A group supported workflow model and its applications in pervasive computing environments

被引:0
|
作者
He, Wei [1 ]
Wang, Haiyang [1 ]
Xiao, Zongshui [1 ]
Shi, Yuliang [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250100, Peoples R China
关键词
business process; pervasive computing; workflow model; multiple modalities; user context;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Execution of workflow management systems in pervasive computing environments, especially the multiple modalities of interaction between users and systems, has become an increasing requirement in many enterprises. Group activity is another salient feature of the business processes. Traditional workflow management systems have difficulties in supporting such features. Through extending traditional workflow model in modeling method and executing mechanism, we designed and implemented a group-supported workflow management system with the ability of interacting with users in multiple modalities. Compared with traditional workflow modeling method, this method has more capabilities in describing group activities and makes modeling simpler. This paper introduces the modeling method for group activity and the mechanism supporting interaction between users and systems with multiple modalities. The applications of the system in some enterprises are also introduced.
引用
收藏
页码:147 / 152
页数:6
相关论文
共 50 条
  • [21] Protection of privacy in pervasive computing environments
    Cheng, HS
    Zhang, DQ
    Tan, JG
    [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 242 - 247
  • [22] On data management in pervasive computing environments
    Perich, F
    Joshi, A
    Finin, T
    Yesha, Y
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (05) : 621 - 634
  • [23] Service discovery in pervasive computing environments
    Zhu, F
    Mutka, MW
    Ni, LM
    [J]. IEEE PERVASIVE COMPUTING, 2005, 4 (04) : 81 - 90
  • [24] Provably Correct Pervasive Computing Environments
    Ranganathan, Anand
    Campbell, Roy H.
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, : 160 - +
  • [25] A trust framework for pervasive computing environments
    Wolfe, Steven T.
    Ahamed, Sheikh I.
    Zulkernine, Mohammad
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1-3, 2006, : 312 - +
  • [26] A Trust Framework for Pervasive Computing Environments
    Xu, Wenshuan
    Xin, Yunwei
    Lu, Guizhang
    [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2222 - 2225
  • [27] Agile middleware of pervasive computing environments
    Niemelä, E
    Vaskivuo, T
    [J]. SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 192 - 197
  • [28] Active Authentication for pervasive computing environments
    Matsumiya, K
    Aoki, S
    Murase, M
    Tokuda, H
    [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 28 - 41
  • [29] Context management in pervasive computing environments
    Anagnostopoulos, C
    Tsounis, A
    Hadjiefthymiades, S
    [J]. International Conference on Pervasive Services 2005, Proceedings, 2005, : 421 - 424
  • [30] Olympus: A high-level programming model for pervasive computing environments
    Ranganathan, A
    Chetan, S
    Al-Muhtadi, J
    Campbell, RH
    Mickunas, MD
    [J]. Third IEEE International Conference on Pervasive Computing and Communications, Proceedings, 2005, : 7 - 16