Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Mining and Re-engineering Transactional Workflows for Reliable Executions

Identifieur interne : 002964 ( Istex/Corpus ); précédent : 002963; suivant : 002965

Mining and Re-engineering Transactional Workflows for Reliable Executions

Auteurs : Walid Gaaloul ; Sami Bhiri ; Armin Haller

Source :

RBID : ISTEX:AFC6E77868E7646E99939B44EC965068E855C954

Abstract

Abstract: A continuous evolution of business process parameters, constraints and needs, hardly foreseeable initially, requires from the business process management systems a continuous design and a reliable process model. In this paper, we are interested in developing a reactive design through a process log analysis ensuring process re-engineering and execution reliability. We propose to analyse workflow logs to discover workflow transactional behavior and to improve and correct related recovery mechanisms subsequently. Our approach starts by collecting workflow logs. Then, we build, by statistical analysis techniques, an intermediate representation specifying elementary dependencies between activities. These dependencies are refined to mine the transactional workflow model. The analysis of the discrepancies between the discovered model and the initially designed model enables us to detect design gaps, concerning particularly the recovery mechanisms. Thus, based on this mining step, we apply a set of rules on the initially designed workflow to improve workflow reliability.

Url:
DOI: 10.1007/978-3-540-75563-0_33

Links to Exploration step

ISTEX:AFC6E77868E7646E99939B44EC965068E855C954

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Mining and Re-engineering Transactional Workflows for Reliable Executions</title>
<author>
<name sortKey="Gaaloul, Walid" sort="Gaaloul, Walid" uniqKey="Gaaloul W" first="Walid" last="Gaaloul">Walid Gaaloul</name>
<affiliation>
<mods:affiliation>DERI – National University of Ireland, IDA Business Park, Galway, Ireland</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: walid.gaaloul@deri.org</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Bhiri, Sami" sort="Bhiri, Sami" uniqKey="Bhiri S" first="Sami" last="Bhiri">Sami Bhiri</name>
<affiliation>
<mods:affiliation>DERI – National University of Ireland, IDA Business Park, Galway, Ireland</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: sami.bhiri@deri.org</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Haller, Armin" sort="Haller, Armin" uniqKey="Haller A" first="Armin" last="Haller">Armin Haller</name>
<affiliation>
<mods:affiliation>DERI – National University of Ireland, IDA Business Park, Galway, Ireland</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: armin.haller@deri.org</mods:affiliation>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:AFC6E77868E7646E99939B44EC965068E855C954</idno>
<date when="2007" year="2007">2007</date>
<idno type="doi">10.1007/978-3-540-75563-0_33</idno>
<idno type="url">https://api.istex.fr/ark:/67375/HCB-FQK0WL31-K/fulltext.pdf</idno>
<idno type="wicri:Area/Istex/Corpus">002964</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">002964</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Mining and Re-engineering Transactional Workflows for Reliable Executions</title>
<author>
<name sortKey="Gaaloul, Walid" sort="Gaaloul, Walid" uniqKey="Gaaloul W" first="Walid" last="Gaaloul">Walid Gaaloul</name>
<affiliation>
<mods:affiliation>DERI – National University of Ireland, IDA Business Park, Galway, Ireland</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: walid.gaaloul@deri.org</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Bhiri, Sami" sort="Bhiri, Sami" uniqKey="Bhiri S" first="Sami" last="Bhiri">Sami Bhiri</name>
<affiliation>
<mods:affiliation>DERI – National University of Ireland, IDA Business Park, Galway, Ireland</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: sami.bhiri@deri.org</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Haller, Armin" sort="Haller, Armin" uniqKey="Haller A" first="Armin" last="Haller">Armin Haller</name>
