iterated execution. alternative execution. sequential execution. parallel execution
|
|
|
- Darlene Wade
- 9 years ago
- Views:
Transcription
1 Institut fuer Informatik Humboldt-Universitaet zu Berlin Mai 1998 Database Theory { Petri Net Theory { Workow Theory Ekkart Kindler Humboldt-Universitat zu Berlin, Institut fur Informatik, Unter den Linden 6, D Berlin y 1 Introduction Workow management is in vogue. Jablonski [Jab95] calls workow management the relational databases of the 90ties. However, Jablonski states one important dierence between workow management in the 90ties and relational databases in the 80ties: Whereas there has been a theoretical foundation for relational databases right from the beginning (in the early 70ties), there is no well-established workow theory yet. In this paper we will argue that there is a workow theory, which only needs to be rediscovered underneath a vast amount of existing theory. For example, some classical results from Petri net theory just need a new interpretation in order to make up a workow theory. Van der Aalst [Aal97b, Aal97a, Aal98] has shown that simple Petri net concepts such as liveness and boundedness can be used to characterize sound workows. We do not claim that this approach is a fully-edged workow theory yet but we claim that a helpful workow theory will be akin to it. This paper will substantiate the above statement by providing a avour of a future workow theory. From a theoreticians point of view this theory may appear trivial because there is not much hope for deep theorems. But, we make a plea by forming an analogy to a well-established part of database theory: normal forms and depency theory (cf. [Cod90, Dat90]). Depency theory is even simpler and has even less deep theorems but is a great success because it is just the bit of theory needed! This paper is not meant to develop new ideas we mainly present those of van der Aalst [Aal97a] and give a new interpretation to a result of Valette [Val79] (also rephrased in [Aal98]). The main purpose is to point out the right ideas from Petri net theory in the eld of workow management and to direct research into this eld. 2 Database theory In order to form the analogy to database theory, let us briey recall normal forms and depency theory which have been a great success within the eld of relational database systems [Dat90]. This theory was established by Codd in the early 70ties. Codd rephrases the main motivation for his theory as follows: `My main goal was to develop some theory that would be applicable to logical database design, and especially to the creation of a sound collection of base relations' [Cod90], p Normal forms capture formally, what a skilled database designer considers as a good design. Each normal form is motivated by anomalies which may occur in a bad database design. Let us consider an example of a simple database which consists of a single relation. The relation Supported by the Deutsche Forschungsgemeinschaft within the research project `Petri Net Technology' (DFG Forschergruppe `Petrinetz-Technologie'). y [email protected] 1
2 project administration consists of the following attributes: project, person, percentage of working hours spent on this project, and the telephone number of the person. Projects and persons are represented by some number. Essentially, a relation (or an instance of a relation) can be represented as a table as shown in Fig. 1 (without identical rows). The columns of the table correspond to the attributes of the relation. PROJECT# PERSON# PERCENT. TEL Figure 1: The relation project administration The relation project administration is not well designed. This will be demonstrated by means of some anomalies (insert and update). Suppose, there is a new person who is not yet associated with a particular project. Then, it is impossible to insert this person into this relation. The insert anomaly means that we cannot store the telephone number of a person within relation project administration unless this person works on a project. Next suppose, we want to change the telephone number of person 4711 then we actually need to update three rows. The update anomaly means that updating one fact needs changes in several rows. Now, why is the above relation not well designed? The reason is that attribute TEL. is functionally depent (i.e. is fully determined by the value) of attribute PERSON#, since each person has only one telephone number. Another attribute PERCENT.,however, is not functionally depent on attribute PERSON# since the percentage of working time deps on the project either. A relation is well-designed, if for each collection of attributes we have: Either all (other) attributes are functionally depent on that collection or no (other) attribute is functionally depenton that collection. This requirement, called Boyce/Codd-normal-form (BCNF ) [Dat90], is violated by the relation project administration (as indicated above). Though we did not give a fully formal denition of BCNF, it should be clear that it is only based on the concept of functional depency which has a clear intuition and can be easily explained. 