A Workflow Formation Architecture for the Automotive Sector

Size: px
Start display at page:

Download "A Workflow Formation Architecture for the Automotive Sector"

Transcription

1 A Formation Architecture for the Automotive Sector Sven Till Rik Eshuis Paul Grefen Eindhoven University of Technology, Department of Technology Management Postbox 513, 5600 MB Eindhoven, The Netherlands Abstract Companies in the automotive sector have been forced to react on trends, such as an increasing globalization and decreased numbers of cars per type. This resulted in new forms of cooperations, called Networks of Automotive Excellence (NoAE). Interoperability between the parties within such networks is crucial. For parties to operate effectively together, they have to align their local workflows. This can be done by forming a global workflow which coordinates the local workflows. To overcome the current manual timeconsuming, expensive and error prone formation, we propose a functional architecture for automated workflow construction and evaluation. This architecture enables not only a fast and cheap formation of global workflows but also their evaluation. An example illustrates the architecture. 1. Introduction The main trend in the automotive sector is that the overall number of cars and car types produced is increasing, while at the same time the lifecycle of a car type is shortening [8]. To cope with this trend, OEMs are outsourcing more and more parts of their production towards their suppliers. Figures show that the suppliers have taken over more and more activities and responsibilities from the OEMs in each phase of the lifecycle of a car, including the design and development phases [12]. At the same time, OEMs also tend to reduce the number of their suppliers in order to diminish the organizational burden. This means, OEMs do not outsource small components or standardized parts, but whole systems or large modules to their suppliers (tier 1 suppliers). In addition, these suppliers themselves can outsource part of their production to suppliers at lower tiers (see Figure 2 in [8]) Suppliers are usually small- and medium-sized enterprises (SMEs), which are not able to deliver big modules or even complete systems as expected from the OEMs. However, SMEs can form networks on a project or order base. The objective of such Networks of Automotive Excellence (NoAE) [3] is the organization of temporal cooperations between suppliers in the areas of development and manufacturing. NoAEs can develop and deliver components of a car that are larger than the ones a single supplier can provide. In such an automotive network, the expertise, competencies, and capacities of the suppliers are combined and coordinated. The formation of such a network is rather complex and triggers a lot of technical and business related issues. One main issue is the integration of all the business processes of the involved partners. This requires an alignment of the business processes and their corresponding workflows which are executed locally on the suppliers side. This alignment is done by forming a global, i.e. crossorganisational workflow, that connects all local workflows of the collaborating suppliers. According to the studies done within the European CrossWork project [7], so far, the formation is mainly done manually in workshops. This manual formation can be lengthy, and therefore rather costly. Moreover, the formed workflow which is described on paper can still contain errors, e.g. dead- or live-locks. Such errors are typically discovered during enactment of the global workflow. Repairing the workflow might be costly at that stage. In this paper, we propose a workflow formation architecture that can be used to (semi-)automate the formation of global NoAE workflows. This way, formation can be done in a cheap and fast way. Moreover, important requirements like absence of deadlock can be checked before the workflow is actually deployed. Related work. Many initiatives from industry and the research community have dealt with workflow formation issues. New technologies such as Web Services, new software engineering paradigms such as Service Oriented Architecture, and new languages such as the Business Process Execution Language - BPEL [4] and the exchangeable Routing Language-XRL [17] have been developed in order to support the IT cooperations of organizations. Some projects have focussed on the special issues of workflow

2 formation and service composition, such as CrossFlow [10], Ambroszkiewicz [1], DySCo [13] and eflow [5]. In some research projects, such as [1, 13, 5], services provided by companies are only considered as black boxes and their internal workflow structures, like internal tasks and their ordering, are ignored. Though the internal structure of a service is usually considered private by a company, when collaborating with other companies, it might be fruitful to disclose parts of this internal structure as a white box service [11, 6]. For example, by offering a white box service, consumers could receive some results already when they are produced, while consumers of a black box service have to wait for the entire internal workflow to finish before getting all results. Clearly, global workflows consisting of white box services are much faster and more controllable than those consisting of black-box services only. Other projects, for example CrossFlow [10], do consider white box services, but they assume that the service consumer can dictate the service provider the workflow structure it has to offer, i.e., the internal workflow structure of the provider has to adhere to the structure dictated by the service consumer. Advantage of this approach is that the process integration between parties becomes less complex and plannable in advance. However, the disadvantage is that the service provider might be forced to change its own workflow in order to comply to the workflow dictated by the service consumer. But such a forced change could be unacceptable for the provider, because it then has to change its internal process, while this optimised process is the main reason why the provider can do the job faster and cheaper than the service consumer in the first place. To summarize, the research up to now either neglected the internal structure of the workflow or it demanded a certain structure. Furthermore, a generic architecture for workflow formation has not been proposed. In this paper, we propose a generic functional architecture which first, supports the automation of workflow formation, including considering the internal structure of local workflows, and second, meets the requirements in the automotive sector. Structure. First, we give the context of workflow formation in form of a phase model. Then the workflow formation architecture is described and explained. In section 4 we give an illustrative example to show that the architecture works. We end with conclusions. 2. Phase Model Figure 1 shows a workflow formation cycle. The cycle consists of three phases. In the first phase, the requirements and constraints for the workflow formation are defined. The requirements contain the description of the workflow model elements which should be arranged and the con- Requirement Definition Formation Enactment Figure 1. Formation Cycle straints which restrict either single formation elements or the global workflow which is to build. The defined requirements are then used as input for the second phase - the workflow formation phase. In this phase, a new global workflow is formed, e.g. through orchestration or choreography. It is possible that the workflow formation is not achievable because of too restrictive requirements or missing information. Then this information is fed back to the first phase and the requirements have to be redefined. If the workflow formation is successful then the newly built global workflow is forwarded to the workflow enactment phase. The enactment is supported by information systems, such as workflow engines. The engines are configured based on the workflow specification. Is this not possible, e.g. because of missing functionality, then the workflow formation has to be executed again. During the enactment it can happen that the requirements or the environment, e.g. network members are replaced, change so much that the enactment cannot continue. Then, either in the case of small, repairable changes the formation phase is started again or in the case of fundamental changes the requirements definition phase has to start off. Necessary changes in the global workflow specification may not only be detected by exceptions but also through using process mining techniques [15] on data that are logged during the enactment. This workflow formation cycle model illustrates the context of the proposed workflow formation architecture. The architecture proposed in this paper supports the workflow formation phase and its interfaces towards the requirement definition and the workflow enactment phases. The next section shows details of the architecture and a refinement of the formation phase. 3. Formation Architecture Having set the context by explaining the workflow formation cycle, in this section, we explain our workflow formation architecture including two workflow formation subphases by giving first an overview and then describing each sub-phase in more detail in separate subsections Overview As mentioned earlier, any disturbance in the fragile development or production process has to be avoided. Otherwise, it comes to costly delays. This observation leads to