<affiliation>
<mods:affiliation>DERI – National University of Ireland, IDA Business Park, Galway, Ireland</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: armin.haller@deri.org</mods:affiliation>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s" type="main" xml:lang="en">Lecture Notes in Computer Science</title>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: A continuous evolution of business process parameters, constraints and needs, hardly foreseeable initially, requires from the business process management systems a continuous design and a reliable process model. In this paper, we are interested in developing a reactive design through a process log analysis ensuring process re-engineering and execution reliability. We propose to analyse workflow logs to discover workflow transactional behavior and to improve and correct related recovery mechanisms subsequently. Our approach starts by collecting workflow logs. Then, we build, by statistical analysis techniques, an intermediate representation specifying elementary dependencies between activities. These dependencies are refined to mine the transactional workflow model. The analysis of the discrepancies between the discovered model and the initially designed model enables us to detect design gaps, concerning particularly the recovery mechanisms. Thus, based on this mining step, we apply a set of rules on the initially designed workflow to improve workflow reliability.</div>
</front>
</TEI>
<istex>
<corpusName>springer-ebooks</corpusName>
<author>
<json:item>
<name>Walid Gaaloul</name>
<affiliations>
<json:string>DERI – National University of Ireland, IDA Business Park, Galway, Ireland</json:string>
<json:string>E-mail: walid.gaaloul@deri.org</json:string>
</affiliations>
</json:item>
<json:item>
<name>Sami Bhiri</name>
<affiliations>
<json:string>DERI – National University of Ireland, IDA Business Park, Galway, Ireland</json:string>
<json:string>E-mail: sami.bhiri@deri.org</json:string>
</affiliations>
</json:item>
<json:item>
<name>Armin Haller</name>
<affiliations>
<json:string>DERI – National University of Ireland, IDA Business Park, Galway, Ireland</json:string>
<json:string>E-mail: armin.haller@deri.org</json:string>
</affiliations>
</json:item>
</author>
<arkIstex>ark:/67375/HCB-FQK0WL31-K</arkIstex>
<language>
<json:string>eng</json:string>
</language>
<originalGenre>
<json:string>OriginalPaper</json:string>
</originalGenre>
<abstract>Abstract: A continuous evolution of business process parameters, constraints and needs, hardly foreseeable initially, requires from the business process management systems a continuous design and a reliable process model. In this paper, we are interested in developing a reactive design through a process log analysis ensuring process re-engineering and execution reliability. We propose to analyse workflow logs to discover workflow transactional behavior and to improve and correct related recovery mechanisms subsequently. Our approach starts by collecting workflow logs. Then, we build, by statistical analysis techniques, an intermediate representation specifying elementary dependencies between activities. These dependencies are refined to mine the transactional workflow model. The analysis of the discrepancies between the discovered model and the initially designed model enables us to detect design gaps, concerning particularly the recovery mechanisms. Thus, based on this mining step, we apply a set of rules on the initially designed workflow to improve workflow reliability.</abstract>
<qualityIndicators>
<score>8.788</score>
<pdfWordCount>6983</pdfWordCount>
<pdfCharCount>41102</pdfCharCount>
<pdfVersion>1.6</pdfVersion>
<pdfPageCount>17</pdfPageCount>
<pdfPageSize>430 x 660 pts</pdfPageSize>
<refBibsNative>false</refBibsNative>
<abstractWordCount>149</abstractWordCount>
<abstractCharCount>1089</abstractCharCount>
<keywordCount>0</keywordCount>
</qualityIndicators>
<title>Mining and Re-engineering Transactional Workflows for Reliable Executions</title>
<chapterId>
<json:string>33</json:string>
