跳到主要內容

臺灣博碩士論文加值系統

(44.200.82.149) 您好!臺灣時間:2023/06/10 00:18
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:許嘉麟
論文名稱:運用一正規化模式來偵測商業流程規格中異常的Artifact使用
論文名稱(外文):Detecting the Artifact Anomalies in Business Process Specifications with a Formal Model
指導教授:王豐堅
學位類別:博士
校院名稱:國立交通大學
系所名稱:資訊科學與工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2007
畢業學年度:96
語文別:英文
論文頁數:60
中文關鍵詞:工作流程商業流程分析控制流程資料流程異常
外文關鍵詞:workflowbusiness processanalysiscontrol flowdata flowartifactanomaly
相關次數:
  • 被引用被引用:0
  • 點閱點閱:145
  • 評分評分:
  • 下載下載:14
  • 收藏至我的研究室書目清單書目收藏:1
儘管已有許多商業流程模型被提出,卻鮮少針對artifact 的使用進行分析。由於不適當的artifact 操作,譬如說artifact 流程與控制流程不一致或是相衝突的artifact 運算,一個結構良好且擁有足夠資源的商業流程在執行時依然可能產生非預期的結果。因此,分析 artifact的使用是很重要的畢竟活動無法在沒有精確的資訊的情況下執行正確。本論文提出一個流程模型來描述商業流程並且在此模型上分析 artifact 的使用。總共有三類(十三種狀況)會影響流程執行的異常artifact 使用被確認出來並且使用系統化的方式來表達。除此之外,本論文提出偵測這些異常的演算法並以一個實際的例子作示範說明。
Although many business process models have been proposed, analyses on artifact usages are seldom discussed. A well-structured business process with sufficient resources may still fail or yield unexpected results during process execution due to inaccurate artifact specification e.g. inconsistency between artifact flow and control flow, or contradictions between artifact operations. Thus, the analyses on artifact usages are very important since activities cannot be executed properly without accurate information. This dissertation presents a process model for describing a business process and analyzes the artifact usages on this model. Three types with thirteen cases of artifact usage anomalies affecting process execution are identified and formulates and a set of algorithms to detect these anomalies in business process specifications is presented. Furthermore, an example is demonstrated to validate the usability of the proposed algorithms.
摘要 ............................................. I
ABSTRACT ............................... II
誌 謝 .......................................... III
TABLE OF CONTENTS ............................ IV
LIST OF TABLES ........................................ VI
LIST OF FIGURES ...................................... VII
CHAPTER 1. INTRODUCTION ........................ 1
CHAPTER 2. RELATED WORK AND BACKGROUND ................. 3
CHAPTER 3. PROCESS MODELING ............... 6
3.1. PROCESS SPECIFICATIONS ........................... 6
3.2. CONTROL FLOW SPECIFICATION ........................ 7
3.2.1. Activities and Control Blocks ................... 7
3.2.2. Relations among Activities and Control
Blocks ..................................... 10
3.3. ARTIFACT FLOW SPECIFICATION ............... 13
3.3.1. Artifacts and Artifact Operations .............. 13
3.3.2. Artifact Flow and Artifact Usages .......... 15
CHAPTER 4. ARTIFACT USAGE ANOMALIES................ 17
4.1. ARTIFACT USAGE ANOMALIES.................... 17
4.1.1. Missing Production Anomalies ............. 17
4.1.2. Redundant Write Anomalies .................... 22
4.1.3. Conflict Write Anomalies ..................... 24
4.1.4. Summary of Usage Patterns Causing Artifact Usage
Anomalies ................................. 25
CHAPTER 5. ALGORITHMS TO DETECTING ARTIFACT USAGE
ANOMALIES .. 27
5.1. THE TRAVERSAL ALGORITHM ..................... 27
5.2. THE DETECTION ALGORITHM ..................... 30
5.2.1. Method for Detecting Missing Production
Anomalies ................................ 30
5.2.2. Method for Detecting Redundant Production/Update
Anomalies .............................. 35
5.2.3. Method for Detecting Conflict Writes
Anomalies .................................... 39
5.2.4. Complexities of Traversal and Detection
Algorithms ........................... 41
CHAPTER 6. ILLUSTRATIVE EXAMPLE ........................ 43
6.1. AN EXAMPLE: PROPERTY LOAN APPROVAL PROCESS ...... 43
6.2. DETECTION OF MISSING PRODUCTION ANOMALIES ....... 45
6.3. DETECTION OF REDUNDANT WRITE ANOMALIES .......... 47
CHAPTER 7. COMPARISONS OF DATA-FLOW ANALYSIS APPROACHES . 50
CHAPTER 8. CONCLUSION AND FUTURE WORK ................ 54
REFERENCE ..................................... 55
1 The Workflow Management Coalition, “The workflow reference model”, Document Number
TC00-1003, January 1995.