3 Workow theory In this section, we will sketch a workow theory introduced by van der Aalst [Aal97a, Aal97b, Aal98]. Its simplicity and its correspondence to intuitive ideas are analogous to Codd's database theory. Moreover, this workow theory helps to identify good workows. Note, that this work- ow theory is only concerned with the behavioural or process aspect of workows of course theories for the other aspects are necessary. Since the behavioural aspect is an important aspect of workows, it is justied to call it workow theory. Let us consider an example rst. A workow (resp. the behavioural aspect) can be modelled by a Petri net (a Place/Transition-System, to be precise) with a distinguished place and a distinguished place. Moreover, each place except is initially unmarked. A transition of the Petri net corresponds to an activity of the workow a place (or rather a token on a place) 2
3 corresponds to a document. The arcs of the Petri net indicate which documents are consumed and which are produced by an activity. t5 e t5 e a t2 c t6 a t2 c t6 t1 t4 t1 t4 b t3 d b t3 d Figure 2: Workow net 1 Figure 3: Workow net 2 Figure 2 shows an example of an ill-designed workow. We will point out some anomalies of this workow. Suppose, activities t1, t3, and t5 have been processed already. Then, we have documents (tokens on places) e and d in this situation no activity can be executed any more. Therefore, it is impossible to nish the workow correctly by putting a document (token) on place. Next, we try to x this anomaly by removing the arc from b to t6 as shown in Fig. 3. Then, activity t6 can be processed in the above situation and the workow terminates. This workow, however, shows another anomaly: When the workow terminates, there is still a document d within the workow. This corresponds to the loss of a document within the workow, whichisnot satisfactory. Another anomaly would be if there was an activity which is dead i.e. it is impossible to ever perform this activity. These three anomalies are excluded in so-called sound workows [Aal97a, Aal97b]. Up to now, we established an analogy to the anomalies of database theory. Next, we will give an analogy to the concept of functional depency. Here, two classical concepts of Petri net theory come in: liveness and boundedness (cf. [Pet81, Rei85]). Informally, a Petri net is live if every transition can occur again whatever happened before a Petri net is bounded if the number of tokensoneach place is bounded by somenumber. Now, these concepts can be used to characterize sound workows: Aworkow is sound, if and only if the Petri net exted by one transition between and as indicated in Fig. 4 is live and bounded [Aal97a, Aal97b]. workflow net Figure 4: Exted workow net Note that in a sound workow it is still possible that a document occurstwice on the same place (technically speaking, boundedness does not imply 1-safeness). From a practical point of view this is debatable. Therefore, we introduce a slightly stronger concept of soundness: A workow net is strong sound, if and only if the exted workow net is live and 1-safe. In addition to the practical motivation that we do not want duplicate documents, we will give a theoretical justication for this stronger requirement at the of the next section. In analogy to Codd's theory, the above workow theory helps to identify ill-designed workows. The soundness criterion is motivated by anomalies in a similar way Codd motivates his normal 3
4 forms. Liveness and boundedness are almost as simple as Codd's functional depencies. 