<json:string>Chap33</json:string>
</chapterId>
<genre>
<json:string>conference</json:string>
</genre>
<serie>
<title>Lecture Notes in Computer Science</title>
<language>
<json:string>unknown</json:string>
</language>
<copyrightDate>2007</copyrightDate>
<issn>
<json:string>0302-9743</json:string>
</issn>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<editor>
<json:item>
<name>David Hutchison</name>
</json:item>
<json:item>
<name>Takeo Kanade</name>
</json:item>
<json:item>
<name>Josef Kittler</name>
</json:item>
<json:item>
<name>Jon M. Kleinberg</name>
</json:item>
<json:item>
<name>Friedemann Mattern</name>
</json:item>
<json:item>
<name>John C. Mitchell</name>
</json:item>
<json:item>
<name>Moni Naor</name>
</json:item>
<json:item>
<name>Oscar Nierstrasz</name>
</json:item>
<json:item>
<name>C. Pandu Rangan</name>
</json:item>
<json:item>
<name>Bernhard Steffen</name>
</json:item>
<json:item>
<name>Madhu Sudan</name>
</json:item>
<json:item>
<name>Demetri Terzopoulos</name>
</json:item>
<json:item>
<name>Doug Tygar</name>
</json:item>
<json:item>
<name>Moshe Y. Vardi</name>
</json:item>
<json:item>
<name>Gerhard Weikum</name>
</json:item>
</editor>
</serie>
<host>
<title>Conceptual Modeling - ER 2007</title>
<language>
<json:string>unknown</json:string>
</language>
<copyrightDate>2007</copyrightDate>
<doi>
<json:string>10.1007/978-3-540-75563-0</json:string>
</doi>
<issn>
<json:string>0302-9743</json:string>
</issn>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<eisbn>
<json:string>978-3-540-75563-0</json:string>
</eisbn>
<bookId>
<json:string>978-3-540-75563-0</json:string>
</bookId>
<isbn>
<json:string>978-3-540-75562-3</json:string>
</isbn>
<volume>4801</volume>
<pages>
<first>485</first>
<last>501</last>
</pages>
<genre>
<json:string>book-series</json:string>
</genre>
<editor>
<json:item>
<name>Christine Parent</name>
</json:item>
<json:item>
<name>Klaus-Dieter Schewe</name>
</json:item>
<json:item>
<name>Veda C. Storey</name>
</json:item>
<json:item>
<name>Bernhard Thalheim</name>
</json:item>
</editor>
<subject>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Database Management</value>
</json:item>
<json:item>
<value>Information Systems Applications (incl.Internet)</value>
</json:item>
<json:item>
<value>Mathematical Logic and Formal Languages</value>
</json:item>
<json:item>
<value>Artificial Intelligence (incl. Robotics)</value>
</json:item>
<json:item>
<value>Models and Principles</value>
</json:item>
<json:item>
<value>Software Engineering</value>
</json:item>
</subject>
</host>
<ark>
<json:string>ark:/67375/HCB-FQK0WL31-K</json:string>
</ark>
<publicationDate>2007</publicationDate>
<copyrightDate>2007</copyrightDate>
<doi>
<json:string>10.1007/978-3-540-75563-0_33</json:string>
</doi>
<id>AFC6E77868E7646E99939B44EC965068E855C954</id>
<score>1</score>
<fulltext>
<json:item>
<extension>pdf</extension>
<original>true</original>
<mimetype>application/pdf</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-FQK0WL31-K/fulltext.pdf</uri>
</json:item>
<json:item>
<extension>zip</extension>
<original>false</original>
<mimetype>application/zip</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-FQK0WL31-K/bundle.zip</uri>
</json:item>
<istex:fulltextTEI uri="https://api.istex.fr/ark:/67375/HCB-FQK0WL31-K/fulltext.tei">
<teiHeader>
<fileDesc>
<titleStmt>
<title level="a" type="main" xml:lang="en">Mining and Re-engineering Transactional Workflows for Reliable Executions</title>
</titleStmt>
<publicationStmt>
<authority>ISTEX</authority>
<availability>
<licence>Springer-Verlag Berlin Heidelberg</licence>
</availability>
<date when="2007">2007</date>
</publicationStmt>
<notesStmt>
<note type="conference" source="proceedings" scheme="https://content-type.data.istex.fr/ark:/67375/XTP-BFHXPBJJ-3">conference</note>
<note type="publication-type" subtype="book-series" scheme="https://publication-type.data.istex.fr/ark:/67375/JMC-0G6R5W5T-Z">book-series</note>
</notesStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Mining and Re-engineering Transactional Workflows for Reliable Executions</title>
