] Vipin Kumar. Algorithms for Constraint Satisfaction Problems: A Survey. AI Magazine. 13(1): [LS+06] Ruopeng Lu, Shazia Sadiq, Vineet Padmanabhan, Guido Governatori. Using a Temporal Constraint Network for Business Process Execution. In Gillian Dobbie and James Bailey, editors, Proceedings of the 17th Australasian Database Conference - Volume 49 (Hobart, Australia, January 16-19, 2006), pages , ACM International Conference Proceeding Series, vol. 170, Darlinghurst, Australia, Australian Computer Society. [NN+07] Haruhisa Nozue, Hajime Nakajima, Haruo Oishi, Takeshi Masuda, Tetsuya Yamamura. Process Control Technique Using Planning and Constraint Satisfaction. In Shingo Ata and Choong Seon Hong, editors, Managing Next Generation Networks and Services, 10th Asia-Pacific Network Operations and Management Symposium, APNOMS 2007, Sapporo, Japan, October 10-12, 2007, Proceedings, pages 62 71, LNCS 4773, Springer. [RN02] Stuart J. Russel and Peter Norvig. Artificial Intelligence: A Modern Approach (The Intelligent Agent Book). Prentice Hall, Upper Saddle River, New Jersey, USA, [RRD03] Manfred Reichert, Stefanie Rinderle, Peter Dadam. ADEPT Workflow Management System. In Wil M. P. van der Aalst, Arthur H. M. ter Hofstede, Mathias Weske, editors, Business Process Management, International Conference, BPM 2003, Eindhoven, The Netherlands, June 26-27, 2003, Proceedings, pages , LNCS 2678, Springer. [Run09] Wolfgang Runte. Modelling and Solving Configuration Problems on Business Processes Using a Multi-Level Constraint Satisfaction Approach. In Witold Abramowicz, Leszek A. Maciaszek, Ryszard Kowalczyk, Andreas Speck, editors, Business Process, Services Computing and Intelligent Service Management, Leipzig, Germany, March 23-25, 2009, pages , LNI 147, Bonn, Germany, GI. [Sch00] August-Wilhelm Scheer. ARIS - Business Process Modeling. Springer, [SF96] Daniel Sabin and Eugene C. Freuder. Configuration as Composite Constraint Satisfaction. In Boi V. Faltings and Eugene C. Freuder, editors, Configuration Papers from the AAAI Fall Symposium, pages 28 36, Menlo Park, California, USA, AAAI Press. [Stu97] Markus Stumptner. An Overview of Knowledge-Based Configuration. AI [Tsa03] Communications (AICOM), 10(2): , July Edward P. K. Tsang. Constraint Satisfaction in Business Process Modelling. The Journal Of Management and Economics, 7(7), November 2003.
Smart Graphics: Methoden 3 Suche, Constraints
Smart Graphics: Methoden 3 Suche, Constraints Vorlesung Smart Graphics LMU München Medieninformatik Butz/Boring Smart Graphics SS2007 Methoden: Suche 2 Folie 1 Themen heute Suchverfahren Hillclimbing Simulated
Modelling and Verification of Business Processes
Modelling and Verification of Business Processes Costin Bădică Department of Computer Science King s College London, WC2R 2LS, UK [email protected] Chris Fox Department of Computer Science University
On the Modeling and Verification of Security-Aware and Process-Aware Information Systems
On the Modeling and Verification of Security-Aware and Process-Aware Information Systems 29 August 2011 What are workflows to us? Plans or schedules that map users or resources to tasks Such mappings may
Structural Detection of Deadlocks in Business Process Models
Structural Detection of Deadlocks in Business Process Models Ahmed Awad and Frank Puhlmann Business Process Technology Group Hasso Plattner Institut University of Potsdam, Germany (ahmed.awad,frank.puhlmann)@hpi.uni-potsdam.de
Semantic Analysis of Flow Patterns in Business Process Modeling
Semantic Analysis of Flow Patterns in Business Process Modeling Pnina Soffer 1, Yair Wand 2, and Maya Kaner 3 1 University of Haifa, Carmel Mountain 31905, Haifa 31905, Israel 2 Sauder School of Business,
Business Process Management: A personal view