4 Workow construct theory The workow theory as presented in the previous section helps to identify ill-designed workows. But, it is only possible to check for soundness at the of the design process there are no guidelines for designing sound workows. Here, we will briey present another part of workow theory which tackles this problem. One way to enforce the design of good workows is to construct workows by so-called routing constructs. The Workow Management Coalition (WfMC) proposes four routing constructs: sequential, alternative, parallel, and iterated execution. These routing constructs can be rephrased in terms of the transformation rules shown in Fig. 5. Van der Aalst [Aal97b] has shown that each sequential execution alternative execution parallel execution iterated execution Figure 5: Routing constructs and transformation rules transformation 1 preserves soundness of a workow. In particular, any workow net constructed by the above transformation rules from the workow net shown in Fig. 6 is sound indeed, it is strongly sound. Figure 6: Workow for ing the construction The problem, however, is that the routing constructs of the WfMC are rather restrictive. Therefore, we need a theory to design additional routing constructs. Most interesting, this theory has already been proposed by Valette [Val79] at a time when workow was not an issue! When we represent a routing construct by a transformation rule as shown above, his result basically says: We can use any strongly sound workow net as a workow construct i.e. as right-hand side of the transformation rule. The above condition even guarantees that the workows built from the new routing constructs are strongly sound. What is more, it is even a necessary and sucient condition for routing constructs which guarantee strong sound workows. This exact correspondence is a theoretical justication for strong soundness. 1 Note that we have slightly changed the rule for iteration. 4
5 5 Conclusion The technical contribution of this paper is rather modest: We have proposed a slightly modied soundness criterion for workow nets. The main purpose of this paper is to give a avour of a future workow theory based on the ideas of van der Aalst. Though it might appear trivial from a theoreticians point of view, it is just the bit of theory needed. As a justication we have compared his approach to Codd's doubtless successful database theory. We do not claim that the development of this workow theory is nished but we claim that future workow theory will consist of many results similar to those mentioned in this paper. Slight variations, e.g. strong soundness instead of soundness, may turn out to be more suitable even this variation has a counterpart in Codd's theory: 3NF as dened by Codd has later been replaced by BCNF [Dat90]. What is more, we have given a new interpretation to Valette's [Val79] results: A criterion for dening new workow constructs. We believe that more old Petri net results have a workow interpretation and need just to be rediscovered and given a new interpretation. There is only little need for new Petri net theory, but a great need for Petri net archaeology. Acknowledgments Iwould like to thank Wil van der Aalst for his tutorials on workow, a day of discussion on his approach, and his comments on a preliminary version of this paper. Iwould also like to thank those theoreticians who argued that Wil's approach is no theory their arguments inspired me to think of a striking analogy and to write this paper. Moreover, many thanks to Wolfgang Reisig and to my colleagues Rolf Walter, Sibylle Peuker, Tobias Vesper, Hagen Volzer, and Michael Weber who gave helpful hints for improving the presentation of this paper. References [Aal97a] W.M.P. van der Aalst. Exploring the process dimension of workow management. Computing Science Reports 97/13, Eindhoven University of Technology, September [Aal97b] W.M.P. van der Aalst. Verication of workow nets. In P. Azema and G. Balbo, editors, Application and Theory of Petri Nets, LNCS 1248, pages 407{426. Springer- Verlag, June [Aal98] W.M.P. van der Aalst. Finding errors in the design of a workow process: APetri net approach. Unpublished manuscript, received January [Cod90] E.F. Codd. The Relational Model for Database Management, Version 2. Addison- Wesley, [Dat90] C.J. Date. An Introduction to Database Systems, Volume I. The Systems Programming Series. Addison-Wesley, [Jab95] Stefan Jablonski. Workow-Management-Systeme: Modellierung und Architektur. Thomson Publishers, [Pet81] James L. Peterson. Petri Net Theory And The Modeling of Systems. Prentice-Hall, [Rei85] Wolfgang Reisig. Petri Nets, EATCS Monographs on Theoretical Computer Science 4. Springer-Verlag, [Val79] Robert Valette. Analysis of Petri nets by stepwise renements. Journal of Computer and System Sciences, 18:35{46,
Regular Languages and Finite Automata
Regular Languages and Finite Automata 1 Introduction Hing Leung Department of Computer Science New Mexico State University Sep 16, 2010 In 1943, McCulloch and Pitts [4] published a pioneering work on a
Process Modelling from Insurance Event Log
Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R
7. Classification. Business value. Structuring (repetition) Automation. Classification (after Leymann/Roller) Automation.
7. Classification Business Process Modelling and Workflow Management Business value Lecture 4 (Terminology cntd.) Ekkart Kindler [email protected] Structuring (repetition) Automation UPB SS 2006 L04 2 Classification
3. Mathematical Induction
3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)
Formal Approaches to Business Processes through Petri Nets
Formal Approaches to Business Processes through Petri Nets Nick ussell Arthur H. M. ter Hofstede a university 2009, www.yawlfoundation.org Acknowledgement These slides summarize the content of Chapter
Arrangements of Stars on the American Flag
Arrangements of Stars on the American Flag Dimitris Koukoulopoulos and Johann Thiel Abstract. In this article, we examine the existence of nice arrangements of stars on the American flag. We show that
Oracle Turing machines faced with the verification problem
Oracle Turing machines faced with the verification problem 1 Introduction Alan Turing is widely known in logic and computer science to have devised the computing model today named Turing machine. In computer
A Test Case Generator for the Validation of High-Level Petri Nets
A Test Case Generator for the Validation of High-Level Petri Nets Jörg Desel Institut AIFB Universität Karlsruhe D 76128 Karlsruhe Germany E-mail: [email protected] Andreas Oberweis, Torsten
Activity Mining for Discovering Software Process Models
Activity Mining for Discovering Software Process Models Ekkart Kindler, Vladimir Rubin, Wilhelm Schäfer Software Engineering Group, University of Paderborn, Germany [kindler, vroubine, wilhelm]@uni-paderborn.de
Functional Dependencies and Finding a Minimal Cover
Functional Dependencies and Finding a Minimal Cover Robert Soulé 1 Normalization An anomaly occurs in a database when you can update, insert, or delete data, and get undesired side-effects. These side
Business Process Management: A personal view
Business Process Management: A personal view W.M.P. van der Aalst Department of Technology Management Eindhoven University of Technology, The Netherlands [email protected] 1 Introduction Business
7 Gaussian Elimination and LU Factorization
7 Gaussian Elimination and LU Factorization In this final section on matrix factorization methods for solving Ax = b we want to take a closer look at Gaussian elimination (probably the best known method
PROCESS-ORIENTED ARCHITECTURES FOR ELECTRONIC COMMERCE AND INTERORGANIZATIONAL WORKFLOW
Information Systems Vol.??, No.??, pp.??-??, 1999 Copyright 1999 Elsevier Sciences Ltd. All rights reserved Printed in Great Britain 0306-4379/98 $17.00 + 0.00 PROCESS-ORIENTED ARCHITECTURES FOR ELECTRONIC
EMiT: A process mining tool
EMiT: A process mining tool B.F. van Dongen and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands. [email protected]
Chapter 5: FUNCTIONAL DEPENDENCIES AND NORMALIZATION FOR RELATIONAL DATABASES
1 Chapter 5: FUNCTIONAL DEPENDENCIES AND NORMALIZATION FOR RELATIONAL DATABASES INFORMAL DESIGN GUIDELINES FOR RELATION SCHEMAS We discuss four informal measures of quality for relation schema design in
KNOWLEDGE FACTORING USING NORMALIZATION THEORY
KNOWLEDGE FACTORING USING NORMALIZATION THEORY J. VANTHIENEN M. SNOECK Katholieke Universiteit Leuven Department of Applied Economic Sciences Dekenstraat 2, 3000 Leuven (Belgium) tel. (+32) 16 28 58 09
Normalization. CIS 331: Introduction to Database Systems
Normalization CIS 331: Introduction to Database Systems Normalization: Reminder Why do we need to normalize? To avoid redundancy (less storage space needed, and data is consistent) To avoid update/delete
INCIDENCE-BETWEENNESS GEOMETRY
INCIDENCE-BETWEENNESS GEOMETRY MATH 410, CSUSM. SPRING 2008. PROFESSOR AITKEN This document covers the geometry that can be developed with just the axioms related to incidence and betweenness. The full
A PRACTICAL APPROACH FOR A WORKFLOW MANAGEMENT SYSTEM
A PRACTICAL APPROACH FOR A WORKFLOW MANAGEMENT SYSTEM Simone Pellegrini, Francesco Giacomini, Antonia Ghiselli INFN Cnaf Viale Berti Pichat, 6/2-40127 Bologna, Italy [email protected] [email protected]
Variation Management for Software Production Lines 1
Variation Management for Software Production Lines 1 Charles W. Krueger BigLever Software, Inc. 10500 Laurel Hill Cove Austin TX 78730 USA [email protected] Abstract. Variation in a software product
Schema Design and Normal Forms Sid Name Level Rating Wage Hours