<author>
<persName>
<forename type="first">Walid</forename>
<surname>Gaaloul</surname>
</persName>
<email>walid.gaaloul@deri.org</email>
<affiliation>
<orgName type="institution">DERI – National University of Ireland, IDA Business Park, Galway</orgName>
<address>
<country key="IE">IRELAND</country>
</address>
</affiliation>
</author>
<author>
<persName>
<forename type="first">Sami</forename>
<surname>Bhiri</surname>
</persName>
<email>sami.bhiri@deri.org</email>
<affiliation>
<orgName type="institution">DERI – National University of Ireland, IDA Business Park, Galway</orgName>
<address>
<country key="IE">IRELAND</country>
</address>
</affiliation>
</author>
<author>
<persName>
<forename type="first">Armin</forename>
<surname>Haller</surname>
</persName>
<email>armin.haller@deri.org</email>
<affiliation>
<orgName type="institution">DERI – National University of Ireland, IDA Business Park, Galway</orgName>
<address>
<country key="IE">IRELAND</country>
</address>
</affiliation>
</author>
<idno type="istex">AFC6E77868E7646E99939B44EC965068E855C954</idno>
<idno type="ark">ark:/67375/HCB-FQK0WL31-K</idno>
<idno type="DOI">10.1007/978-3-540-75563-0_33</idno>
</analytic>
<monogr>
<title level="m" type="main">Conceptual Modeling - ER 2007</title>
<title level="m" type="sub">26th International Conference on Conceptual Modeling, Auckland, New Zealand, November 5-9, 2007. Proceedings</title>
<title level="m" type="part">Reuse and Reengineering</title>
<idno type="DOI">10.1007/978-3-540-75563-0</idno>
<idno type="book-id">978-3-540-75563-0</idno>
<idno type="ISBN">978-3-540-75562-3</idno>
<idno type="eISBN">978-3-540-75563-0</idno>
<idno type="chapter-id">Chap33</idno>
<idno type="part-id">Part10</idno>
<editor>
<persName>
<forename type="first">Christine</forename>
<surname>Parent</surname>
</persName>
<email>christine.parent@unil.ch</email>
</editor>
<editor>
<persName>
<forename type="first">Klaus-Dieter</forename>
<surname>Schewe</surname>
</persName>
<email>k.d.schewe@massey.ac.nz</email>
</editor>
<editor>
<persName>
<forename type="first">Veda</forename>
<forename type="first">C.</forename>
<surname>Storey</surname>
</persName>
<email>vstorey@gsu.edu</email>
</editor>
<editor>
<persName>
<forename type="first">Bernhard</forename>
<surname>Thalheim</surname>
</persName>
<email>thalheim@is.informatik.uni-kiel.de</email>
</editor>
<imprint>
<biblScope unit="vol">4801</biblScope>
<biblScope unit="page" from="485">485</biblScope>
<biblScope unit="page" to="501">501</biblScope>
<biblScope unit="chapter-count">40</biblScope>
<biblScope unit="part-chapter-count">3</biblScope>
</imprint>
</monogr>
<series>
<title level="s" type="main" xml:lang="en">Lecture Notes in Computer Science</title>
<editor>
<persName>
<forename type="first">David</forename>
<surname>Hutchison</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Takeo</forename>
<surname>Kanade</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Josef</forename>
<surname>Kittler</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Jon</forename>
<forename type="first">M.</forename>
<surname>Kleinberg</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Friedemann</forename>
<surname>Mattern</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">John</forename>
<forename type="first">C.</forename>
<surname>Mitchell</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Moni</forename>
<surname>Naor</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Oscar</forename>
<surname>Nierstrasz</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">C.</forename>
<surname>Pandu Rangan</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Bernhard</forename>
<surname>Steffen</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Madhu</forename>
<surname>Sudan</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Demetri</forename>
<surname>Terzopoulos</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Doug</forename>
<surname>Tygar</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Moshe</forename>
<forename type="first">Y.</forename>