Business Process Management: A personal view W.M.P. van der Aalst Department of Technology Management Eindhoven University of Technology, The Netherlands [email protected] 1 Introduction Business
REQUIREMENTS FOR THE WORKFLOW-BASED SUPPORT OF RELEASE MANAGEMENT PROCESSES IN THE AUTOMOTIVE SECTOR
REQUIREMENTS FOR THE WORKFLOW-BASED SUPPORT OF RELEASE MANAGEMENT PROCESSES IN THE AUTOMOTIVE SECTOR Ulrich Bestfleisch, Joachim Herbst DaimlerChrysler AG Research and Technology Data and Process Management
Supporting the BPM lifecycle with FileNet
Supporting the BPM lifecycle with FileNet Mariska Netjes Hajo A. Reijers Wil. M.P. van der Aalst Outline Introduction Evaluation approach Evaluation of FileNet Conclusions Business Process Management Supporting
Ant Colony Optimization and Constraint Programming
Ant Colony Optimization and Constraint Programming Christine Solnon Series Editor Narendra Jussien WILEY Table of Contents Foreword Acknowledgements xi xiii Chapter 1. Introduction 1 1.1. Overview of the
Diagramming Techniques:
1 Diagramming Techniques: FC,UML,PERT,CPM,EPC,STAFFWARE,... Eindhoven University of Technology Faculty of Technology Management Department of Information and Technology P.O. Box 513 5600 MB Eindhoven The
Disjunction of Non-Binary and Numeric Constraint Satisfaction Problems
Disjunction of Non-Binary and Numeric Constraint Satisfaction Problems Miguel A. Salido, Federico Barber Departamento de Sistemas Informáticos y Computación, Universidad Politécnica de Valencia Camino
EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES. Nataliya Golyan, Vera Golyan, Olga Kalynychenko
380 International Journal Information Theories and Applications, Vol. 18, Number 4, 2011 EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES Nataliya Golyan, Vera Golyan, Olga Kalynychenko
A Meta-model of Business Interaction for Assisting Intelligent Workflow Systems
A Meta-model of Business Interaction for Assisting Intelligent Workflow Systems Areti Manataki and Yun-Heh Chen-Burger Centre for Intelligent Systems and their Applications, School of Informatics, The
A business process metamodel for Enterprise Information Systems automatic generation
A business process metamodel for Enterprise Information Systems automatic generation Luiz Fernando Batista Loja 1, Valdemar Vicente Graciano Neto 1, Sofia Larissa da Costa 1, Juliano Lopes de Oliveira
BPMN PATTERNS USED IN MANAGEMENT INFORMATION SYSTEMS
BPMN PATTERNS USED IN MANAGEMENT INFORMATION SYSTEMS Gabriel Cozgarea 1 Adrian Cozgarea 2 ABSTRACT: Business Process Modeling Notation (BPMN) is a graphical standard in which controls and activities can
Process Modeling Notations and Workflow Patterns
Process Modeling Notations and Workflow Patterns Stephen A. White, IBM Corp., United States ABSTRACT The research work of Wil van der Aalst, Arthur ter Hofstede, Bartek Kiepuszewski, and Alistair Barros
Title: Basic Concepts and Technologies for Business Process Management
Title: Basic Concepts and Technologies for Business Process Management Presenter: prof.dr. Manfred Reichert The economic success of an enterprise more and more depends on its ability to flexibly and quickly
COMPUTER AUTOMATION OF BUSINESS PROCESSES T. Stoilov, K. Stoilova
COMPUTER AUTOMATION OF BUSINESS PROCESSES T. Stoilov, K. Stoilova Computer automation of business processes: The paper presents the Workflow management system as an established technology for automation
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets Fabian Grüning Carl von Ossietzky Universität Oldenburg, Germany, [email protected] Abstract: Independent
Business Process Modeling
Business Process Concepts Process Mining Kelly Rosa Braghetto Instituto de Matemática e Estatística Universidade de São Paulo [email protected] January 30, 2009 1 / 41 Business Process Concepts Process
BIS 3106: Business Process Management. Lecture Two: Modelling the Control-flow Perspective
