8,504 Hits in 1.8 sec

Discovering models of behavior for concurrent workflows

Jonathan E. Cook, Zhidian Du, Chongbing Liu, Alexander L. Wolf
2004 Computers in industry (Print)  
Understanding the dynamic behavior of a workflow is crucial for being able to modify, maintain, and improve it. A particularly difficult aspect of some behavior is concurrency.  ...  This paper presents techniques to discover patterns of concurrent behavior from traces of workflow events. The techniques are based on a probabilistic analysis of the event traces.  ...  The content of the information does not necessarily reflect the position or the policy of the Government and no official endorsement should be inferred.  ... 
doi:10.1016/j.compind.2003.10.005 fatcat:sbhdiejwafe5ppuohhg64tcnja

Mining and Improving Composite Web Services Recovery Mechanisms

Sami Bhiri, Walid Gaaloul, Claude Godart
2008 International Journal of Web Services Research  
Basically, we propose a set of mining techniques to discover CS transactional behavior from an event based log.  ...  First, we discover the effective recovery mechanisms (transactional flow) of the composite service. Then, we use a set of rules in order to improve its composition model.  ...  They propose techniques to discover workflow models expressed in their own desired workflow modeling notation, which is based on Petri nets.  ... 
doi:10.4018/jwsr.2008040102 fatcat:6oplwcg6efdqdbl3t2ku3gwfqm

Process mining: a research agenda

W.M.P. van der Aalst, A.J.M.M. Weijters
2004 Computers in industry (Print)  
Technologies such as Workflow Management (WFM), Enterprise Application Integration (EAI), Enterprise Resource Planning (ERP), and Web Services (WS) typically focus on the realization of IT support rather  ...  In this paper, we try to put the topic of process mining into context, discuss the main issues around process mining, and finally we introduce the papers in this special issue.  ...  Discovering Models of Behavior for Concurrent Workflows The focus of the paper of Jonathan Cook, Zhidian Du, Chongbing Liu, and Alexander Wolf is on concurrent behavior of processes.  ... 
doi:10.1016/j.compind.2003.10.001 fatcat:areplhnmu5cnxcxocifypwqpbi

The Functional Similarity Computing for Service Workflow using Temporal Behaviors Verification

Xiaoxian Yang, Tao Yu, Huahu Xu
2016 International Journal of u- and e- Service, Science and Technology  
Then, it proposes automaton model to formalize behaviors and interactions of new workflow.  ...  The other workflow is transformed into automaton model for automatic verification against a set of temporal logics formulae.  ...  the same behavior ratio for each workflow.  ... 
doi:10.14257/ijunesst.2016.9.10.35 fatcat:b7oo5mu5dbb55loukqipg353fy

Mining program workflow from interleaved traces

Jian-Guang Lou, Qiang Fu, Shengqi Yang, Jiang Li, Bin Wu
2010 Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '10  
Different from existing workflow mining algorithms, our approach can construct concurrent workflows from traces of interleaved events.  ...  Our workflow mining approach is a three-step coarse-to-fine algorithm. At first, we mine temporal dependencies for each pair of events.  ...  For example, we can construct a DFA to mimic the behaviors of a DAG based model.  ... 
doi:10.1145/1835804.1835883 dblp:conf/kdd/LouFYLW10 fatcat:mvrmypbdnngcpfvjmetg4iiiyu

Current Trends in Workflow Mining

L K Ajayi, A A Azeta, I T Owolabi, O O Damilola, F Chidozie, A E Azeta, O Amosu
2019 Journal of Physics, Conference Series  
There is need to make appropriate selection for a good mining algorithm to avoid any setback and understanding the organization business workflow processes for business design, modeling, resource strategy  ...  The resulting insights provides a foundation for such workflow mining algorithms necessary for improving business processes schemes as well as for the effectiveness of future services and application  ...  Acknowledgement In this study, we would like to express our deep appreciation for the support and sponsorship provided by Covenant University Centre for Research, Innovation and Discovery (CUCRID).  ... 
doi:10.1088/1742-6596/1299/1/012036 fatcat:bordy7pjsvfofbxzqimg6eedky

Application of Workflow Technology for Big Data Analysis Service

Bin Zhang, Le Yu, Yunbo Feng, Lijun Liu, Shuai Zhao
2018 Applied Sciences  
This study elucidates the architecture and application modeling, customization, dynamic construction, and scheduling of a cloud workflow system.  ...  Users can rend cloud capabilities and customize a set of big data analysis applications in the form of workflow processes.  ...  The analysis can build analysis models and discover the malicious attack behaviors. Table 1 demonstrates part of the behavior features of web attacks.  ... 
doi:10.3390/app8040591 fatcat:hlf7ekmcgjahll6ewrt3t5ivy4

Analyzing Artifact Anomalies in a Temporal Structural Workflow for SBS

Feng-Jian Wang, Parameswaramma Mandalapu
2014 2014 IEEE 38th International Computer Software and Applications Conference Workshops  
In this paper, we re-define the anomalous behaviors and develop an approach to discover artifact anomalies in a TS workflow.  ...  In other word, they are less effective in a temporal structural workflow (TS workflow). Neither for SBS. Besides, the time complexity of these methods are NP, not efficient either.  ...  [13] Introduced a model to describe the artifact behavior in a workflow to improve the efficiency of the work in [12] .  ... 
doi:10.1109/compsacw.2014.81 dblp:conf/compsac/WangM14 fatcat:d5iiiydypnahvdclgud2fqegxq