3 Requirement Definition Local requirements Formation requirements Global requirements Construction Creation/ Rewrite Construction Strategy Formation Pattern Repository Plug-in Evaluat. Evaluation Strategy Evaluation Plug-in Evaluat. Enactment Analysis Document Global Figure 2. Formation Architecture the formation is unsuccessful then the workflow formation process goes back to the requirement definition. A successful formation results in a specification of the global workflow. However, before the workflow can be enacted it has to be verified and analyzed. The evaluation phase contains validation, verification and performance analysis steps. Examples are evaluating, whether the workflow can really lead to the demanded goal (e.g. by simulation), verifying the fulfillments of the global and local requirements, and calculating performance indicators, such as expected minimum duration time. It is also possible to analyse requirements which could not be considered during the workflow construction. For example, it might be, that time-related requirements can not be taken into account during the construction, because there are no for this aspect available. However, in the evaluation phase it is still possible to analyze time-related performance indicators, e.g. to identify the critical path within a workflow. Based on the evaluation results, the evaluation module decides whether the formed workflow is sufficient or not. an important requirement on our workflow formation. Any workflow which is intended to be enacted has to fulfill basic properties, such as deadlock freeness and other characteristics demanded by the involved parties. In order to meet such a requirement it is necessary to validate and to verify any workflow before it is enacted. To ensure this, we separate the workflow formation phase in two sub-phases: (1) the workflow construction sub-phase and (2) the workflow evaluation sub-phase. Based on this separation and by using a pipe and filter pattern we have developed an architecture supporting the overall workflow formation phase. The architecture is depicted in Figure 2. In addition to the two sub-phases, this figure shows the input and output elements representing the information which is exchanged between the workflow formation phase and the two adjacent phases within the workflow formation cycle shown in Figure 1. The workflow construction sub-phase takes the requirements defined in the requirement definition phase as input. The set of requirements contains local, global and formation requirements. Local requirements are concerned with all aspects of the local workflows of the involved suppliers. In contrast to this, the global requirements refer to demanded characteristics related to the global workflow newly to build. Formation requirements address demands on the formation process itself, such as being fast and that the evaluation does not need to be exhaustive. The workflow formation is based on a workflow construction module and databases, such as a set of creation and rewriting and a pattern repository. The formation itself is influenced and controlled by strategy stored in a rule- or database. If If the workflow is insufficient, then the evaluation results are fed back to the workflow formation module which in turn is started again. The feeding back is depicted in Figure 2 as a dashed line going from the workflow evaluation component to the workflow construction component. Furthermore, through this feed back technique it is possible to support generate-andtest methods within the workflow formation phase. If the workflow is satisfactory, then the formation process is stopped, and the newly formed, global workflow and the analysis results are issued towards an enactment module. The analysis results can help the enactment module to schedule the tasks, to recognize unwanted situation and to avoid exceptions. For example, based on the critical path analysis results, an enactment module knows which tasks should not be delayed at all. And it can take this knowledge into account by the resource allocation or by the decision what to monitor explicitly. Further details for each of the sub-phases are described in the next sub-sections Construction Phase As mentioned above, in the requirement section we consider local and global constraints. Local requirements capture all aspects which are only related to one specific local workflow. The set of local constraints contains, for example, the input and output parameters of tasks, the partial order of or the control-flow between these tasks within one specific local workflow, or