BIS 3106: Business Process Management Lecture Two: Modelling the Control-flow Perspective Makerere University School of Computing and Informatics Technology Department of Computer Science SEM I 2015/2016
Computer Support for Agile Human-to-Human Interactions with Social Protocols
Computer Support for Agile Human-to-Human Interactions with Social Protocols Willy Picard Poznań University of Economics, Department of Information Technologies, ul. Mansfelda 4, Poznań, Poland [email protected],
Formal Engineering for Industrial Software Development
Shaoying Liu Formal Engineering for Industrial Software Development Using the SOFL Method With 90 Figures and 30 Tables Springer Contents Introduction 1 1.1 Software Life Cycle... 2 1.2 The Problem 4 1.3
Modeling Guidelines Manual
Modeling Guidelines Manual [Insert company name here] July 2014 Author: John Doe [email protected] Page 1 of 22 Table of Contents 1. Introduction... 3 2. Business Process Management (BPM)... 4 2.1.
A CSPm Model for the Procure to Pay Case Study
A CSPm Model for the Procure to Pay Case Study Andreas V. Hense Bonn-Rhein-Sieg University oas, Grantham-Allee 20, 53757 Sankt Augustin, Germany, [email protected] Abstract. The model presented here
Deploying Artificial Intelligence Techniques In Software Engineering
Deploying Artificial Intelligence Techniques In Software Engineering Jonathan Onowakpo Goddey Ebbah Department of Computer Science University of Ibadan Ibadan, Nigeria Received March 8, 2002 Accepted March
2 AIMS: an Agent-based Intelligent Tool for Informational Support
Aroyo, L. & Dicheva, D. (2000). Domain and user knowledge in a web-based courseware engineering course, knowledge-based software engineering. In T. Hruska, M. Hashimoto (Eds.) Joint Conference knowledge-based
Enabling Process Support for Advanced Applications with the AristaFlow BPM Suite
Enabling Process Support for Advanced Applications with the AristaFlow BPM Suite Andreas Lanz 1, Ulrich Kreher 2, Manfred Reichert 1, and Peter Dadam 1 1 Institute of Databases and Information Systems,
WoPeD - An Educational Tool for Workflow Nets
WoPeD - An Educational Tool for Workflow Nets Thomas Freytag, Cooperative State University (DHBW) Karlsruhe, Germany [email protected] Martin Sänger, 1&1 Internet AG, Karlsruhe, Germany [email protected]
Verifying Semantic of System Composition for an Aspect-Oriented Approach
2012 International Conference on System Engineering and Modeling (ICSEM 2012) IPCSIT vol. 34 (2012) (2012) IACSIT Press, Singapore Verifying Semantic of System Composition for an Aspect-Oriented Approach
Software Engineering Reference Framework
Software Engineering Reference Framework Michel Chaudron, Jan Friso Groote, Kees van Hee, Kees Hemerik, Lou Somers, Tom Verhoeff. Department of Mathematics and Computer Science Eindhoven University of
Workflow Management Models and ConDec
A Declarative Approach for Flexible Business Processes Management M. Pesic and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology, P.O.Box 513, NL-5600 MB, Eindhoven,
Activity Mining for Discovering Software Process Models
Activity Mining for Discovering Software Process Models Ekkart Kindler, Vladimir Rubin, Wilhelm Schäfer Software Engineering Group, University of Paderborn, Germany [kindler, vroubine, wilhelm]@uni-paderborn.de
CPN Tools 4: A Process Modeling Tool Combining Declarative and Imperative Paradigms
CPN Tools 4: A Process Modeling Tool Combining Declarative and Imperative Paradigms Michael Westergaard 1,2 and Tijs Slaats 3,4 1 Department of Mathematics and Computer Science, Eindhoven University of
Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts
Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts Marian Benner, Matthias Book, Tobias Brückmann, Volker Gruhn, Thomas Richter, Sema Seyhan paluno The Ruhr Institute
Why? A central concept in Computer Science. Algorithms are ubiquitous.
Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online
Compliance and Requirement Traceability for SysML v.1.0a
1. Introduction: Compliance and Traceability for SysML v.1.0a This document provides a formal statement of compliance and associated requirement traceability for the SysML v. 1.0 alpha specification, which
Modeling Workflow Patterns
Modeling Workflow Patterns Bizagi Suite Workflow Patterns 1 Table of Contents Modeling workflow patterns... 4 Implementing the patterns... 4 Basic control flow patterns... 4 WCP 1- Sequence... 4 WCP 2-
Modeling BPMN Diagrams within XTT2 Framework. A Critical Analysis**
AUTOMATYKA 2011 Tom 15 Zeszyt 2 Antoni Ligêza*, Tomasz Maœlanka*, Krzysztof Kluza*, Grzegorz Jacek Nalepa* Modeling BPMN Diagrams within XTT2 Framework. A Critical Analysis** 1. Introduction Design, analysis
Global Multiprocessor Real-Time Scheduling as a Constraint Satisfaction Problem
Global Multiprocessor Real-Time Scheduling as a Constraint Satisfaction Problem Liliana Cucu-Grosean & Olivier Buffet INRIA Nancy Grand-Est 615 rue du Jardin Botanique 54600 Villers-lès-Nancy, France [email protected]
Process Modelling from Insurance Event Log
Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R
How To Develop Software
Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which
Integrating Benders decomposition within Constraint Programming
Integrating Benders decomposition within Constraint Programming Hadrien Cambazard, Narendra Jussien email: {hcambaza,jussien}@emn.fr École des Mines de Nantes, LINA CNRS FRE 2729 4 rue Alfred Kastler BP
Improving Knowledge-Based System Performance by Reordering Rule Sequences
Improving Knowledge-Based System Performance by Reordering Rule Sequences Neli P. Zlatareva Department of Computer Science Central Connecticut State University 1615 Stanley Street New Britain, CT 06050
A terminology model approach for defining and managing statistical metadata
A terminology model approach for defining and managing statistical metadata Comments to : R. Karge (49) 30-6576 2791 mail [email protected] Content 1 Introduction... 4 2 Knowledge presentation...
Reliability Guarantees in Automata Based Scheduling for Embedded Control Software
1 Reliability Guarantees in Automata Based Scheduling for Embedded Control Software Santhosh Prabhu, Aritra Hazra, Pallab Dasgupta Department of CSE, IIT Kharagpur West Bengal, India - 721302. Email: {santhosh.prabhu,
The Basics of Graphical Models
The Basics of Graphical Models David M. Blei Columbia University October 3, 2015 Introduction These notes follow Chapter 2 of An Introduction to Probabilistic Graphical Models by Michael Jordan. Many figures
fakultät für informatik informatik 12 technische universität dortmund Data flow models Peter Marwedel Informatik 12 TU Dortmund Germany
12 Data flow models Peter Marwedel Informatik 12 TU Dortmund Germany Models of computation considered in this course Communication/ local computations Communicating finite state machines Data flow model
The Problem of Scheduling Technicians and Interventions in a Telecommunications Company
The Problem of Scheduling Technicians and Interventions in a Telecommunications Company Sérgio Garcia Panzo Dongala November 2008 Abstract In 2007 the challenge organized by the French Society of Operational
Representing and Solving Rule-Based Decision Models with Constraint Solvers
Representing and Solving Rule-Based Decision Models with Constraint Solvers Jacob Feldman OpenRules, Inc., 75 Chatsworth Ct., Edison, NJ 08820, USA [email protected] Abstract. This paper describes
Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models?
Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models? Ludmila Penicina Institute of Applied Computer Systems, Riga Technical University, 1 Kalku, Riga, LV-1658,
Feature. Applications of Business Process Analytics and Mining for Internal Control. World
Feature Filip Caron is a doctoral researcher in the Department of Decision Sciences and Information Management, Information Systems Group, at the Katholieke Universiteit Leuven (Flanders, Belgium). Jan
Interaction Choreography Models in BPEL: Choreographies on the Enterprise Service Bus
S BPM ONE 2010 the Subjectoriented BPM Conference http://www.aifb.kit.edu/web/s bpm one/2010 Interaction Choreography Models in BPEL: Choreographies on the Enterprise Service Bus Oliver Kopp, Lasse Engler,
EFFICIENT KNOWLEDGE BASE MANAGEMENT IN DCSP
EFFICIENT KNOWLEDGE BASE MANAGEMENT IN DCSP Hong Jiang Mathematics & Computer Science Department, Benedict College, USA [email protected] ABSTRACT DCSP (Distributed Constraint Satisfaction Problem) has
A Learning Based Method for Super-Resolution of Low Resolution Images
A Learning Based Method for Super-Resolution of Low Resolution Images Emre Ugur June 1, 2004 [email protected] Abstract The main objective of this project is the study of a learning based method
THE SIMULATION OF SOFTWARE PROCESSES IN THE INTEGRATED COMPUTER ENVIRONMENT IN THE CASE OF TELCO SECTOR
THE SIMULATION OF SOFTWARE PROCESSES IN THE INTEGRATED COMPUTER ENVIRONMENT IN THE CASE OF TELCO SECTOR Jerzy Roszkowski, Andrzej Kobylinski 2 Management Systems Consulting, Poznanska 28/, 93-34 Lodz,
Test Coverage Criteria for Autonomous Mobile Systems based on Coloured Petri Nets
9th Symposium on Formal Methods for Automation and Safety in Railway and Automotive Systems Institut für Verkehrssicherheit und Automatisierungstechnik, TU Braunschweig, 2012 FORMS/FORMAT 2012 (http://www.forms-format.de)
Business Independent Model of Mobile Workforce Management
Business Independent Model of Mobile Workforce Management Volker Gruhn and Thomas Richter Chair of Applied Telematics / e-business, University of Leipzig Klostergasse 3, 04109 Leipzig, Germany {gruhn,richter}@ebus.informatik.uni-leipzig.de
Data Validation with OWL Integrity Constraints
Data Validation with OWL Integrity Constraints (Extended Abstract) Evren Sirin Clark & Parsia, LLC, Washington, DC, USA [email protected] Abstract. Data validation is an important part of data integration
SysML Modelling Language explained
Date: 7 th October 2010 Author: Guillaume FINANCE, Objet Direct Analyst & Consultant UML, the standard modelling language used in the field of software engineering, has been tailored to define a modelling
08 BPMN/1. Software Technology 2. MSc in Communication Sciences 2009-10 Program in Technologies for Human Communication Davide Eynard
MSc in Communication Sciences 2009-10 Program in Technologies for Human Communication Davide Eynard Software Technology 2 08 BPMN/1 2 ntro Sequence of (three?) lessons on BPMN and technologies related
Demonstration of an Automated Integrated Test Environment for Web-based Applications
Demonstration of an Automated Integrated Test Environment for Web-based Applications Tiziana Margaria 1,2, Oliver Niese 2, and Bernhard Steffen 2 1 METAFrame Technologies GmbH, Dortmund, Germany [email protected]
A Comparison of BPMN and UML 2.0 Activity Diagrams
A Comparison of BPMN and UML 2.0 Activity Diagrams Daniela C. C. Peixoto 1, Vitor A. Batista 1, Ana P. Atayde 1, Eduardo P. Borges 1, Rodolfo F. Resende 2, Clarindo Isaías P. S. Pádua 1. 1 Synergia Universidade