2 P. Senkul and I.H. Toroslu, “An architecture for workflow scheduling under resource
allocation constraints”, Information Systems, Vol. 30, Issue 5, pp. 399-422, PERGAMON,
July 2005.
3 H. Li, Y. Yang and T.Y. Chen, “Resource constraints analysis of workflow specifications”,
Journal of Systems and Software, Vol. 73, No. 2, pp. 271–285, Elsevier Science, October
2004.
4 C. Liu, X. Lin, M.E. Orlowska, and X. Zhou, “Confirmation: increasing resource availability
for transactional workflows”, Information Sciences, Vol. 153, Issue 1, pp. 37-53, Elsevier
Science Inc, July 2003.
5 W. Du and M.C. Shan, “Enterprise workflow resource management”, Proceedings of the Ninth
International Workshop on Research Issues on Data Engineering: Information Technology for
Virtual Enterprises, pp. 108-115, IEEE Computer Society, March 1999.
6 M.Z. Muehlen, “Resource modeling in workflow applications”, Proceedings of the 1999
Workflow Management Conference, pp. 137-153, M�刡ster, Germany, November 1999.
7 S. Sadiq, M.E. Orlowska, W. Sadiq, and C. Foulger, ”Data flow and validation in workflow
modeling”, Proceedings of the 15th Australasian database conference, pp. 207-214, Dunedin,
New Zealand, January 2004.
8 S.X. Sun, and J.L. Zhao, "A data flow approach to workflow design", Proceedings of the 14th
Workshop on Information Technology and Systems (WITS’04), pp. 80-85, 2004.
9 S.X. Sun, J.L. Zhao, and O.R. Sheng, "Data flow modeling and verification in business
process management", Proceedings of the AIS Americas Conference on Information Systems,
pp. 4064-4073, New York, August 5-8, 2004.
10 S.X. Sun, J.L. Zhao, J.F. Nunamaker, and O.R.L. Sheng, “Formulating the data flow
perspective for business process management”, Information Systems Research, Vol. 17, No. 4,
pp. 374-391, December 2006.
1 The Workflow Management Coalition, “The workflow reference model”, Document Number
TC00-1003, January 1995.
2 P. Senkul and I.H. Toroslu, “An architecture for workflow scheduling under resource
allocation constraints”, Information Systems, Vol. 30, Issue 5, pp. 399-422, PERGAMON,
July 2005.
3 H. Li, Y. Yang and T.Y. Chen, “Resource constraints analysis of workflow specifications”,
Journal of Systems and Software, Vol. 73, No. 2, pp. 271–285, Elsevier Science, October
2004.
4 C. Liu, X. Lin, M.E. Orlowska, and X. Zhou, “Confirmation: increasing resource availability
for transactional workflows”, Information Sciences, Vol. 153, Issue 1, pp. 37-53, Elsevier
Science Inc, July 2003.
5 W. Du and M.C. Shan, “Enterprise workflow resource management”, Proceedings of the Ninth
International Workshop on Research Issues on Data Engineering: Information Technology for
Virtual Enterprises, pp. 108-115, IEEE Computer Society, March 1999.
6 M.Z. Muehlen, “Resource modeling in workflow applications”, Proceedings of the 1999
Workflow Management Conference, pp. 137-153, M�刡ster, Germany, November 1999.
7 S. Sadiq, M.E. Orlowska, W. Sadiq, and C. Foulger, ”Data flow and validation in workflow
modeling”, Proceedings of the 15th Australasian database conference, pp. 207-214, Dunedin,
New Zealand, January 2004.
8 S.X. Sun, and J.L. Zhao, "A data flow approach to workflow design", Proceedings of the 14th
Workshop on Information Technology and Systems (WITS’04), pp. 80-85, 2004.
9 S.X. Sun, J.L. Zhao, and O.R. Sheng, "Data flow modeling and verification in business
process management", Proceedings of the AIS Americas Conference on Information Systems,
pp. 4064-4073, New York, August 5-8, 2004.