4 the time duration of the local workflow. These local constraints can be expressed (at least partially) in languages such as XRL [17] with its extensions or BPEL [4]. Examples for such local constraints are: (1) a task A needs as input a data item XY provided by another party or (2) the two local task A and B can run in parallel. In contrast to the local requirements, the set of global requirements put universal constraints on the global workflow which connects all the local workflows. In addition, aspects such as monitoring and controlling can be covered in this set of constraints. The constraints are specified in business and stored in an instance file of a XML-based language, e.g. the E-contracting Markup language (ECML) [2] or the Rule Markup Language (RuleML) [14]. Examples for global requirements could be that the global workflow is deadlock free and its maximum duration is 10 days. The workflow construction sub-phase consists of a construction module, a storage containing strategy, and data components containing creation and re-writing and patterns. The construction module is a general engine which uses the and the patterns. One formation rule could state: if a data item x is a output parameter of a task A and the input parameter of a task B then add an A before B -link. Rewriting become very important in cases where the subsequent evaluation module finds a conflict. In such cases, the construction engine applies rewriting in order to resolve the conflict or to optimize the workflow without starting from scratch. The formation engine can be steered by strategy. For example, with this mean a user can decide how many solutions are generated, and whether the targeted structure is flat or a hierarchy. What features are supported by the engine depends on the available. The term features refers here to aspects which can be included in the workflow construction by the engine. Some features can be seen as views or perspective on the global workflow, such as the construction of the control-flow or the data-flow. Other features make sure that requirements such as temporal constraints (e.g. maximum duration < 10 days), are already considered during the construction. The availability of a feature data flow implies, that there are in the rule base which describe how to construct, at least partially, a workflow based on data requirements. The types of requirements differ from case to case. And overtime new types of requirements are captured in the requirement definition phase. The workflow formation architecture has to cope with these changes. It has to be flexible enough to take new types of requirements into account during the construction without a lot of programming effort. The separation of a general engine and a rule base leads to such a flexibility and extensibility. New global or local requirements can force a change in or an extension of the formation method. This can be done by introducing new features by storing new into the rule base, so that the new requirements can be taken into account and fulfilled. This means three things, first, the intelligence lies in the and not in the engine, second, there is a direct relation between the types of requirements and the rule base, and third, the rule base is feature-dependent. At the end of the construction phase, the newly formed global workflow specified in a workflow language is forwarded to the workflow evaluation phase, more precisely to the workflow evaluation module Evaluation Phase The workflow evaluation module takes as input the global workflow specification and all defined requirements, and generates an analysis document. The actual analysis is done within plug-ins which are coordinated by the the evaluation module. The plug-ins can contain very different kinds of algorithms for analyzing workflows. They can perform static analysis such as done in Woflan [16] or dynamic analysis such as used in simulation approaches (e.g. in ExSpect-Simulation software [9]). Each plug-in has access to its own dedicated sets of data and. However, it is also possible that some plug-ins share their data and. Which plug-ins are executed depends on the requirements and on the strategy stored in a dedicated rule base. Based on the requirements it might be sufficient just to check the soundness of the workflow and that other local control-flow constraints are still hold. However, via the strategy a user can determine and influence the execution of the plug-ins and the termination of the evaluation. For example, a user may restrict the available time for the evaluation process. In that case the strategy would be to prefer static analysis approaches over dynamic ones, because the later ones take, in general, more time. Based on the defined requirements and the results returned by the plug-ins, the evaluation module decides whether a global workflow is accepted or declined. If the workflow is declined then information about conflicts, sub-optimalities and missed requirements are reported to the workflow formation module. If all requirements are satisfied, then an evaluation document and a complete specification of the global workflow are issued and forwarded to the enactment phase User Interaction In the ideal case, user interaction is not necessary in the workflow formation phase. The goal is to automate the formation as much as possible in order to be fast and to avoid errors. In the proposed architecture, a user can only influ-

5 do; cd Supplier SP1 CO DevG OrdB Supplier SP2 dobox box CBO DevB ProB control-flow xy data-flow cdbox cdbox ProG dobox box AssB cd = CAD drawings; do = development order, Figure 3. Example - Local Requirements ence the formation and evaluation ex-ante, via specifying the strategy and the requirements. However, an user interface could help, for example, in cases of missing data which can prevent a successful construction. In such cases, the system could interact with the user and try to generate a workflow eventually, instead of terminating the formation phase and going back to the requirement definition phase. Since the interaction with users can be quite complex, the issue should be considered separately and carefully designed. For the sake of space, user interfaces are not considered in this paper. 4. Example In this section, we show an example of how the proposed architecture can be used. The example describes the development of a gear box by suppliers on the request of an OEM. The supplier SP1 takes the order, but it is not able to develop the gear box by its own. SP1 develops only the gearing and outsources the development of the surrounding box for the gearing to a supplier SP2. The issue of finding the right partners is out of the scope of this paper. The requirements on the global workflow and on the formation are specified by the parties together in the requirement definition phase. The local requirements are provided by each party alone. In our example, the local requirements consist of (1) local control-flow structures public within the NoAE and (2) information about needed data items which have to be provided by other partners. The local requirements are depicted in Figure 3 and can be described textually as follows: SP1 needs for the order checking CO the order do itself and the CAD drawing cd. Both data items are provided by the OEM. After CO, SP1 can start in parallel both, (a) the sequence consisting of the development DevG and the production of the gearing (task ProG) and (b) the ordering of the box surrounding the gearing.task OrdB generates the box order dobox. An output of task DevG is the CAD drawings of the surrounding box cdbox. For the assembling of the gear box within task AssB, both, the gearing and the surrounding box are needed. SP2 needs first the order dobox in order to check (task CBO) whether it can fulfill the requested development. For the development of the box itself (task DevB), it needs the CAD drawings cdbox. Afterwards, SP2 produces and delivers the box within the task ProB. The non-local requirements in our example are deadlock freeness and a global workflow which is as fast as possible. Moreover, the construction and evaluation should be done in a quick mode. All requirements are forwarded to the workflow formation phase. The workflow construction module analyzes the requirements. On the basis of the global requirement as fast as possible, the module selects the strategy rule use parallelism of tasks where it is possible. Furthermore, depending on the available features and the information given by the parties, the module decides which perspectives of the workflow are constructed, e.g. the control- and dataflow perspectives. Since the control-flow is the most essential one, we focus in the following on this perspective. The construction module chooses the creation based on the available local workflow information and the selected construction strategy. The determine which workflow elements or patterns are applied. Regarding our example, the construction module has to select a rule that can derive from input and output data the information which control-flow patterns should be applied. We assume here, that typical control-flow patterns, such as -split/merge etc., are stored in the pattern repository. Then, the following rule could be chosen by the module: IF task T has an outgoing data item which is requested by an external party, THEN apply an -split pattern behind the task T re-connect all outgoing control-flow links of T with the -split element connect T with the element add control-flow links between the -split and the tasks requesting the data element. The application of such creation results in a global workflow with a control-flow structure like shown in Figure 4. Also other perspectives, such as the data-flow, can be constructed in this way. The complete global workflow specification is stored in a file and forwarded to the evaluation module. First, the evaluation module analyzes the given requirements. As an result, the module knows the criteria for the selection of the plug-ins. In the example, these criteria are