Parametric Attack Graph Construction and Analysis
Parametric Attack Graph Construction and Analysis Leanid Krautsevich Department of Computer Science, University of Pisa Largo Bruno Pontecorvo 3, Pisa 56127, Italy Istituto di Informatica e Telematica,
Extending Semantic Resolution via Automated Model Building: applications
Extending Semantic Resolution via Automated Model Building: applications Ricardo Caferra Nicolas Peltier LIFIA-IMAG L1F1A-IMAG 46, Avenue Felix Viallet 46, Avenue Felix Viallei 38031 Grenoble Cedex FRANCE
A Study on Data Analysis Process Management System in MapReduce using BPM
A Study on Data Analysis Process Management System in MapReduce using BPM Yoon-Sik Yoo 1, Jaehak Yu 1, Hyo-Chan Bang 1, Cheong Hee Park 1 Electronics and Telecommunications Research Institute, 138 Gajeongno,
Analysing, Modelling, and Improving Workflow Application Development Processes
Analysing, Modelling, and Improving Workflow Application Development Processes Mathias Weske ½, Thomas Goesmann ¾, Roland Holten,Rüdiger Striemer ½ Eindhoven University of Technology, The Netherlands ¾
A METHOD FOR REWRITING LEGACY SYSTEMS USING BUSINESS PROCESS MANAGEMENT TECHNOLOGY
A METHOD FOR REWRITING LEGACY SYSTEMS USING BUSINESS PROCESS MANAGEMENT TECHNOLOGY Gleison Samuel do Nascimento, Cirano Iochpe Institute of Informatics, Federal University of Rio Grande do Sul, Porto Alegre,
A Tool for Generating Partition Schedules of Multiprocessor Systems
A Tool for Generating Partition Schedules of Multiprocessor Systems Hans-Joachim Goltz and Norbert Pieth Fraunhofer FIRST, Berlin, Germany {hans-joachim.goltz,nobert.pieth}@first.fraunhofer.de Abstract.
Clustering and scheduling maintenance tasks over time
Clustering and scheduling maintenance tasks over time Per Kreuger 2008-04-29 SICS Technical Report T2008:09 Abstract We report results on a maintenance scheduling problem. The problem consists of allocating
npsolver A SAT Based Solver for Optimization Problems
npsolver A SAT Based Solver for Optimization Problems Norbert Manthey and Peter Steinke Knowledge Representation and Reasoning Group Technische Universität Dresden, 01062 Dresden, Germany [email protected]
Optimised Realistic Test Input Generation
Optimised Realistic Test Input Generation Mustafa Bozkurt and Mark Harman {m.bozkurt,m.harman}@cs.ucl.ac.uk CREST Centre, Department of Computer Science, University College London. Malet Place, London
1 Business Modeling. 1.1 Event-driven Process Chain (EPC) Seite 2
Business Process Modeling with EPC and UML Transformation or Integration? Dr. Markus Nüttgens, Dipl.-Inform. Thomas Feld, Dipl.-Kfm. Volker Zimmermann Institut für Wirtschaftsinformatik (IWi), Universität
Modelling Workflow with Petri Nets. CA4 BPM PetriNets
Modelling Workflow with Petri Nets 1 Workflow Management Issues Georgakopoulos,Hornick, Sheth Process Workflow specification Workflow Implementation =workflow application Business Process Modelling/ Reengineering
Chapter 14 Managing Operational Risks with Bayesian Networks
Chapter 14 Managing Operational Risks with Bayesian Networks Carol Alexander This chapter introduces Bayesian belief and decision networks as quantitative management tools for operational risks. Bayesian
Dotted Chart and Control-Flow Analysis for a Loan Application Process
Dotted Chart and Control-Flow Analysis for a Loan Application Process Thomas Molka 1,2, Wasif Gilani 1 and Xiao-Jun Zeng 2 Business Intelligence Practice, SAP Research, Belfast, UK The University of Manchester,