<surname>Vardi</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Gerhard</forename>
<surname>Weikum</surname>
</persName>
</editor>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="seriesID">558</idno>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<abstract xml:lang="en">
<head>Abstract</head>
<p>A continuous evolution of business process parameters, constraints and needs, hardly foreseeable initially, requires from the business process management systems a continuous design and a reliable process model. In this paper, we are interested in developing a reactive design through a process log analysis ensuring process re-engineering and execution reliability.</p>
<p>We propose to analyse workflow logs to discover workflow transactional behavior and to improve and correct related recovery mechanisms subsequently. Our approach starts by collecting workflow logs. Then, we build, by statistical analysis techniques, an intermediate representation specifying elementary dependencies between activities. These dependencies are refined to mine the transactional workflow model. The analysis of the discrepancies between the discovered model and the initially designed model enables us to detect design gaps, concerning particularly the recovery mechanisms. Thus, based on this mining step, we apply a set of rules on the initially designed workflow to improve workflow reliability.</p>
</abstract>
<textClass ana="subject">
<keywords scheme="book-subject-collection">
<list>
<label>SUCO11645</label>
<item>
<term>Computer Science</term>
</item>
</list>
</keywords>
</textClass>
<textClass ana="subject">
<keywords scheme="book-subject">
<list>
<label>I</label>
<item>
<term type="Primary">Computer Science</term>
</item>
<label>I18024</label>
<item>
<term type="Secondary" subtype="priority-1">Database Management</term>
</item>
<label>I18040</label>
<item>
<term type="Secondary" subtype="priority-2">Information Systems Applications (incl.Internet)</term>
</item>
<label>I16048</label>
<item>
<term type="Secondary" subtype="priority-3">Mathematical Logic and Formal Languages</term>
</item>
<label>I21017</label>
<item>
<term type="Secondary" subtype="priority-4">Artificial Intelligence (incl. Robotics)</term>
</item>
<label>I18016</label>
<item>
<term type="Secondary" subtype="priority-5">Models and Principles</term>
</item>
<label>I14029</label>
<item>
<term type="Secondary" subtype="priority-6">Software Engineering</term>
</item>
</list>
</keywords>
</textClass>
<langUsage>
<language ident="EN"></language>
</langUsage>
</profileDesc>
</teiHeader>
</istex:fulltextTEI>
<json:item>
<extension>txt</extension>
<original>false</original>
<mimetype>text/plain</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-FQK0WL31-K/fulltext.txt</uri>
</json:item>
</fulltext>
<metadata>
<istex:metadataXml wicri:clean="corpus springer-ebooks not found" wicri:toSee="no header">
<istex:xmlDeclaration>version="1.0" encoding="UTF-8"</istex:xmlDeclaration>
<istex:docType PUBLIC="-//Springer-Verlag//DTD A++ V2.4//EN" URI="http://devel.springer.de/A++/V2.4/DTD/A++V2.4.dtd" name="istex:docType"></istex:docType>
<istex:document>
<Publisher>
<PublisherInfo>
<PublisherName>Springer Berlin Heidelberg</PublisherName>
<PublisherLocation>Berlin, Heidelberg</PublisherLocation>
</PublisherInfo>
<Series>
<SeriesInfo SeriesType="Series" TocLevels="0">
<SeriesID>558</SeriesID>
<SeriesPrintISSN>0302-9743</SeriesPrintISSN>
<SeriesElectronicISSN>1611-3349</SeriesElectronicISSN>
<SeriesTitle Language="En">Lecture Notes in Computer Science</SeriesTitle>
</SeriesInfo>
<SeriesHeader>
<EditorGroup>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>David</GivenName>
<FamilyName>Hutchison</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Takeo</GivenName>
<FamilyName>Kanade</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Josef</GivenName>
<FamilyName>Kittler</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Jon</GivenName>
<GivenName>M.</GivenName>
<FamilyName>Kleinberg</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Friedemann</GivenName>
