计算机科学 ›› 2021, Vol. 48 ›› Issue (7): 99-104.doi: 10.11896/jsjkx.200700125
所属专题: 大数据&数据科学 虚拟专题
陶小燕, 闫春钢, 刘关俊
摘要: 带有数据表的工作流网(WFT-net)用于验证业务流程的合理性,包括正确的行为逻辑和满足的数据需求。在某些情况下,静态数据精炼策略存在无法反映流程中所有可能执行路径的情况,这会导致检测正确率不理想等问题。为此,文中提出了一种新的动态数据精炼策略。首先,提出了在流程运行当前状态下评估与被写数据元素相关联的数据表和谓词状态的方法,捕捉数据流状态的实时变化,全面反映流程执行所有可达的状态,避免执行路径的丢失。此外,当流程执行陷入会导致数据流状态无限更新的循环时,通过适当调整赋值精炼规则的方式,来避免状态的无限延伸。然后,基于所有可能执行路径来检测流程的合理性。最后,在不同业务流程实例上的实验结果表明,该动态数据精炼策略能够有效提高合理性检测的正确率。
中图分类号:
[1]DUMAS M,LA ROSA M,MENDLING J,et al.Business process management [M].Berlin:Springer-Verlag,2013. [2]DEHNERT J,ZIMMERMANN A.On the suitability of correctness criteria for business process models[C]//International Conference on Business Process Management.Springer,Berlin,Heidelberg,2005:386-391. [3]VAN DER AALST W M P.Structural characterizations ofsound workflow nets [J].Computing science reports,1996,96(23):18-22. [4]CLEMPNER J B.Classical workflow nets and workflow nets with reset arcs:using Lyapunov stability for soundness verification[J].Journal of Experimental & Theoretical Artificial Intelligence,2017,29(1):43-57. [5]BI H H,ZHAO J L.Applying propositional logic to workflow verification [J].Information Technology and Management,2004,5(3/4):293-318. [6]BARKAOUI K,BEN AYED R,SBAI Z.Workflow soundness verification based on structure theory of Petri nets [J].International Journal of Computing and Information Sciences,2007,5(1):51-61. [7]COMBI C,OLIBONI B,WESKE M,et al.Conceptual modeling of inter-dependencies between processes and data[C]//Proceedings of the 33rd Annual ACM Symposium on Applied Computing.2018:110-119. [8]TSOURY A,SOFFER P,REINHARTZ B I.Towards impactanalysis of data in business processes[M]//Enterprise,Business-Process and Information Systems Modeling.Springer,Cham,2016:125-140. [9]SUN S X,ZHAO J L.Formal workflow design analytics using data flow modeling [J].Decision Support Systems,2013,55(1):270-283. [10]AWAD A,DECKER G,LOHMANN N.Diagnosing and repairing data anomalies in process models[C]//International Conference on Business Process Management.Springer,Berlin,Heidelberg,2009:5-16. [11]MEDA H S,SEN A K,BAGCHI A.Detecting data flow errors in workflows:A systematic graph traversal approach[C]//17th Annual Workshop on Information Technologies & Systems (WITS) Paper.2007. [12]SIDOROVA N,STAHL C,TRČKA N.Soundness verification for conceptual workflow nets with data:Early detection of errors with the most precision possible [J].Information Systems,2011,36(7):1026-1043. [13]BORREGO D,ESHUIS R,GÓMEZ-LÓPEZ M T,et al.Diagnosing correctness of semantic workflow models [J].Data & Knowledge Engineering,2013,87:167-184. [14]DE LEONI M,FELLI P,MONTALI M.A holistic approach for soundness verification of decision-aware process models[C]//International Conference on Conceptual Modeling.Springer,Cham,2018:219-235. [15]WANG Z X,WANG J M,ZHU X C,et al.Verification of workflow nets with transition conditions [J].Journal of Zhejiang University Science C,2012,13(7):483-509. [16]TAO X Y,LIU G J,YANG B,et al.Workflow nets with tables and their soundness [J].IEEE Transactions on Industrial Informatics,2019,16(3):1503-1515. [17]SMITH G,DERRICK J.Verifying data refinements using amodel checker [J].Formal Aspects of Computing,2006,18(3):264-287. |
[1] | 周琴, 罗飞, 丁炜超, 顾春华, 郑帅. 基于逐次超松弛技术的Double Speedy Q-Learning算法 Double Speedy Q-Learning Based on Successive Over Relaxation 计算机科学, 2022, 49(3): 239-245. https://doi.org/10.11896/jsjkx.201200173 |
[2] | 段菲, 王慧敏, 张超. 面向数据表示的Cauchy非负矩阵分解 Cauchy Non-negative Matrix Factorization for Data Representation 计算机科学, 2021, 48(6): 96-102. https://doi.org/10.11896/jsjkx.200700195 |
[3] | 杨章静, 王文博, 黄璞, 张凡龙, 王昕. 基于局部加权表示的线性回归分类器及人脸识别 Local Weighted Representation Based Linear Regression Classifier and Face Recognition 计算机科学, 2021, 48(11A): 351-359. https://doi.org/10.11896/jsjkx.210100173 |
[4] | 王建新,钱宇华. 符号数据的无监督学习:一种空间变换方法 Unsupervised Learning from Categorical Data:A Space Transformation Approach 计算机科学, 2016, 43(1): 89-93. https://doi.org/10.11896/j.issn.1002-137X.2016.01.021 |
[5] | 代飞,李彤,谢仲文,莫启,金运志. 基于EPMM的软件过程结构合理性研究 Research on Structure Soundness of Software Processes Based on EPMM 计算机科学, 2013, 40(8): 186-190. |
[6] | 饶屾,王勇. DWATrust:一种基于“二次加权法”的P2P网络动态综合信任模型 DWATrust:Doubly Weighted Average Based Dynamic Comprehensive Trust Model for P2P Network 计算机科学, 2011, 38(6): 122-126. |
[7] | 申新鹏,李战怀,赵晓南,曾雷杰. P2P数据管理系统中数据表的定位 Locating Table in P2P Data Management System 计算机科学, 2011, 38(3): 195-198. |
[8] | 谢竹诚,周永权. 一类自适应泛函网络循环结构与算法 Adaptive Functional Networks Loop Structures and Learning Algorithm 计算机科学, 2009, 36(10): 225-229. |
[9] | . 基于Petri的分布式实时嵌入式软件合理性分析 计算机科学, 2008, 35(8): 277-280. |
[10] | 田祖伟 赵克佳. 基于GCC的IF转换算法的分析与改进 计算机科学, 2005, 32(7): 242-244. |
[11] | 窦全胜 周春光 徐中宇 潘冠宇. 群体启发进化规划 计算机科学, 2005, 32(7): 145-147. |
[12] | 戴帅湘 周昌乐 黄孝喜 杨芸 王雪梅. 隐喻计算模型及其在隐喻分类上的应用 计算机科学, 2005, 32(5): 159-163. |
[13] | 刘镔 张永强 刘粉林. 一种新的数字化混沌扰动方案 计算机科学, 2005, 32(4): 71-74. |
[14] | 郭启晶 洪晓光. XML文档结构索引的更新维护 计算机科学, 2004, 31(B09): 98-101. |
[15] | 丁道峰 吴红伟 王晓玲 周傲英. D(k,l)-索引:一种自适应的XML数据索引 计算机科学, 2004, 31(10): 141-145. |
|