A Behavior-Aware Systematic Approach For Merging Business Process Fragments

被引:4
|
作者
Zemni, Mohamed Anis [1 ]
Mammar, Amel [2 ]
Ben Hadj-Alouane, Nejib [3 ]
机构
[1] Ecole Natl Sci Informat, UR OASIS, Manouba 2010, Tunisia
[2] Inst Mines Telecom Telecom SudParis, CNRS UMR SAMOVAR 5157, Paris, France
[3] Ecole Natl Ingnieurs Tunis, UR OASIS, Tunis 1002, Tunisia
关键词
Business process fragment; merge; behavior; adjacency matrix;
D O I
10.1109/ICECCS.2014.35
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent researches have proposed to retrieve relevant fragments out from whole business processes to build new ones. Although they avoid building business processes from scratch, this task has been performed independently for each process, thus, making resulting fragments handling complicated. In this paper, we propose to merge some given business process fragments in order to facilitate the fragment-based business process design. At the same time, the obtained fragment must keep the behavior of original fragments so as to avoid paths execution blockage while the obtained fragments are integrated as part of a complete process. Our approach presents a systematic merge revolving around the so-called adjacency matrices. Typically used to handle graphs, this mechanism is adapted to business process fragments. We also present some rules to provide the obtained fragments with the behavior of original fragments and avoid inconsistent behaviors that were newly added after the merge.
引用
收藏
页码:194 / 197
页数:4
相关论文
共 50 条
  • [1] An automated approach for merging business process fragments
    Zemni, Mohamed Anis
    Mammar, Amel
    Ben Hadj-Alouane, Nejib
    [J]. COMPUTERS IN INDUSTRY, 2016, 82 : 104 - 118
  • [2] Business Process Model Merging: An Approach to Business Process Consolidation
    La Rosa, Marcello
    Dumas, Marlon
    Uba, Reina
    Dijkman, Remco
    [J]. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2013, 22 (02)
  • [3] A Behavior-aware Profiling of Handheld Devices
    Wei, Xuetao
    Valler, Nicholas C.
    Madhyastha, Harsha V.
    Neamtiu, Iulian
    Faloutsos, Michalis
    [J]. 2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [4] A Behavior-Aware Profiling of Smart Contracts
    Wei, Xuetao
    Lu, Can
    Ozcan, Fatma Rana
    Chen, Ting
    Wang, Boyang
    Wu, Di
    Tang, Qiang
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT II, 2019, 305 : 245 - 258
  • [5] Behavior-Aware Computing: Applications and Challenges
    Favela, Jesus
    [J]. IEEE PERVASIVE COMPUTING, 2013, 12 (03) : 14 - 17
  • [6] Behavior-aware Trustworthiness Study of Networked Software
    Fang X.
    Jiang C.
    Fan X.
    [J]. International Journal of Computational Intelligence Systems, 2010, 3 (5) : 542 - 552
  • [7] Behavior-Aware Role Based Trust Management
    Li, Lan
    Zhang, Shaojun
    Fan, Lei
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1919 - 1924
  • [8] Profile cast:: Behavior-aware mobile networking
    Hsu, Wei-jen
    Dutta, Debojyoti
    Helmy, Ahmed
    [J]. WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7, 2008, : 3033 - +
  • [9] Behavior-aware Trustworthiness Study of Networked Software
    Fang, Xianwen
    Jiang, Changjun
    Fan, Xiaoqin
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2010, 3 (05) : 542 - 552
  • [10] Behavior-Aware Network Segmentation using IP Flows
    Smeriga, Juraj
    Jirsik, Tomas
    [J]. 14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,