6 do; cd Supplier SP1 CO Supplier SP2 DevG OrdB control-flow ProG CBO DevB ProB Figure 4. Control-flow Structure of Global the ability to check deadlock freeness and to do the analysis fast. Based on the strategy rule, Static analysis methods are in general faster than dynamic methods., the module would chose a plug-in which supports static methods. A possible choice would be Woflan. If the workflow specification format is not supported by Woflan then the specification has to be transformed or mapped to a suitable format. The handling of the format issue will be part of a refinement of the architecture planned in our future work. In parallel to the checking of deadlock freeness, the evaluation module triggers a plug-in which is able to validate whether the local requirements are still hold in the global workflow. This can be done as follows: (1) Take the global workflow specification and remove links which are linked to external tasks.(2) Remove each split and merge element which has only one incoming and one outgoing link and rearrange the affected links accordingly. (3) Compare the remaining workflow parts with the local workflows. Temporal aspects cannot be evaluated in our example because necessary data are not provided. If the evaluation module could proof the deadlock freeness and the compliance of the global workflow with the local requirements then the results are stored in a document and the global workflow specification is forwarded to an enactment module. 5. Conclusion In this paper we have proposed both, a workflow formation cycle and a functional architecture for automated workflow formation. The interesting features of the architecture are its extensibility, and its fulfillment of the requirements from the automotive industry. In future, we plan to extend the architecture with explicit user interfaces and to refine the construction and evaluation modules, including algorithms, and to substantiate the interfaces between the components. References [1] S. Ambroszkiewicz. Agent based approach to service description and composition. In W. Truszkowski, M. Hinchey, AssB and C. Rouff, editors, Innovative Concepts for Agent-Based Systems: First International Workshop on Radical Agent Concepts, volume 2564 of Lecture Notes in Computer Science, pages Springer-Verlag, Oct [2] S. Angelov and P. Grefen. Requirements on a B2B E- contrac language. Technical Report BETA Report WP 140, BETA Research Institute, Eindhoven University of Technology, Eindhoven, The Netherlands, May [3] W. Becker. The Future of the European Manufacturing Industry, chapter The Network of Automotive Excellence as a Potential Response to Change in Development/ Production and Brand Policy. Springer, [4] BPEL4WS. Homepage ibm.com/developerworks/library/specification/wsbpel/. last access April, [5] F. Casati, S. Ilnicki, L. jie Jin, V. Krishnamoorthy, and M.-C. Shan. Adaptive and dynamic service composition in eflow. In CAiSE 00: Proceedings of the 12th International Conference on Advanced Information Systems Engineering, pages 13 31, London, UK, Springer-Verlag. [6] D. K. W. Chiu, S. C. Cheung, S. Till, K. Karlapalem, Q. Li, and E. Kafeza. view driven cross-organizational interoperability in a web service environment. Inf. Tech. and Management, 5(3-4): , [7] CrossWork. Project homepage. last access May, [8] CrossWork Consortium. Intra- & inter-organisational business models. Technical report, CrossWork, Public deliverable to WP1 Business Model Development. [9] ExSpect. ExSpecT - Executable Specification Tool. last access June 10, [10] P. Grefen, K. Aberer, Y. Hoffner, and H. Ludwig. Crossflow: Cross-organizational workflow management in dynamic virtual enterprises. International Journal of Computer Systems Engineering, 15(5), Sept [11] P. Grefen, H. Ludwig, and S. Angelov. A three-level framework for process and data management of complex e- services. International Journal of Cooperative Information Systems, 12(4): , [12] R. Kurek. Erfolgreiche Strategien für Automobilzulieferer. Springer Berlin, [13] G. Piccinelli and L. Mokrushin. Dynamic e-service composition in DySCo. In International Conference on Distributed Computing Systems Workshop, pages 88 93, [14] RuleML Initiative. RuleML - Rule Markup Language. last access June 6, [15] W. M. P. van der Aalst, B. F. van Dongen, J. Herbst, L. Maruster, G. Schimm, and A. J. M. M. Weijters. mining: a survey of issues and approaches. Data Knowl. Eng., 47(2): , [16] H. M. W. Verbeek, W. M. P. V. D. Aalst, and A. Kumar. Xrl/woflan: Verification and extensibility of an xml/petri-netbased language for inter-organizational workflows. Inf. Tech. and Management, 5(1-2):65 110, [17] XRL. XRL-eXchangeable Routing Language. last access June,

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1.1 Research Motivation In today s modern digital environment with or without our notice we are leaving our digital footprints in various data repositories through our daily activities,

More information

Process Mining and Monitoring Processes and Services: Workshop Report

Process Mining and Monitoring Processes and Services: Workshop Report Process Mining and Monitoring Processes and Services: Workshop Report Wil van der Aalst (editor) Eindhoven University of Technology, P.O.Box 513, NL-5600 MB, Eindhoven, The Netherlands. [email protected]

More information

Quality-Oriented Handling of Exceptions in Web-Service- Based Cooperative Processes

Quality-Oriented Handling of Exceptions in Web-Service- Based Cooperative Processes Quality-Oriented Handling of Exceptions in Web-Service- Based Cooperative Processes Ulrike Greiner, Erhard Rahm Department of Computer Science, University of Leipzig {greiner, rahm}@informatik.uni-leipzig.de

More information

Analysis of Service Level Agreements using Process Mining techniques

Analysis of Service Level Agreements using Process Mining techniques Analysis of Service Level Agreements using Process Mining techniques CHRISTIAN MAGER University of Applied Sciences Wuerzburg-Schweinfurt Process Mining offers powerful methods to extract knowledge from

More information

FileNet s BPM life-cycle support

FileNet s BPM life-cycle support FileNet s BPM life-cycle support Mariska Netjes, Hajo A. Reijers, Wil M.P. van der Aalst Eindhoven University of Technology, Department of Technology Management, PO Box 513, NL-5600 MB Eindhoven, The Netherlands

More information

Business Process Management: A personal view

Business Process Management: A personal view Business Process Management: A personal view W.M.P. van der Aalst Department of Technology Management Eindhoven University of Technology, The Netherlands [email protected] 1 Introduction Business

More information

Handling Big(ger) Logs: Connecting ProM 6 to Apache Hadoop

Handling Big(ger) Logs: Connecting ProM 6 to Apache Hadoop Handling Big(ger) Logs: Connecting ProM 6 to Apache Hadoop Sergio Hernández 1, S.J. van Zelst 2, Joaquín Ezpeleta 1, and Wil M.P. van der Aalst 2 1 Department of Computer Science and Systems Engineering

More information

Supporting the BPM life-cycle with FileNet

Supporting the BPM life-cycle with FileNet Supporting the BPM life-cycle with FileNet Mariska Netjes, Hajo A. Reijers, Wil M.P. van der Aalst Eindhoven University of Technology, Department of Technology Management, PO Box 513, NL-5600 MB Eindhoven,

More information

Activity Mining for Discovering Software Process Models

Activity Mining for Discovering Software Process Models Activity Mining for Discovering Software Process Models Ekkart Kindler, Vladimir Rubin, Wilhelm Schäfer Software Engineering Group, University of Paderborn, Germany [kindler, vroubine, wilhelm]@uni-paderborn.de

More information

How To Develop Software

How To Develop Software Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which

More information

Demonstrating WSMX: Least Cost Supply Management

Demonstrating WSMX: Least Cost Supply Management Demonstrating WSMX: Least Cost Supply Management Eyal Oren 2, Alexander Wahler 1, Bernhard Schreder 1, Aleksandar Balaban 1, Michal Zaremba 2, and Maciej Zaremba 2 1 NIWA Web Solutions, Vienna, Austria

More information

EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES. Nataliya Golyan, Vera Golyan, Olga Kalynychenko

EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES. Nataliya Golyan, Vera Golyan, Olga Kalynychenko 380 International Journal Information Theories and Applications, Vol. 18, Number 4, 2011 EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES Nataliya Golyan, Vera Golyan, Olga Kalynychenko

More information

Software Engineering Reference Framework

Software Engineering Reference Framework Software Engineering Reference Framework Michel Chaudron, Jan Friso Groote, Kees van Hee, Kees Hemerik, Lou Somers, Tom Verhoeff. Department of Mathematics and Computer Science Eindhoven University of

More information

Data-Aware Service Choreographies through Transparent Data Exchange

Data-Aware Service Choreographies through Transparent Data Exchange Institute of Architecture of Application Systems Data-Aware Service Choreographies through Transparent Data Exchange Michael Hahn, Dimka Karastoyanova, and Frank Leymann Institute of Architecture of Application

More information

BIS 3106: Business Process Management. Lecture Two: Modelling the Control-flow Perspective

BIS 3106: Business Process Management. Lecture Two: Modelling the Control-flow Perspective BIS 3106: Business Process Management Lecture Two: Modelling the Control-flow Perspective Makerere University School of Computing and Informatics Technology Department of Computer Science SEM I 2015/2016

More information

Process Modelling from Insurance Event Log

Process Modelling from Insurance Event Log Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R

More information

Service Oriented Architecture

Service Oriented Architecture Service Oriented Architecture Charlie Abela Department of Artificial Intelligence [email protected] Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline

More information

(Refer Slide Time: 01:52)

(Refer Slide Time: 01:52) Software Engineering Prof. N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture - 2 Introduction to Software Engineering Challenges, Process Models etc (Part 2) This

More information

Towards Cross-Organizational Process Mining in Collections of Process Models and their Executions

Towards Cross-Organizational Process Mining in Collections of Process Models and their Executions Towards Cross-Organizational Process Mining in Collections of Process Models and their Executions J.C.A.M. Buijs, B.F. van Dongen, W.M.P. van der Aalst Department of Mathematics and Computer Science, Eindhoven

More information

Towards Management of SLA-Aware Business Processes Based on Key Performance Indicators

Towards Management of SLA-Aware Business Processes Based on Key Performance Indicators Towards Management of SLA-Aware Business Processes Based on Key Performance Indicators Branimir Wetzstein, Dimka Karastoyanova, Frank Leymann Institute of Architecture of Application Systems, University

More information

Introduction to Systems Analysis and Design

Introduction to Systems Analysis and Design Introduction to Systems Analysis and Design What is a System? A system is a set of interrelated components that function together to achieve a common goal. The components of a system are called subsystems.

More information

Business Process Modeling

Business Process Modeling Business Process Concepts Process Mining Kelly Rosa Braghetto Instituto de Matemática e Estatística Universidade de São Paulo [email protected] January 30, 2009 1 / 41 Business Process Concepts Process

More information

CS 565 Business Process & Workflow Management Systems

CS 565 Business Process & Workflow Management Systems CS 565 Business Process & Workflow Management Systems Professor & Researcher Department of Computer Science, University of Crete & ICS-FORTH E-mail: [email protected], [email protected] Office: K.307,

More information

Business-Driven Software Engineering Lecture 3 Foundations of Processes

Business-Driven Software Engineering Lecture 3 Foundations of Processes Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster [email protected] Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary

More information

How To Model An Outsourcing Relation Between A Telecom And Logistics Company (Telco) And A Logistics Company

How To Model An Outsourcing Relation Between A Telecom And Logistics Company (Telco) And A Logistics Company Business-to-business E-commerce in a Logistics Domain 1 Zef Damen, Wijnand Derks, Matthijs Duitshof, Henk Ensing KPN Research {j.t.w.damen; w.l.a.derks; m.j.duitshof; henk.ensing}@kpn.com Abstract Today

More information

EMiT: A process mining tool

EMiT: A process mining tool EMiT: A process mining tool B.F. van Dongen and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands. [email protected]

More information

10g versions followed on separate paths due to different approaches, but mainly due to differences in technology that were known to be huge.

10g versions followed on separate paths due to different approaches, but mainly due to differences in technology that were known to be huge. Oracle BPM 11g Platform Analysis May 2010 I was privileged to be invited to participate in "EMEA BPM 11g beta bootcamp" in April 2010, where I had close contact with the latest release of Oracle BPM 11g.