10 S.X. Sun, J.L. Zhao, J.F. Nunamaker, and O.R.L. Sheng, “Formulating the data flow
perspective for business process management”, Information Systems Research, Vol. 17, No. 4,
pp. 374-391, December 2006.
patterns”, Distributed and Parallel Databases, Vol. 14, No. 1, pp. 5-51, July 2003.
23 W.M.P. van der Aalst, “Verification of workflow nets”, Proceedings of the 18th International
Conference on Application and Theory of Petri Nets, pp. 407-426, Toulouse, France, June
23-27, 1997.
24 W.M.P. van der Aalst, “The application of petri-nets to workflow management”, Journal
Circuits, Systems and Computers, Vol. 8, No. 1, pp. 21-66, 1998.
25 W.M.P. van der Aalst and T. Basten, “Inheritance of workflows: an approach to tackling
problems related to change”, Theoretical Computer Science, Vol. 270, No. 1-2, pp. 125-203,
2002.
26 H.M.W. Verbeek and W.M.P. van der Aalst, “Woflan 2.0: a petri-net-based workflow diagnosis
tool”, Proceedings of the 21st International Conference of Application and Theory of Petri
Nets (ICATPN 2000), pp. 475-484, Aarhus, Denmark, June 26-30, 2000.
27 C. Karamanolis, D. Giannakopoulou, J. Magee, and S.M. Wheater, “Formal verification
workflow schemas”, Technical Report, Control and Coordination of Complex Distributed
Services, ESPRIT Long Term Research Project, 2000.
28 H.M.W. Verbeek, T. Basten, and W.M.P. van der Aalst, “Diagnosing workflow processes using
woflan”, The Computer Journal, Vol. 44, No. 4, pp. 246-279, 2001.
29 L. Gong and H.-Y. Wang, “A method to verify the soundness of workflow control logic”,
Computer Supported Cooperative Work in Design, Vol. 1, pp. 284-388, May 2004.
30 W. Sadiq and M.E. Orlowska, “Analyzing process models using graph reduction techniques”,
Information Systems, Vol. 25, No. 2, pp. 117-134, Elsevier Science Publishers, 2000.
31 W. Sadiq and M.E. Orlowska, “On correctness issues in conceptual modeling of workflows”,
Proceedings of the 5th European Conference on Information Systems (ECIS ‘97), Cork,
Ireland, June 19-21, 1997.
32 W. Sadiq and M.E. Orlowska, “Applying graph reduction techniques for identifying structural
conflicts in process models”, Proceedings of the 11th International Conference on Advanced
Information Systems Engineering (CAiSE '99), Vol. 1626 of Lecture Notes in Computer
Science, pp. 195-209, Springer-Verlag, Berlin, 1999.
33 N. Russell, A.H.M. ter Hofstede, D. Edmond, and W.M.P. van der Aalst, “Workflow data
patterns”, QUT Technical report, FIT-TR-2004-01, Queensland University of Technology,
Brisbane, 2004.
34 J. Bae, H. Bae, S.-H. Kang, and Y. Kim, “Automatic control of workflow processes using ECA
rules”, IEEE Transaction on Knowledge and Date Engineering, Vol. 14, No. 8, pp. 1010-1023,
IEEE Computer Society, August 2004.
35 J.H. Son, and M.H. Kim, “Extracting the workflow critical path from the extended
well-formed workflow schema”, Journal of Computer and System Sciences, Vol. 70, Issue 1,
pp. 86-106, Elsevier Science Publishers, February 2005.
36 D.-H. Chang, J.H. Son, and M.H. Kim, “Critical path identification in the context of a
workflow”, Information & Software Technology, Vol. 44, No. 7, pp. 405-417, Elsevier Science
Publishers, May 2002.
37 Object Management Group. 2006, Business Process Modeling Notation (BPMN),
http://www.bpmn.org/.
38 Flowring Technology Corp., http://www.flowring.com, accessed May 2006.
39 The Workflow Management Coalition, “Terminology & glossary”, Document Number
WFMC-TC-1011, February 1999.
40 N.R. Adam, V. Atluri, and W.K. Huang, “Modeling and analysis of workflows using petri
nets”, Journal of Intelligent Information Systems, Vol. 10, No. 2, pp. 131-158, March/April
1998.
