Computer Science ›› 2019, Vol. 46 ›› Issue (9): 303-309.doi: 10.11896/j.issn.1002-137X.2019.09.046

• Interdiscipline & Frontier • Previous Articles     Next Articles

Analysis of Interactive Process Change Propagation Based on Configuration

ZHAN Yue, FANG Xian-wen, WANG Li-li   

  1. (School of Mathematics and Big Data,Anhui University of Science and Technology,Huainan,Anhui 232000,China)
  • Received:2018-07-11 Online:2019-09-15 Published:2019-09-02

Abstract: Change propagation is one of the core of the business management system,and aims at adapting flexibly to changing business requirements.However,the existing change propagation mainly deals with the problem of the change region between similar processes extended by a single business process,and it is difficult to study the interactive process with information transfer.A method was proposed to analyze interactive process change propagation based on configuration.Based on the location of the change region,the configuration technology is used to improve the intra-region beha-vior relationship.In the case of the corresponding source change region locked by a given change demand,choreography and conditional abstraction are used to find target change region affected by changes in other interactive sub-processes.And the configuration was utilized to deal with the change behavior of constraints in the region under the principle of ensuring the consistency of the extra-region structure.Then,the rationality of the configured interactive process model was detected by compatibility.Finally,the feasibility of the method was verified by a specific case.

Key words: Change propagation, Change region, Change types, Choreography, Configuration

CLC Number: 