<FamilyName>Mattern</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>John</GivenName>
<GivenName>C.</GivenName>
<FamilyName>Mitchell</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Moni</GivenName>
<FamilyName>Naor</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Oscar</GivenName>
<FamilyName>Nierstrasz</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>C.</GivenName>
<FamilyName>Pandu Rangan</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Bernhard</GivenName>
<FamilyName>Steffen</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Madhu</GivenName>
<FamilyName>Sudan</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Demetri</GivenName>
<FamilyName>Terzopoulos</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Doug</GivenName>
<FamilyName>Tygar</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Moshe</GivenName>
<GivenName>Y.</GivenName>
<FamilyName>Vardi</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Gerhard</GivenName>
<FamilyName>Weikum</FamilyName>
</EditorName>
</Editor>
</EditorGroup>
</SeriesHeader>
<Book Language="En">
<BookInfo BookProductType="Proceedings" ContainsESM="No" Language="En" MediaType="eBook" NumberingStyle="Unnumbered" OutputMedium="All" TocLevels="0">
<BookID>978-3-540-75563-0</BookID>
<BookTitle>Conceptual Modeling - ER 2007</BookTitle>
<BookSubTitle>26th International Conference on Conceptual Modeling, Auckland, New Zealand, November 5-9, 2007. Proceedings</BookSubTitle>
<BookVolumeNumber>4801</BookVolumeNumber>
<BookSequenceNumber>4801</BookSequenceNumber>
<BookDOI>10.1007/978-3-540-75563-0</BookDOI>
<BookTitleID>157140</BookTitleID>
<BookPrintISBN>978-3-540-75562-3</BookPrintISBN>
<BookElectronicISBN>978-3-540-75563-0</BookElectronicISBN>
<BookChapterCount>40</BookChapterCount>
<BookCopyright>
<CopyrightHolderName>Springer Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2007</CopyrightYear>
</BookCopyright>
<BookSubjectGroup>
<BookSubject Code="I" Type="Primary">Computer Science</BookSubject>
<BookSubject Code="I18024" Priority="1" Type="Secondary">Database Management</BookSubject>
<BookSubject Code="I18040" Priority="2" Type="Secondary">Information Systems Applications (incl.Internet)</BookSubject>
<BookSubject Code="I16048" Priority="3" Type="Secondary">Mathematical Logic and Formal Languages</BookSubject>
<BookSubject Code="I21017" Priority="4" Type="Secondary">Artificial Intelligence (incl. Robotics)</BookSubject>
<BookSubject Code="I18016" Priority="5" Type="Secondary">Models and Principles</BookSubject>
<BookSubject Code="I14029" Priority="6" Type="Secondary">Software Engineering</BookSubject>
<SubjectCollection Code="SUCO11645">Computer Science</SubjectCollection>
</BookSubjectGroup>
</BookInfo>
<BookHeader>
<EditorGroup>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Christine</GivenName>
<FamilyName>Parent</FamilyName>
</EditorName>
<Contact>
<Email>christine.parent@unil.ch</Email>
</Contact>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Klaus-Dieter</GivenName>
<FamilyName>Schewe</FamilyName>
</EditorName>
<Contact>
<Email>k.d.schewe@massey.ac.nz</Email>
</Contact>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Veda</GivenName>
<GivenName>C.</GivenName>
<FamilyName>Storey</FamilyName>
</EditorName>
<Contact>
<Email>vstorey@gsu.edu</Email>
</Contact>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Bernhard</GivenName>
<FamilyName>Thalheim</FamilyName>
</EditorName>
<Contact>
<Email>thalheim@is.informatik.uni-kiel.de</Email>
</Contact>
</Editor>
</EditorGroup>
</BookHeader>
<Part ID="Part10">
<PartInfo TocLevels="0">
<PartID>10</PartID>
<PartSequenceNumber>10</PartSequenceNumber>
<PartTitle>Reuse and Reengineering</PartTitle>
<PartChapterCount>3</PartChapterCount>
<PartContext>
<SeriesID>558</SeriesID>
<BookTitle>Conceptual Modeling - ER 2007</BookTitle>
</PartContext>
</PartInfo>
<Chapter ID="Chap33" Language="En">
<ChapterInfo ChapterType="OriginalPaper" ContainsESM="No" NumberingStyle="Unnumbered" TocLevels="0">
<ChapterID>33</ChapterID>
<ChapterDOI>10.1007/978-3-540-75563-0_33</ChapterDOI>
<ChapterSequenceNumber>33</ChapterSequenceNumber>