More information

Configuring IBM WebSphere Monitor for Process Mining

Configuring IBM WebSphere Monitor for Process Mining Configuring IBM WebSphere Monitor for Process Mining H.M.W. Verbeek and W.M.P. van der Aalst Technische Universiteit Eindhoven Department of Mathematics and Computer Science P.O. Box 513, 5600 MB Eindhoven,

More information

Dynamic and Secure B2B E-contract Update Management

Dynamic and Secure B2B E-contract Update Management Dynamic and Secure B2B E-contract Update Management Samuil Angelov Information Systems Group Faculty of Technology Management Eindhoven University of Technology P.O. Box 513, 5600 MB, Eindhoven The Netherlands

More information

A Business Process Services Portal

A Business Process Services Portal A Business Process Services Portal IBM Research Report RZ 3782 Cédric Favre 1, Zohar Feldman 3, Beat Gfeller 1, Thomas Gschwind 1, Jana Koehler 1, Jochen M. Küster 1, Oleksandr Maistrenko 1, Alexandru

More information

Workflow Object Driven Model

Workflow Object Driven Model Workflow Object Driven Model Włodzimierz Dąbrowski 1,2, Rafał Hryniów 2 Abstract: Within the last decade the workflow management makes an incredible career. Technology connected with the workflow management

More information

REQUIREMENTS FOR THE WORKFLOW-BASED SUPPORT OF RELEASE MANAGEMENT PROCESSES IN THE AUTOMOTIVE SECTOR

REQUIREMENTS FOR THE WORKFLOW-BASED SUPPORT OF RELEASE MANAGEMENT PROCESSES IN THE AUTOMOTIVE SECTOR REQUIREMENTS FOR THE WORKFLOW-BASED SUPPORT OF RELEASE MANAGEMENT PROCESSES IN THE AUTOMOTIVE SECTOR Ulrich Bestfleisch, Joachim Herbst DaimlerChrysler AG Research and Technology Data and Process Management

More information

Mercy Health System. St. Louis, MO. Process Mining of Clinical Workflows for Quality and Process Improvement

Mercy Health System. St. Louis, MO. Process Mining of Clinical Workflows for Quality and Process Improvement Mercy Health System St. Louis, MO Process Mining of Clinical Workflows for Quality and Process Improvement Paul Helmering, Executive Director, Enterprise Architecture Pete Harrison, Data Analyst, Mercy

More information

Semantic Description of Distributed Business Processes

Semantic Description of Distributed Business Processes Semantic Description of Distributed Business Processes Authors: S. Agarwal, S. Rudolph, A. Abecker Presenter: Veli Bicer FZI Forschungszentrum Informatik, Karlsruhe Outline Motivation Formalism for Modeling

More information

Dotted Chart and Control-Flow Analysis for a Loan Application Process

Dotted Chart and Control-Flow Analysis for a Loan Application Process Dotted Chart and Control-Flow Analysis for a Loan Application Process Thomas Molka 1,2, Wasif Gilani 1 and Xiao-Jun Zeng 2 Business Intelligence Practice, SAP Research, Belfast, UK The University of Manchester,

More information

Design Verification. Introduction

Design Verification. Introduction Design verification is an essential step in the development of any product. Also referred to as qualification testing, design verification ensures that the product as designed is the same as the product

More information

Process mining challenges in hospital information systems

Process mining challenges in hospital information systems Proceedings of the Federated Conference on Computer Science and Information Systems pp. 1135 1140 ISBN 978-83-60810-51-4 Process mining challenges in hospital information systems Payam Homayounfar Wrocław

More information

1.1 Motivation and Definitions

1.1 Motivation and Definitions 1 Introduction Business process management has received considerable attention recently by both business administration and computer science communities. Members of these communities are typically characterized

More information

Modelling and Verification of Business Processes

Modelling and Verification of Business Processes Modelling and Verification of Business Processes Costin Bădică Department of Computer Science King s College London, WC2R 2LS, UK [email protected] Chris Fox Department of Computer Science University

More information

SERENITY Pattern-based Software Development Life-Cycle

SERENITY Pattern-based Software Development Life-Cycle SERENITY Pattern-based Software Development Life-Cycle Francisco Sanchez-Cid, Antonio Maña Computer Science Department University of Malaga. Spain {cid, amg}@lcc.uma.es Abstract Most of current methodologies

More information

Unifying IT How Dell Is Using BMC

Unifying IT How Dell Is Using BMC Unifying IT Management: How Dell Is Using BMC Software to Implement ITIL ABSTRACT Companies are looking for ways to maximize the efficiency with which they plan, deliver, and manage technology services.

More information

Model Discovery from Motor Claim Process Using Process Mining Technique

Model Discovery from Motor Claim Process Using Process Mining Technique International Journal of Scientific and Research Publications, Volume 3, Issue 1, January 2013 1 Model Discovery from Motor Claim Process Using Process Mining Technique P.V.Kumaraguru *, Dr.S.P.Rajagopalan

More information

W204 - LMS Consolidation, Underlying Design More Important Than Platform

W204 - LMS Consolidation, Underlying Design More Important Than Platform W204 - LMS Consolidation, Underlying Design More Important Than Platform Assess the scalability of your organization s LMS platform Evaluate an LMS based upon the size and character of different learner

More information

Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis

Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis Derek Foo 1, Jin Guo 2 and Ying Zou 1 Department of Electrical and Computer Engineering 1 School of Computing 2 Queen

More information

Specification and Analysis of Contracts Lecture 1 Introduction

Specification and Analysis of Contracts Lecture 1 Introduction Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider [email protected] http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.