  • TP391.9
[1]GROSSMANN G,MAFAZI S.Change Propagation and Conflict Resolution for the Co-Evolution of Business Processes [J].International Journal of Cooperative Information Systems,2015,12(8):102-140.
[2]WEIDLICH M,WESKE M,MENDLING J.Change Propagation in Process Models using Behavioral Profiles [J].IEEE International Conference on Services Computing,2009,10(8):33-40.
[3]WEIDLICH M,MENDLING J,WESKE M.Propagating changes between aligned process models[J].Journal of Systems & Software,2012,85(8):1885-1898.
[4]GUPTA C,SINGH Y,SINGH D.A Dynamic Approach to Estimate Change Impact using Type of Change Propagation [J].Journal of Information Processing Systems,2010,4(6):597-608.
[5]GROSSMANN G,MAFAZI S.Change Propagation and Conflict Resolution for the Co-Evolution of Business Processes [J].International Journal of Cooperative Information Systems,2015,12(8):102-140.
[6]VAN D A W M P,DUMAS M,GOTTSCHALK F,et al.Preserving correctness during business process model configuration[J].Formal Aspects of Computing,2010,22(3/4):459-482.
[7]BONFIGLIO S,ALBANI L.Managing Configurable BusinessProcess as a Service to Satisfy Client Transactional Requirements[C]//IEEE International Conference on Services Computing.IEEE,2015:154-161.
[8]ASSY N,CHAN N N,GAALOUL W.An Automated Approach for Assisting the Design of Configurable Process Models[J].IEEE Transactions on Services Computing,2015,8(6):874-888.
[9]DÖHRING M,REIJERS H,SMIRNOV S.Configuration vs.Adaptation for Business Process Variant Maintenance:An Empirical Study [J].Information Systems,2014,39(6):108-133.
[10]DERGUECH W,BHIRI S,CURRY E.Designing Business Capability-Aware Configurable Process Models[J].Information Systems,2017,72(6):77-94.
[11]FDHILA W,INDIONO C,RINDERLE-MA S,et al.Dealingwith change in process choreographies:Design and implementation of propagation algorithms[J].Information Systems,2015,49(4):1-24.
[12]VAN D A W M P,DUMAS M,GOTTSCHALK F,et al.Preserving correctness during business process model configuration[J].Formal Aspects of Computing,2010,22(3/4):459-482.
[13]SALAY R,GORZNY J,CHECHIK M.Change Propagation due to Uncertainty Change [C]//International Conference on Fundamental Approaches To Software Engineering.Springer-Verlag,2013:21-36.
[14]DEMUTH A,RIEL M.Co-evolution of Metamodels and Models through Consistent Change Propagation[J].The Journal of Systems and Software,2016,11(5):281-297.
[15]GERBEC M.Safety Change Management-A new Method for Integrated Management of Organizational and technical changes[J].Safety Science,2016,7(6):22-31.
[1] ZHANG Geng-qiang, XIE Jun, YANG Zhang-lin. Accelerating Forwarding Rules Issuance with Fast-Deployed-Segment-Routing(FDSR) in SD-MANET [J]. Computer Science, 2022, 49(2): 377-382.
[2] ZHANG Deng-ke, WANG Xing-wei, HE Qiang, ZENG Rong-fei, YI bo. State-of-the-art Survey on Reconfigurable Data Center Networks [J]. Computer Science, 2021, 48(3): 246-258.
[3] CHEN Li-feng, ZHU Lu-ping. Encrypted Dynamic Configuration Method of FPGA Based on Cloud [J]. Computer Science, 2020, 47(7): 278-281.
[4] BAI Wei, PAN Zhi-song, XIA Shi-ming, CHENG Ang-xuan. Network Security Configuration Generation Framework Based on Genetic Algorithm Optimization [J]. Computer Science, 2020, 47(5): 306-312.
[5] ZHU Li-hua, WANG Ling, TANG Qi, WEI Ji-bo. Efficient MILP Model for HW/SW Partitioning of Dynamic Partial Reconfigurable SoC [J]. Computer Science, 2020, 47(4): 18-24.
[6] ZHANG Bin-bin, WANG Juan, YUE Kun, WU Hao, HAO Jia. Performance Prediction and Configuration Optimization of Virtual Machines Based on Random Forest [J]. Computer Science, 2019, 46(9): 85-92.
[7] ZHANG Yu-pei, ZHAO Zhi-jin, ZHENG Shi-lian. Cognitive Decision Engine of Hybrid Learning Differential Evolution and Particle Swarm Optimization [J]. Computer Science, 2019, 46(6): 95-101.
[8] CHANG Xiao-lin, FAN Yong-wen, ZHU Wei-jun, LIU Yang. Management Information System Based on Mimic Defense [J]. Computer Science, 2019, 46(11A): 438-441.
[9] YING Li, FANG Xian-wen, WANG Li-li, LIU Xiang-wei. Change Region Analysis of Configurable Business Process Model Based on Business Capability [J]. Computer Science, 2019, 46(10): 322-328.
[10] LI Zhen-tao, MENG Xiang-ru , ZHAO Zhi-yuan, SU Yu-ze. Virtual Network Reconfiguration Algorithm for Nodes Load Balancing [J]. Computer Science, 2018, 45(7): 95-98.
[11] LIAO Hu-sheng, HUANG Shan-shan, XU Jun-gang, LIU Ren-feng. Survey on Performance Optimization Technologies for Spark [J]. Computer Science, 2018, 45(7): 7-15.
[12] HE Lu-lu, FANG Huan. Change Propagation Method of Service-oriented Business Process Model with Data Flows Based on Petri Net [J]. Computer Science, 2018, 45(6A): 545-548.
[13] RAN Zheng, LUO Lei, YAN Hua and LI Yun. Study on Automatic Method for AUTOSAR Runnable Entity-task Mapping [J]. Computer Science, 2018, 45(4): 190-195.
[14] GAO Ya-nan, FANG Xian-wen and WANG Li-li. Optimized Analysis of Business Process Configuration Based on Petri Net Behavior Closeness [J]. Computer Science, 2017, 44(Z6): 539-542.
[15] WANG Wen-juan, DU Xue-hui, WANG Na and SHAN Di-bin. Review on Security Audit Technology for Cloud Computing [J]. Computer Science, 2017, 44(7): 16-20.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!