Rediscovering workflow models from event-based data using little thumb

A.J.M.M. Weijters, W.M.P van der Aalst
2003 Integrated Computer-Aided Engineering  
Therefore, we propose a technique for rediscovering workflow models. T his technique uses workflow logs to discover the workflow process as it is actually being executed.  ...  Section 3 introduces some preliminaries including a modeling language for workflow processes and the definition of a workflow log.  ...  Compared to existing work we focus on workflow processes with concurrent behavior, i.e., detecting concurrency is one of our prime concerns [ 25] .  ... 
doi:10.3233/ica-2003-10205 fatcat:fh547ombmbfynbkx63anc4tgo4

Workflow Mining: Discovering Loops in Process Models

V.R. Kavitha, R. Kavitha, N. Suresh Kumar
2011 International Journal of Computer Applications  
Because loops are the major concern for boundedness of any process model. This paper discusses about representing workflow model using Petri Nets and a method to identify loops.  ...  For identifying loops topological sorting is used. In the literature process logs are used to identify short loops of length two but the proposed algorithm identify loops of any length.  ...  Process Mining: Discovering Workflow Models from Event-Based Data. In B. Kr¨ose, M. de Rijke, G.  ... 
doi:10.5120/2591-3591 fatcat:jgeq3kyykbbkpkl6s75mfudqtq

Jadex: A Generic Programming Model and One-Stop-Shop Middleware for Distributed Systems

Alexander Pokahr, Lars Braubach, Kai Jander
2013 PIK - Praxis der Informationsverarbeitung und Kommunikation  
In addition, each component may possess an agent-like proactive behavior, specified using e.g. plain Java objects, reasoning engines for intelligent agents following the BDI (belief desire intention) model  ...  Features of Jadex that have proven especially useful in this scenario are the capability of modelling and executing distributed workflows in BPMN, automatically building an overlay network from different  ... 
doi:10.1515/pik-2013-0012 fatcat:5xcdoutstjfdbcdik5222p5yqy

A Survey on Workflow Verifications of Petri Nets based Service Process Management

Xiaoxian Yang, Tao Yu, Huahu Xu
2012 International Journal of Grid and Distributed Computing  
However, the workflow modeling method should be formalized for describing complex interactions of service process, mainly the representation of composite services and multidimensional modeling, for example  ...  The non-functional verification is to evaluate the performance of Petri Nets based workflow model ranging over timed constraints and probabilistic behaviors.  ...  Acknowledgments This paper is supported by Natural Science Foundation of Shanghai under Grant No. 15ZR1415200.  ... 
doi:10.14257/ijgdc.2015.8.6.09 fatcat:4oqtgzjla5azxhnerdv6oz7tq4

Discovering High-Level Process Models from Event Logs

Antonina A. Begicheva, Irina A. Lomazov
2017 Modelirovanie i Analiz Informacionnyh Sistem  
Here we present an algorithm for discovering high-level acyclic process models from event logs and some specified partition of low-level events into subsets associated with abstract events in a high-level  ...  In this paper we consider the problem of discovering a high-level business process model from a low-level event log, i.e. automatic synthesis of process models based on the information stored in event  ...  In this work we consider process models represented by workflow nets -a special class of Petri nets [3] for workflow modeling.  ... 
doi:10.18255/1818-1015-2017-2-125-140 fatcat:a2qe63upkzagbhc7l5wtpksgui

Mining process models with non-free-choice constructs

Lijie Wen, Wil M. P. van der Aalst, Jianmin Wang, Jiaguang Sun
2007 Data mining and knowledge discovery  
Although most real-life processes exhibit non-free-choice behavior, existing algorithms are unable to adequately deal with such constructs.  ...  Consider for example a hospital where the diagnosis and treatment activities are recorded in the hospital information system, but where healthcare professionals determine the "careflow".  ...  In [20] , the techniques based on a probabilistic analysis of the event traces are presented to discover patterns of concurrent behavior from these traces of workflow events.  ... 
doi:10.1007/s10618-007-0065-y fatcat:lprjbiwt75dy3nzgelpmjb25ue

Process Mining Versus Intention Mining [chapter]

Ghazaleh Khodabandelou, Charlotte Hug, Rebecca Deneckère, Camille Salinesi
2013 Lecture Notes in Business Information Processing  
Process mining aims to discover, enhance or check the conformance of activity-oriented process models from event logs. A new field of research, called intention mining, recently emerged.  ...  This paper aims to highlight the differences between these two fields of research and illustrates the use of mining techniques on a dataset of event logs, to discover an activity process model as well  ...  Later, [16, 17] proposed techniques for concurrency detection and a measure to quantify the variance between behaviors and process models. α-algorithm [12] .  ... 
doi:10.1007/978-3-642-38484-4_33 fatcat:xrcpntdxfbeg5l5pz37n63oyai
« Previous Showing results 1 — 15 out of 8,504 results