Computer Science ›› 2015, Vol. 42 ›› Issue (7): 129-133, 141.doi: 10.11896/j.issn.1002-137X.2015.07.028

Previous Articles     Next Articles

Automatic Configuration and Management of Business Process

WU Ya-zhou YANG Qi-fan JIANG Jian-min ZHANG Shi   

  • Online:2018-11-14 Published:2018-11-14

Abstract: A business process model can be configured to meet the specific requirements of the organization through the configuration.Automatic configuration activities need identifying variants of a process model which can be configured,while ensuring the correctness of this particular process model.However,there are few methods to solve this problem.This paper proposed an innovative approach for automatically separating a configurable process model into atomic and correct sub-process models without abnormal behavioral problems.Compared with existing approaches,our approach avoids independently handling the configuration activity and reduces computational complexity.Moreover,our approach is language-independent.

Key words: Configurable process models,Configuration,Atomic,Sub-process models

[1] Wil.M.P.van der Aalst,et al.Correctness Ensuring ProcessConfiguration:An Approach Based on Partner Synthesis[C]∥BPM.2010:95-111
[2] Wil.M.P.van der Aalst.Business Process Configuration in the Cloud:How to Support and Analyze Multi-tenant Process? [C]∥ECOWS.Lugano,Switzerland,2011:3-10
[3] Wil.M.P.van der Aalst,et al.Ensuring Correctness DuringProcess Configuration via partner synthesis[J].Information System,2012,7(6):574-592
[4] Wil.M.P.van der Aalst,et al.Preserving Correctness During Business Process Model Configuration[J].Formal Aspects of Computing,2010,2(3):459-482
[5] Wil.M.P.van der Aalst,et al.Correctness-Preserving Configuration of Business Process Models[J].Fundamental Approaches to Sofware Engineering Lecture Notes in Computer Science.2008,4961:46-61
[6] Becker J,et al.Adaptive Reference Modeling:Integrating Configurative and Generic Adaptation Techniques for Information Models.http://udoo.uni-muenster.ed/downloads/publications/1953.pdf
[7] Gottschalk F,et al.Configurable Workflow Models[J].IJCIS,2008,7(2):177-221 (下转第141页)(上接第133页)
[8] Hallberbach A,Bauer T,Reichert M.Guaranteeing Soundnessof Configurable Process Variants in Provop[C]∥CEC.IEEE, 2009:98-105
[9] Hallberbach A,Bauer T,Reichert M.Capturing Variability inBusiness Process Models:The Provop Approach[J].Journal of Software Maintenance and Evolution:Research and Practice,2010,2(6/7):519-546
[10] Haugen K E,Husa R K,Stolen R K.STAIRS towards formal design with sequence diagrams[J].Software and Systems Modeling,2005,4(4):355-367
[11] Rosa M L,Dumas M,Hofstede A T,et al.Configurable Multi-Perspective Business Process Models[J].Information Systems,2011,6(2):313-340
[12] Li C,Reichert M,Wombacher A.Discovering Reference Models by Mining Process Variants Using a Heuristic Approach[C]∥BPM.2009:344-362
[13] Li C,Reichert M,Wombacher A.The Minadept Clustering Approach for Discovering Reference Process Models Out of Process Variants[J].International Journational of Cooperative Information Systems,2010,9(3):159-203
[14] Schroeter J,Mucha P,Muth M,et al.Dynamic ConfigurationManagement of Cloud-based Applications[C]∥SPLC.2012:171-178
[15] Mietzner R,et al.Variability modeling to support customization and deployment of multi-tenant-aware software as a service applications[C]∥PESOS.2009:18-25
[16] Reinhartz-Berger I,et al.Organizational Reference Models:Supporting an Adequate Design of Local Business Processes[J].IJBPIM,2009,4(2):134-149
[17] Reinhartz-Berger I,et al.Extending the Adaptability of Refer-ence Models[J].IEEE Transactions on Systems,Man and Cybernetics (Part A),2011,40(5):1045-1056
[18] Rosemann M,Wil.M.P.van der Aalst.A Configurable Refer-ence Modeling Language[J].Information Systems,2007,2(1):1-23
[19] Ruehl S T,Andelfinger U.Applying software product lines to create customizable software-as-a-service applications[C]∥SPLC Workshops.2011:1-16
[20] Jiang Jian-min,Zhang Shi,Gong Ping,et al.Modeling and analyzing mixed communications in service-oriented trustworthy software[J].Science China Information Science,2012,5(12):2738-2756
[21] Jiang Jian-min,Zhang Shi,Gong Ping,et al.Message dependency-based adaptation of services[C]∥APSCC.2011:442-449
[22] Jiang Jian-min,Zhang Shi,Gong Ping,et al.Configuring Business Process Models[J].ACM SEN,Software Engineering Notes,2013(4)

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .