41 Hits in 6.0 sec

Automated Error Correction of Business Process Models [chapter]

Mauro Gambini, Marcello La Rosa, Sara Migliorini, Arthur H. M. Ter Hofstede
2011 Lecture Notes in Computer Science  
We present a novel technique for automatic error correction in process models based on simulated annealing.  ...  As order dependencies between process tasks can get complex, it is easy to make mistakes in process model design, especially behavioral ones such as deadlocks.  ...  required to correct a faulty service in order to interact in a choreography without deadlocks.  ... 
doi:10.1007/978-3-642-23059-2_14 fatcat:dbj6mwgfuvghfnh5byqasplv5y

Measuring the compatibility of service interaction protocols

Meriem Ouederni, Gwen Salaün, Ernesto Pimentel
2011 Proceedings of the 2011 ACM Symposium on Applied Computing - SAC '11  
In this paper, we propose a generic flooding-based techniques for measuring the compatibility degree of service protocols.  ...  Although service compatibility has been intensively studied, in particular for discovery purposes, most of existing works return a Boolean result.  ...  [12] extends the simulation algorithm given in [21] in order to correct deadlocking choreographies.  ... 
doi:10.1145/1982185.1982516 dblp:conf/sac/OuederniSP11 fatcat:yfpsdtijxfbcdchazrz6iosd7a

BPMN: An introduction to the standard

Michele Chinosi, Alberto Trombetta
2012 Computer Standards & Interfaces  
We give an assessment of how the OMG's BPMN standard is perceived and used by practitioners in everyday business process modeling chores.  ...  of, from cuisine recipes to the Nobel Prize assignment process, incident management, e-mail voting systems, travel booking procedures, to name a few.  ...  Although XPDL is an XML-based language, it has been mostly used in two application domains: to check the correctness of a BPMN diagram and to simulate process execution.  ... 
doi:10.1016/j.csi.2011.06.002 fatcat:7szc73ehinfp3gd4ztqzjidsli

Privacy preserving business process matching

Dilian Gurov, Peeter Laud, Roberto Guanciale
2015 2015 13th Annual Conference on Privacy, Security and Trust (PST)  
We propose a measure for similarity between service automata and use this measure to devise an algorithm that constructs the most similar automaton to the first one that can interoperate with the second  ...  Business process matching is the activity of checking whether a given business process can interoperate with another one in a correct manner.  ...  ACKNOWLEDGMENT The authors are indebted to Karsten Wolf for useful discussions in the early stages of this work.  ... 
doi:10.1109/pst.2015.7232952 dblp:conf/pst/GurovLG15 fatcat:qmu62wawazd4pp4aw7lxppxwyy

Business Process Management: A Comprehensive Survey

Wil M. P. van der Aalst
2013 ISRN Software Engineering  
Process models may be used to configure information systems, but may also be used to analyze, understand, and improve the processes they describe.  ...  In BPM the concept of a process model is fundamental.  ...  To determine the similarity between activity names in different models one can use naïve approaches such as the string edit distance [230] or linguistic similarity (e.g., similarity based on WordNet  ... 
doi:10.1155/2013/507984 fatcat:nbrcrvwnwnh6rgttbyj7vy4xhm

Correctness of services and their composition

Niels Lohmann
We study correctness of services and their composition and investigate how the design of correct service compositions can be systematically supported.  ...  We thereby focus on the communication protocol of the service and approach these questions using formal methods and make contributions to three scenarios of SOC.  ...  We shall introduce a graph-based approach to calculate the minimal edit distance between a given defective service and synthesized correct services.  ... 
doi:10.18453/rosdok_id00000716 fatcat:fml7wl5dabawvpywktyg6rv5ca

Diagnosing and Measuring Incompatibilities between Pairs of Services [chapter]

Ali Aït-Bachir, Marie-Christine Fauvet
2009 Lecture Notes in Computer Science  
A visual report of the comparison analysis is also provided which pinpoints a set of incompatibilities that cause a behavioural interface not to simulate another one. ⋆ This work is partially funded by  ...  This text presents a tool, from its design to its implementation, which detects all behavioural incompatibilities between two service interfaces.  ...  Other algorithms based on graph-edit distances have been applied to service discovery in [8] , but do not pinpoint behavioural differences between services.  ... 
doi:10.1007/978-3-642-03573-9_18 fatcat:lh7ih7umg5ehpnfgyepicqjlc4

Eighth Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools, Aarhus, Denmark, October 22-24, 2007

Kurt Jensen
2007 DAIMI Report Series  
This booklet contains the proceedings of the Eighth Workshop on Practical Use of Coloured Petri Nets and the CPN Tools, October 22-24, 2007.  ...  Acknowledgements We would like to thank Lisa Wells and Kurt Jensen for their support in using CPN Tools. Also, we would like to thank Michael Westergaard for his support in using the BRITnEY tool.  ...  We are also very grateful to the anonymous reviewers for their constructive comments that helped us to improve the paper.  ... 
doi:10.7146/dpb.v36i584.7197 fatcat:fmzu5qetpnd6dpflqsuggbt7mm