More information

Huawei Managed Services Unified Platform (MS UP) v1.0

Huawei Managed Services Unified Platform (MS UP) v1.0 Huawei Managed Services Unified Platform (MS UP) v1.0 Representation of Solution Functionality/Capability Utilizing etom, ITIL and TL 9000, Huawei Managed Services has integrated these three global standards

More information

A Methodology and Toolkit for Deploying Contract Documents as E-contracts

A Methodology and Toolkit for Deploying Contract Documents as E-contracts A Methodology and Toolkit for Deploying Contract Documents as E-contracts Anushree Khandekar +, P. Radha Krishna * and Kamalakar Karlapalem + + International Institute of Information Technology, Hyderabad,

More information

Rabobank: Incident and change process analysis

Rabobank: Incident and change process analysis Rabobank: Incident and change process analysis Michael Arias 1, Mauricio Arriagada 1, Eric Rojas 1, Cecilia Sant-Pierre 1, Marcos Sepúlveda 1 1 Pontificia Universidad Católica de Chile, Av. Vicuña Mackenna

More information

Modeling Workflow Patterns

Modeling Workflow Patterns Modeling Workflow Patterns Bizagi Suite Workflow Patterns 1 Table of Contents Modeling workflow patterns... 4 Implementing the patterns... 4 Basic control flow patterns... 4 WCP 1- Sequence... 4 WCP 2-

More information

WebSphere Business Modeler

WebSphere Business Modeler Discovering the Value of SOA WebSphere Process Integration WebSphere Business Modeler Workshop SOA on your terms and our expertise Soudabeh Javadi Consulting Technical Sales Support WebSphere Process Integration

More information

Workflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment

Workflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment Workflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment Peter Y. Wu [email protected] Department of Computer & Information Systems Robert Morris University

More information

PLG: a Framework for the Generation of Business Process Models and their Execution Logs

PLG: a Framework for the Generation of Business Process Models and their Execution Logs PLG: a Framework for the Generation of Business Process Models and their Execution Logs Andrea Burattin and Alessandro Sperduti Department of Pure and Applied Mathematics University of Padua, Italy {burattin,sperduti}@math.unipd.it

More information

Business Process Redesign and Modelling

Business Process Redesign and Modelling Business Process Redesign and Modelling The Business Process Redesign the Process Handbook the key idea of the Process Handbook approach is that a richly structured online repository about business processes

More information

SLA Business Management Based on Key Performance Indicators

SLA Business Management Based on Key Performance Indicators , July 4-6, 2012, London, U.K. SLA Business Management Based on Key Performance Indicators S. Al Aloussi Abstract-It is increasingly important that Service Level Agreements (SLAs) are taken into account

More information

Managing Variability in Software Architectures 1 Felix Bachmann*

Managing Variability in Software Architectures 1 Felix Bachmann* Managing Variability in Software Architectures Felix Bachmann* Carnegie Bosch Institute Carnegie Mellon University Pittsburgh, Pa 523, USA [email protected] Len Bass Software Engineering Institute Carnegie

More information

PROJECT MANAGEMENT PLAN CHECKLIST

PROJECT MANAGEMENT PLAN CHECKLIST PROJECT MANAGEMENT PLAN CHECKLIST The project management plan is a comprehensive document that defines each area of your project. The final document will contain all the required plans you need to manage,

More information

MNLARS Project Audit Checklist

MNLARS Project Audit Checklist Audit Checklist The following provides a detailed checklist to assist the audit team in reviewing the health of a project. Relevance (at this time) How relevant is this attribute to this project or audit?

More information

The Benefits of PLM-based CAPA Software

The Benefits of PLM-based CAPA Software For manufacturers in industries that produce some of the world s most complex products, effective quality management continues to be a competitive advantage. Whether in automotive, aerospace and defense,

More information

Discovering User Communities in Large Event Logs

Discovering User Communities in Large Event Logs Discovering User Communities in Large Event Logs Diogo R. Ferreira, Cláudia Alves IST Technical University of Lisbon, Portugal {diogo.ferreira,claudia.alves}@ist.utl.pt Abstract. The organizational perspective

More information

Service Quality Management The next logical step by James Lochran

Service Quality Management The next logical step by James Lochran www.pipelinepub.com Volume 4, Issue 2 Service Quality Management The next logical step by James Lochran Service Quality Management (SQM) is the latest in the long list of buzz words floating around the

More information

D6.1: Service management tools implementation and maturity baseline assessment framework

D6.1: Service management tools implementation and maturity baseline assessment framework D6.1: Service management tools implementation and maturity baseline assessment framework Deliverable Document ID Status Version Author(s) Due FedSM- D6.1 Final 1.1 Tomasz Szepieniec, All M10 (31 June 2013)

More information

BPMN Process Design for Complex Product Development and Production

BPMN Process Design for Complex Product Development and Production BPMN Process Design for Complex Development and ion Dieter Roller, Erik Engesser Institute of Computer-aided Development Systems Universität Stuttgart Universitätsstrasse 38 D-70569 Stuttgart, Germany

More information

COMPUTER AUTOMATION OF BUSINESS PROCESSES T. Stoilov, K. Stoilova

COMPUTER AUTOMATION OF BUSINESS PROCESSES T. Stoilov, K. Stoilova COMPUTER AUTOMATION OF BUSINESS PROCESSES T. Stoilov, K. Stoilova Computer automation of business processes: The paper presents the Workflow management system as an established technology for automation

More information

Making Business Rules operational. Knut Hinkelmann

Making Business Rules operational. Knut Hinkelmann Making Business Rules operational Knut Hinkelmann Levels of Expression For expressing rules there is a trade-off between acessibility of business meaning and desirable automation Rules can be expressed

More information

Choosing the Right ERP Solution:

Choosing the Right ERP Solution: Choosing the Right ERP Solution: 3 CRITERIA FOR SUCCESS Table of Contents 1 2 Who We Are 3 The Key to Better Business Performance 4 ERP as the Focal Point of Your Business 5 Why Some ERP Solutions Fail

More information

An Introduction to. Metrics. used during. Software Development

An Introduction to. Metrics. used during. Software Development An Introduction to Metrics used during Software Development Life Cycle www.softwaretestinggenius.com Page 1 of 10 Define the Metric Objectives You can t control what you can t measure. This is a quote