Entity-Relationship Diagram Schema Design and Sid Name Level Rating Wage Hours Database Management Systems, 2 nd Edition. R. Ramakrishnan and J. Gehrke 1 Database Management Systems, 2 nd Edition. R. Ramakrishnan
Modelling Workflow with Petri Nets. CA4 BPM PetriNets
Modelling Workflow with Petri Nets 1 Workflow Management Issues Georgakopoulos,Hornick, Sheth Process Workflow specification Workflow Implementation =workflow application Business Process Modelling/ Reengineering
Chapter 4 Software Lifecycle and Performance Analysis
Chapter 4 Software Lifecycle and Performance Analysis This chapter is aimed at illustrating performance modeling and analysis issues within the software lifecycle. After having introduced software and
Some other convex-valued selection theorems 147 (2) Every lower semicontinuous mapping F : X! IR such that for every x 2 X, F (x) is either convex and
PART B: RESULTS x1. CHARACTERIZATION OF NORMALITY- TYPE PROPERTIES 1. Some other convex-valued selection theorems In this section all multivalued mappings are assumed to have convex values in some Banach
Formal Languages and Automata Theory - Regular Expressions and Finite Automata -
Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March
PLG: a Framework for the Generation of Business Process Models and their Execution Logs
PLG: a Framework for the Generation of Business Process Models and their Execution Logs Andrea Burattin and Alessandro Sperduti Department of Pure and Applied Mathematics University of Padua, Italy {burattin,sperduti}@math.unipd.it
FileNet s BPM life-cycle support
FileNet s BPM life-cycle support Mariska Netjes, Hajo A. Reijers, Wil M.P. van der Aalst Eindhoven University of Technology, Department of Technology Management, PO Box 513, NL-5600 MB Eindhoven, The Netherlands
2x + y = 3. Since the second equation is precisely the same as the first equation, it is enough to find x and y satisfying the system
1. Systems of linear equations We are interested in the solutions to systems of linear equations. A linear equation is of the form 3x 5y + 2z + w = 3. The key thing is that we don t multiply the variables
DATABASE NORMALIZATION
DATABASE NORMALIZATION Normalization: process of efficiently organizing data in the DB. RELATIONS (attributes grouped together) Accurate representation of data, relationships and constraints. Goal: - Eliminate
Chapter 6 Experiment Process
Chapter 6 Process ation is not simple; we have to prepare, conduct and analyze experiments properly. One of the main advantages of an experiment is the control of, for example, subjects, objects and instrumentation.
Kenken For Teachers. Tom Davis [email protected] http://www.geometer.org/mathcircles June 27, 2010. Abstract
Kenken For Teachers Tom Davis [email protected] http://www.geometer.org/mathcircles June 7, 00 Abstract Kenken is a puzzle whose solution requires a combination of logic and simple arithmetic skills.
Mathematical Induction
Mathematical Induction In logic, we often want to prove that every member of an infinite set has some feature. E.g., we would like to show: N 1 : is a number 1 : has the feature Φ ( x)(n 1 x! 1 x) How
Chapter 17. Orthogonal Matrices and Symmetries of Space
Chapter 17. Orthogonal Matrices and Symmetries of Space Take a random matrix, say 1 3 A = 4 5 6, 7 8 9 and compare the lengths of e 1 and Ae 1. The vector e 1 has length 1, while Ae 1 = (1, 4, 7) has length
From Workflow Design Patterns to Logical Specifications
AUTOMATYKA/ AUTOMATICS 2013 Vol. 17 No. 1 http://dx.doi.org/10.7494/automat.2013.17.1.59 Rados³aw Klimek* From Workflow Design Patterns to Logical Specifications 1. Introduction Formal methods in software
Sudoku puzzles and how to solve them
Sudoku puzzles and how to solve them Andries E. Brouwer 2006-05-31 1 Sudoku Figure 1: Two puzzles the second one is difficult A Sudoku puzzle (of classical type ) consists of a 9-by-9 matrix partitioned
Chapter 6. Cuboids. and. vol(conv(p ))
Chapter 6 Cuboids We have already seen that we can efficiently find the bounding box Q(P ) and an arbitrarily good approximation to the smallest enclosing ball B(P ) of a set P R d. Unfortunately, both
Stochastic Inventory Control
Chapter 3 Stochastic Inventory Control 1 In this chapter, we consider in much greater details certain dynamic inventory control problems of the type already encountered in section 1.3. In addition to the
Business Process Measurement in small enterprises after the installation of an ERP software.