Crawler [chapter]

Kenneth A. Ross, Christian S. Jensen, Richard Snodgrass, Curtis E. Dyreson, Christian S. Jensen, Richard Snodgrass, Spiros Skiadopoulos, Cristina Sirangelo, Mary Lynette Larsgaard, Gösta Grahne, Daniel Kifer, Hans-Arno Jacobsen (+106 others)
2009 Encyclopedia of Database Systems  
This knowledge can be used to ensure that the algorithms have good temporal and/or spatial locality on the target platform.  ...  As a result, it is common (at the time of writing) for data accesses to RAM to require several hundred CPU cycles to resolve.  ...  The edit, or Levenshtein, distance, is an extension of the Hamming distance, and is typically used for measuring the distance between two strings of characters.  ... 
doi:10.1007/978-0-387-39940-9_2315 fatcat:x4qspjdytvhvroc7h753dihp7u

Multi-agent Approach for Managing Workflows in an Inter-Cloud Environment [chapter]

Sofiane Bendoukha
2014 Lecture Notes in Computer Science  
The Cloud technology offers several attractive features for a number of applications.  ...  New modeling techniques and tools based on Petri net formalisms are provided.  ...  The aim of the work is to translate each OWL-S service to a Petri net and to use it for checking the correctness of its choreography model and/or for facilitating agents (or clients) to coordinate the  ... 
doi:10.1007/978-3-319-06859-6_48 fatcat:bhimsecfh5fgxgmoff4iaaakt4

On Utilizing Web Service Equivalence for Supporting the Composition Life Cycle

Stefanie Rinderle-Ma, Manfred Reichert, Martin Jurisch
2011 International Journal of Web Services Research  
Deciding on web service equivalence in process-aware service compositions is a crucial challenge throughout the composition life cycle.  ...  Altogether this paper shall contribute a new understanding and treatment of equivalence notions in service compositions.  ...  The edit distance (Wombacher & Rozie, 2006) is also used to measure the difference between traces; the sum of them represents the differences of two process models.  ... 
doi:10.4018/jwsr.2011010103 fatcat:5lmzk2e7uvhgvad4ut4pr7bgqm

Execution Models [chapter]

2006 Service-Oriented Computing  
-A simulation of issuing the item to the customer. -A simulation of sending a debit entry to the credit card company. -A simulation of reordering items.  ...  Moreover, system-wide deadlocks are also possible when the local sites use pessimistic, i.e., lock-based, serialization approaches.  ...  The Web Service Choreography Interface is a specification for organizing the interactions of Web services. WSCL.  ... 
doi:10.1002/0470091509.ch10 fatcat:2jdemglma5gtre5xkxtzck45am

Conformance checking of processes based on monitoring real behavior

A. Rozinat, W.M.P. van der Aalst
2008 Information Systems  
To operationalize the ideas presented in this paper a Conformance Checker has been implemented within the ProM framework, and it has been evaluated using artificial and real-life event logs.  ...  Appropriateness can be evaluated from both a structural and a behavioral perspective.  ...  However, this metric can only be used as a comparative means for process models that exhibit equivalent behavior (because it is only based on the graph size of the model).  ... 
doi:10.1016/ fatcat:wwqqeqsj75fftlbg3idfhew334

To the Editor

Jeremy I Simon, Harla K O'Donnell, Zachary Broyer
2017 Pain medicine (Malden, Mass.)  
This research will also investigate how location information from a GPS receiver can be used and efficiently incorporated into sosMesh to provide more accurate and faster localisation of the trapped person  ...  Acknowledgments The authors thank colleagues in the Simulation and Visualization Group, Department of Computer Science, University of Hull for valuable discussions and technical assistance.  ...  We have developed a novel approach which uses a graph-based layout algorithm to present this information in a human-readable form.  ... 
doi:10.1093/pm/pnx150 pmid:29016898 fatcat:pao75lxgbvg3hkyhod262f5ebe

Behavioral service substitution [article]

Jarungjit Parnjai, Humboldt-Universität Zu Berlin, Humboldt-Universität Zu Berlin
We study the behavioral aspect of correct interaction between services and concentrate on two variants of deadlock freedom as correctness criteria of service substitution.  ...  We systematically investigate the relationship between a service and all its partners under a given correctness criterion and employ this relationship to synthesize from a given service its canonical partner  ...  To correct a detected error of a service in a service choreography, Lohmann [2008a] has proposed the simulation-based graph edit distance approach to compute edit actions that are necessary to repair  ... 
doi:10.18452/16725 fatcat:cj5n47etknhhvnwlsxtc77paue
« Previous Showing results 1 — 15 out of 41 results