41 M. Koubarakis and D. Plexousakis, “A formal framework for business process modelling and
design”, Information Systems, Vol. 27, No. 5, pp. 299-319, July 2002.
42 H. Davulcu, M. Kifer, C.R. Ramakrishnan, and I.V. Ramakrishnan, “Logic based modeling
and analysis of workflows”, Proceedings of the 17th ACM SIGACT-SIGMOD-SIGART
symposium on Principles of database systems, pp. 25-33, Seattle, Washington, United States,
June 01-04, 1998.
43 P. Senkul, M. Kifer and I.H. Toroslu, “A logical framework for scheduling workflows under
resource allocation constraints”, Proceeding of 28th International Conference on Very Large
Data Bases (VLDB’02), pp. 694–702, August 2002.
44 G. Trajcevski, C. Baral, and J. Lobo, “Formalizing (and Reasoning About) the specifications of
workflows”, Proceedings of the 7th International Conference on Cooperative Information
Systems, pp. 1-17, September 06-08, 2000.
45 N. Tatbul, S. Nural, P. Karagoz, I. Cingil, E. Gokkoca, M. Altinel, P. Koksal, and A. Dogac, “A
workflow specification language and its scheduler”, Proceedings of International Conference
on Computer and Information Sciences, pp. 163-170, Antalya, Turkey, November 1997.
46 S. Chinn, and G. Madey, “Temporal representation and reasoning for workflow in engineering
design change review”, IEEE Transactions on Engineering Management, Vol. 47, No. 4, pp.
485-492, 2000.
47 A.H.M. ter Hofstede and M.E. Orlowska, “On the complexity of some verification problems
in process control specifications”, The Computer Journal, Vol. 42, No. 5, pp. 349-359, 1999.
48 A.H.M. ter Hofstede, M.E. Orlowska, and J. Rajapakse, “Verification problems in conceptual
workflow specifications”, Data and Knowledge Engineering, Vol. 24, Iss. 3, pp. 239-256,
1998.
49 C. Karamanolis, D. Giannakopoulou, J. Magee, and S. Wheater, “Modeling and analysis of
workflow processes”. Technical Report 99/2, Department of Computing, Imperial College.
50 K. Kim, C.A. Ellis, “Performance analytic models and analyses for workflow architectures”,
Journal of Information Systems Frontiers, Vol. 3, No. 3, pp. 339-355, September 2001.
51 A. Zaidi, “On temporal logic programming using petri nets”, IEEE Transactions on Systems,
Man, and Cybernetics, Part A: Systems and Humans, Vol. 29, Issue 3, pp. 245-254, 1999.
52 M. Rosemann and M. zur M�伿len, “Evaluation of workflow management systems: a
meta-model approach”,: Australian Journal of Information Systems, Vol. 6, No. 1, pp. 103-116,
1998.
53 E. Bertino; E. Ferrari, and V. Atluri, “The specification and enforcement of authorization
constraints in workflow management systems”, ACM Transactions on Information and System
Security, Vol. 2 , Iss. 1, pp. 65-104, 1999.
54 O. Marjanovic, “Dynamic verification of temporal constraints in production workflows”,
Proceedings of the Australian Database Conference ADC'2000, pp. 74-81, January
31-February 03, 2000.
55 M. Reichert and P. Dadam, “Adeptflex—Supporting Dynamic Changes of Workflows Without
Losing Control”, Journal of Intelligent Information Systems, Vol. 10, No. 2, pp. 93-129,
March/April 1998.
56 A. Bajaj and S. Ram, "Seam: a state-entity-activity-model for a well-defined workflow
development methodology", IEEE Transactions on Knowledge and Data Engineering, Vol. 14,
No. 2, pp. 415-431, March/April 2002.
57 A. Kumar and J.L. Zhao, "Dynamic routing and operational control in workflow management
systems", Management Science, Vol. 35, No. 2, pp. 253-272, February 1999.
58 M.M. Kwan and P.R. Balasubramanian, "Dynamic workflow management: a framework for
modeling workflows", Proceedings of the 13th Hawaii International Conference on System
Sciences, Vol. 4, pp. 367-376, January 7-10, 1997.
59 H.B. Luo, Y.S. Fan, and C. Wu, “Analysis of event balance in the verification of workflow
soundness”, Journal of Software, Vo1. 13, No. 8, pp. 1686-1691, 2002.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