Business Process Measurement in small enterprises after the installation of an ERP software. Stefano Siccardi and Claudia Sebastiani CQ Creativiquadrati snc, via Tadino 60, Milano, Italy http://www.creativiquadrati.it
OPRE 6201 : 2. Simplex Method
OPRE 6201 : 2. Simplex Method 1 The Graphical Method: An Example Consider the following linear program: Max 4x 1 +3x 2 Subject to: 2x 1 +3x 2 6 (1) 3x 1 +2x 2 3 (2) 2x 2 5 (3) 2x 1 +x 2 4 (4) x 1, x 2
Supporting the BPM lifecycle with FileNet
Supporting the BPM lifecycle with FileNet Mariska Netjes Hajo A. Reijers Wil. M.P. van der Aalst Outline Introduction Evaluation approach Evaluation of FileNet Conclusions Business Process Management Supporting
cons of the handbook, and uniformity and professionalism. 3. telephone interviews with two other organisations involved in youth probation, the Child
SUMMARY Background and objective of the study A study of the Research and Documentation Centre of the Dutch Ministry of Justice (WODC) of 2002 showed that the working method of youth probation services
Lecture 3: Finding integer solutions to systems of linear equations
Lecture 3: Finding integer solutions to systems of linear equations Algorithmic Number Theory (Fall 2014) Rutgers University Swastik Kopparty Scribe: Abhishek Bhrushundi 1 Overview The goal of this lecture
Duality in Linear Programming
Duality in Linear Programming 4 In the preceding chapter on sensitivity analysis, we saw that the shadow-price interpretation of the optimal simplex multipliers is a very useful concept. First, these shadow
2. Argument Structure & Standardization
2. Argument Structure & Standardization 1 Some Review So, we have been looking at arguments: What is and is not an argument. The main parts of an argument. How to identify one when you see it. In the exercises
Neutrality s Much Needed Place In Dewey s Two-Part Criterion For Democratic Education
Neutrality s Much Needed Place In Dewey s Two-Part Criterion For Democratic Education Taylor Wisneski, Kansas State University Abstract This paper examines methods provided by both John Dewey and Amy Gutmann.
Supporting the BPM life-cycle with FileNet
Supporting the BPM life-cycle with FileNet Mariska Netjes, Hajo A. Reijers, Wil M.P. van der Aalst Eindhoven University of Technology, Department of Technology Management, PO Box 513, NL-5600 MB Eindhoven,
Special Situations in the Simplex Algorithm
Special Situations in the Simplex Algorithm Degeneracy Consider the linear program: Maximize 2x 1 +x 2 Subject to: 4x 1 +3x 2 12 (1) 4x 1 +x 2 8 (2) 4x 1 +2x 2 8 (3) x 1, x 2 0. We will first apply the
Writing Thesis Defense Papers
Writing Thesis Defense Papers The point of these papers is for you to explain and defend a thesis of your own critically analyzing the reasoning offered in support of a claim made by one of the philosophers
BIS 3106: Business Process Management. Lecture Two: Modelling the Control-flow Perspective
BIS 3106: Business Process Management Lecture Two: Modelling the Control-flow Perspective Makerere University School of Computing and Informatics Technology Department of Computer Science SEM I 2015/2016
CRITICAL PATH ANALYSIS AND GANTT CHARTS
CRITICAL PATH ANALYSIS AND GANTT CHARTS 1. An engineering project is modelled by the activity network shown in the figure above. The activities are represented by the arcs. The number in brackets on each
Towards Cross-Organizational Process Mining in Collections of Process Models and their Executions
Towards Cross-Organizational Process Mining in Collections of Process Models and their Executions J.C.A.M. Buijs, B.F. van Dongen, W.M.P. van der Aalst Department of Mathematics and Computer Science, Eindhoven
Supporting the Workflow Management System Development Process with YAWL
Supporting the Workflow Management System Development Process with YAWL R.S. Mans 1, W.M.P. van der Aalst 1 Department of Mathematics and Computer Science, Eindhoven University of Technology, P.O. ox 513,
Towards a Software Framework for Automatic Business Process Redesign Marwa M.Essam 1, Selma Limam Mansar 2 1
ACEEE Int. J. on Communication, Vol. 02, No. 03, Nov 2011 Towards a Software Framework for Automatic Business Process Redesign Marwa M.Essam 1, Selma Limam Mansar 2 1 Faculty of Information and Computer
It all depends on independence
Working Papers Institute of Mathematical Economics 412 January 2009 It all depends on independence Daniel Eckert and Frederik Herzberg IMW Bielefeld University Postfach 100131 33501 Bielefeld Germany email:
Advanced Relational Database Design
APPENDIX B Advanced Relational Database Design In this appendix we cover advanced topics in relational database design. We first present the theory of multivalued dependencies, including a set of sound
The phrases above are divided by their function. What is each section of language used to do?