More information

Eventifier: Extracting Process Execution Logs from Operational Databases

Eventifier: Extracting Process Execution Logs from Operational Databases Eventifier: Extracting Process Execution Logs from Operational Databases Carlos Rodríguez 1, Robert Engel 2, Galena Kostoska 1, Florian Daniel 1, Fabio Casati 1, and Marco Aimar 3 1 University of Trento,

More information

Title: Basic Concepts and Technologies for Business Process Management

Title: Basic Concepts and Technologies for Business Process Management Title: Basic Concepts and Technologies for Business Process Management Presenter: prof.dr. Manfred Reichert The economic success of an enterprise more and more depends on its ability to flexibly and quickly

More information

BPM and Simulation. A White Paper. Signavio, Inc. Nov 2013. Katharina Clauberg, William Thomas

BPM and Simulation. A White Paper. Signavio, Inc. Nov 2013. Katharina Clauberg, William Thomas BPM and Simulation A White Paper Signavio, Inc. Nov 2013 Katharina Clauberg, William Thomas Table of Contents 1. Executive Summary... 3 2. Setting the Scene for Process Change... 4 3. Identifying the Goals

More information

A Generic Import Framework For Process Event Logs

A Generic Import Framework For Process Event Logs A Generic Import Framework For Process Event Logs Industrial Paper Christian W. Günther and Wil M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513,

More information

Introduction to Software Engineering

Introduction to Software Engineering CS1Ah Lecture Note 7 Introduction to Software Engineering In this note we provide an overview of Software Engineering. The presentation in this lecture is intended to map out much of what we will study

More information

A Framework for Service Outsourcing using Process Views

A Framework for Service Outsourcing using Process Views A Framework for Service Outsourcing using Process Views Rik Eshuis Eindhoven University of Technology, Faculty of Technology and Management, Department of Information Systems, P.O. Box 513, NL-5600 MB,

More information

Next-Generation Performance Testing with Service Virtualization and Application Performance Management

Next-Generation Performance Testing with Service Virtualization and Application Performance Management Next-Generation Performance Testing with Service Virtualization and Application Performance Management By Akshay Rao, Principal Consultant, CA Technologies Summary Current approaches for predicting with

More information

Software review: A process change model to meet the Enterprise Marketing Automation (EMA) vision Received: 20th July, 2000

Software review: A process change model to meet the Enterprise Marketing Automation (EMA) vision Received: 20th July, 2000 Software review: A process change model to meet the Enterprise Marketing Automation (EMA) vision Received: 20th July, 2000 Shaun Doyle is Chairman of Intrinsic, a campaign management software company.

More information

A Framework for Document-Driven Workflow Systems

A Framework for Document-Driven Workflow Systems A Framework for Document-Driven Workflow Systems Jianrui Wang and Akhil Kumar Smeal College of Business, Pennsylvania State University, University Park, PA 16802, U.S.A. {JerryWang, AkhilKumar}@psu.edu

More information

A METHOD FOR REWRITING LEGACY SYSTEMS USING BUSINESS PROCESS MANAGEMENT TECHNOLOGY

A METHOD FOR REWRITING LEGACY SYSTEMS USING BUSINESS PROCESS MANAGEMENT TECHNOLOGY A METHOD FOR REWRITING LEGACY SYSTEMS USING BUSINESS PROCESS MANAGEMENT TECHNOLOGY Gleison Samuel do Nascimento, Cirano Iochpe Institute of Informatics, Federal University of Rio Grande do Sul, Porto Alegre,

More information

Decision Mining in Business Processes

Decision Mining in Business Processes Decision Mining in Business Processes A. Rozinat and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands {a.rozinat,w.m.p.v.d.aalst}@tm.tue.nl

More information

MODERNIZING IT PLATFORMS SUCCESSFULLY HOW PLATFORM RENEWAL PROJECTS CREATE VALUE

MODERNIZING IT PLATFORMS SUCCESSFULLY HOW PLATFORM RENEWAL PROJECTS CREATE VALUE MODERNIZING IT PLATFORMS SUCCESSFULLY HOW PLATFORM RENEWAL PROJECTS CREATE VALUE INTRODUCTION The machinery and plant engineering industry is under pressure to transform. Globalization, new competitors,

More information

4. Multiagent Sys stems Design. Part 2: The PROMETHEUS methodology.

4. Multiagent Sys stems Design. Part 2: The PROMETHEUS methodology. 4. Multiagent Systems Design Part 2: Multiagent Syste ems (SMA-UPC) https://kemlg.upc.edu The PROMETHEUS methodology. Javier Vázquez-Salceda SMA-UPC Methodological Extensions to Object-Oriented Approaches

More information

Semantic Integration in Enterprise Information Management

Semantic Integration in Enterprise Information Management SETLabs Briefings VOL 4 NO 2 Oct - Dec 2006 Semantic Integration in Enterprise Information Management By Muralidhar Prabhakaran & Carey Chou Creating structurally integrated and semantically rich information

More information

STSG Methodologies and Support Structure

STSG Methodologies and Support Structure STSG Methodologies and Support Structure STSG Application Life Cycle Management STSG utilizes comprehensive lifecycle tools that are fully integrated and provide capabilities for most of the roles in its

More information

Dr. Jana Koehler IBM Zurich Research Laboratory

Dr. Jana Koehler IBM Zurich Research Laboratory Precise Modeling of Business Processes with the Business Process Modeling Notation BPMN 2.0 Dr. Jana Koehler IBM Zurich Research Laboratory ZRL BIT at a Glance Computer Science at ZRL: Security/Cryptography

More information

Nr.: Fakultät für Informatik Otto-von-Guericke-Universität Magdeburg

Nr.: Fakultät für Informatik Otto-von-Guericke-Universität Magdeburg Nr.: Fakultät für Informatik Otto-von-Guericke-Universität Magdeburg Nr.: Fakultät für Informatik Otto-von-Guericke-Universität Magdeburg Impressum ( 5 TMG) Herausgeber: Otto-von-Guericke-Universität Magdeburg

More information