Functional language for IELTS Speaking correction and brainstorming Work in pairs to correct all the phrases below. I have ever I have personally experience of this. My most favourite is I prefer than
Normalization of Database
Normalization of Database UNIT-4 Database Normalisation is a technique of organizing the data in the database. Normalization is a systematic approach of decomposing tables to eliminate data redundancy
Structural Detection of Deadlocks in Business Process Models
Structural Detection of Deadlocks in Business Process Models Ahmed Awad and Frank Puhlmann Business Process Technology Group Hasso Plattner Institut University of Potsdam, Germany (ahmed.awad,frank.puhlmann)@hpi.uni-potsdam.de
Normalization in Database Design
in Database Design Marek Rychly [email protected] Strathmore University, @ilabafrica & Brno University of Technology, Faculty of Information Technology Advanced Databases and Enterprise Systems 14
Software development process
OpenStax-CNX module: m14619 1 Software development process Trung Hung VO This work is produced by OpenStax-CNX and licensed under the Creative Commons Attribution License 2.0 Abstract A software development
The four [10,5,4] binary codes
1 Preliminaries The four [10,,] binary codes There are four distinct [10; ; ] binary codes. We shall prove this in a moderately elementary way, using the MacWilliams identities as the main tool. (For the
Kant s deontological ethics
Michael Lacewing Kant s deontological ethics DEONTOLOGY Deontologists believe that morality is a matter of duty. We have moral duties to do things which it is right to do and moral duties not to do things
If it's in the 2nd NF and there are no non-key fields that depend on attributes in the table other than the Primary Key.
Normalization First Normal Form (1st NF) The table cells must be of single value. Eliminate repeating groups in individual tables. Create a separate table for each set of related data. Identify each set
French Scheme CSPN to CC Evaluation
French Scheme CSPN to CC Evaluation Antoine COUTANT ITSEF AMOSSYS 4 bis allée du bâtiment 35000 Rennes [email protected] Abstract. Since 2008, French certication body created a new scheme for
Justice and Ethics. Jimmy Rising. October 18, 2002
Justice and Ethics Jimmy Rising October 18, 2002 1 Introduction Utilitarianism is an ethical system. John Stuart Mill s use of Utilitarianism to determine what is just and what is injustice may seem natural,
Business Process Modeling
Business Process Concepts Process Mining Kelly Rosa Braghetto Instituto de Matemática e Estatística Universidade de São Paulo [email protected] January 30, 2009 1 / 41 Business Process Concepts Process
Handling Big(ger) Logs: Connecting ProM 6 to Apache Hadoop
Handling Big(ger) Logs: Connecting ProM 6 to Apache Hadoop Sergio Hernández 1, S.J. van Zelst 2, Joaquín Ezpeleta 1, and Wil M.P. van der Aalst 2 1 Department of Computer Science and Systems Engineering
Notes on Orthogonal and Symmetric Matrices MENU, Winter 2013
Notes on Orthogonal and Symmetric Matrices MENU, Winter 201 These notes summarize the main properties and uses of orthogonal and symmetric matrices. We covered quite a bit of material regarding these topics,
Business Process Management Demystified: A Tutorial on Models, Systems and Standards for Workflow Management
Business Process Management Demystified: A Tutorial on Models, Systems and Standards for Workflow Management Wil M.P. van der Aalst Department of Technology Management Eindhoven University of Technology
CS 377 Database Systems. Database Design Theory and Normalization. Li Xiong Department of Mathematics and Computer Science Emory University
CS 377 Database Systems Database Design Theory and Normalization Li Xiong Department of Mathematics and Computer Science Emory University 1 Relational database design So far Conceptual database design
Lab 11. Simulations. The Concept
Lab 11 Simulations In this lab you ll learn how to create simulations to provide approximate answers to probability questions. We ll make use of a particular kind of structure, called a box model, that
EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES. Nataliya Golyan, Vera Golyan, Olga Kalynychenko
380 International Journal Information Theories and Applications, Vol. 18, Number 4, 2011 EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES Nataliya Golyan, Vera Golyan, Olga Kalynychenko
Process Modeling Notations and Workflow Patterns
Process Modeling Notations and Workflow Patterns Stephen A. White, IBM Corp., United States ABSTRACT The research work of Wil van der Aalst, Arthur ter Hofstede, Bartek Kiepuszewski, and Alistair Barros
THE DIMENSION OF A VECTOR SPACE
THE DIMENSION OF A VECTOR SPACE KEITH CONRAD This handout is a supplementary discussion leading up to the definition of dimension and some of its basic properties. Let V be a vector space over a field
ECON 459 Game Theory. Lecture Notes Auctions. Luca Anderlini Spring 2015
ECON 459 Game Theory Lecture Notes Auctions Luca Anderlini Spring 2015 These notes have been used before. If you can still spot any errors or have any suggestions for improvement, please let me know. 1
RUP and XP, Part I: Finding Common Ground
RUP and XP, Part I: Finding Common Ground by Gary Pollice Evangelist, The Rational Unified Process Rational Software extreme Programming (XP) is hot! Attend any software development conference today and
Notes on Complexity Theory Last updated: August, 2011. Lecture 1
Notes on Complexity Theory Last updated: August, 2011 Jonathan Katz Lecture 1 1 Turing Machines I assume that most students have encountered Turing machines before. (Students who have not may want to look
Generation of a Set of Event Logs with Noise
Generation of a Set of Event Logs with Noise Ivan Shugurov International Laboratory of Process-Aware Information Systems National Research University Higher School of Economics 33 Kirpichnaya Str., Moscow,
COMPUTER AUTOMATION OF BUSINESS PROCESSES T. Stoilov, K. Stoilova
COMPUTER AUTOMATION OF BUSINESS PROCESSES T. Stoilov, K. Stoilova Computer automation of business processes: The paper presents the Workflow management system as an established technology for automation
COMPUTING PRACTICES ASlMPLE GUIDE TO FIVE NORMAL FORMS IN RELATIONAL DATABASE THEORY
COMPUTING PRACTICES ASlMPLE GUIDE TO FIVE NORMAL FORMS IN RELATIONAL DATABASE THEORY W LL AM KErr International Business Machines Corporation Author's Present Address: William Kent, International Business
Practical Guide to the Simplex Method of Linear Programming
Practical Guide to the Simplex Method of Linear Programming Marcel Oliver Revised: April, 0 The basic steps of the simplex algorithm Step : Write the linear programming problem in standard form Linear
Lecture 2 Normalization
MIT 533 ระบบฐานข อม ล 2 Lecture 2 Normalization Walailuk University Lecture 2: Normalization 1 Objectives The purpose of normalization The identification of various types of update anomalies The concept
Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts
Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts Marian Benner, Matthias Book, Tobias Brückmann, Volker Gruhn, Thomas Richter, Sema Seyhan paluno The Ruhr Institute