<ChapterTitle Language="En">Mining and Re-engineering Transactional Workflows for Reliable Executions</ChapterTitle>
<ChapterFirstPage>485</ChapterFirstPage>
<ChapterLastPage>501</ChapterLastPage>
<ChapterCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2007</CopyrightYear>
</ChapterCopyright>
<ChapterGrants Type="Regular">
<MetadataGrant Grant="OpenAccess"></MetadataGrant>
<AbstractGrant Grant="OpenAccess"></AbstractGrant>
<BodyPDFGrant Grant="Restricted"></BodyPDFGrant>
<BodyHTMLGrant Grant="Restricted"></BodyHTMLGrant>
<BibliographyGrant Grant="Restricted"></BibliographyGrant>
<ESMGrant Grant="Restricted"></ESMGrant>
</ChapterGrants>
<ChapterContext>
<SeriesID>558</SeriesID>
<PartID>10</PartID>
<BookID>978-3-540-75563-0</BookID>
<BookTitle>Conceptual Modeling - ER 2007</BookTitle>
</ChapterContext>
</ChapterInfo>
<ChapterHeader>
<AuthorGroup>
<Author AffiliationIDS="Aff1">
<AuthorName DisplayOrder="Western">
<GivenName>Walid</GivenName>
<FamilyName>Gaaloul</FamilyName>
</AuthorName>
<Contact>
<Email>walid.gaaloul@deri.org</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff1">
<AuthorName DisplayOrder="Western">
<GivenName>Sami</GivenName>
<FamilyName>Bhiri</FamilyName>
</AuthorName>
<Contact>
<Email>sami.bhiri@deri.org</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff1">
<AuthorName DisplayOrder="Western">
<GivenName>Armin</GivenName>
<FamilyName>Haller</FamilyName>
</AuthorName>
<Contact>
<Email>armin.haller@deri.org</Email>
</Contact>
</Author>
<Affiliation ID="Aff1">
<OrgName>DERI – National University of Ireland, IDA Business Park, Galway</OrgName>
<OrgAddress>
<Country>Ireland</Country>
</OrgAddress>
</Affiliation>
</AuthorGroup>
<Abstract ID="Abs1" Language="En">
<Heading>Abstract</Heading>
<Para>A continuous evolution of business process parameters, constraints and needs, hardly foreseeable initially, requires from the business process management systems a continuous design and a reliable process model. In this paper, we are interested in developing a reactive design through a process log analysis ensuring process re-engineering and execution reliability.</Para>
<Para>We propose to analyse workflow logs to discover workflow transactional behavior and to improve and correct related recovery mechanisms subsequently. Our approach starts by collecting workflow logs. Then, we build, by statistical analysis techniques, an intermediate representation specifying elementary dependencies between activities. These dependencies are refined to mine the transactional workflow model. The analysis of the discrepancies between the discovered model and the initially designed model enables us to detect design gaps, concerning particularly the recovery mechanisms. Thus, based on this mining step, we apply a set of rules on the initially designed workflow to improve workflow reliability.</Para>
</Abstract>
<ArticleNote Type="Misc">
<SimplePara>This material is based upon works supported by the EU funding under the SUPER project (FP6-026850).</SimplePara>
</ArticleNote>
</ChapterHeader>
<NoBody></NoBody>
</Chapter>
</Part>
</Book>
</Series>
</Publisher>
</istex:document>
</istex:metadataXml>
<mods version="3.6">
<titleInfo lang="en">
<title>Mining and Re-engineering Transactional Workflows for Reliable Executions</title>
</titleInfo>
<titleInfo type="alternative" contentType="CDATA">
<title>Mining and Re-engineering Transactional Workflows for Reliable Executions</title>
</titleInfo>
<name type="personal">
<namePart type="given">Walid</namePart>
<namePart type="family">Gaaloul</namePart>
<affiliation>DERI – National University of Ireland, IDA Business Park, Galway, Ireland</affiliation>
<affiliation>E-mail: walid.gaaloul@deri.org</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Sami</namePart>
<namePart type="family">Bhiri</namePart>
<affiliation>DERI – National University of Ireland, IDA Business Park, Galway, Ireland</affiliation>
<affiliation>E-mail: sami.bhiri@deri.org</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Armin</namePart>
<namePart type="family">Haller</namePart>
<affiliation>DERI – National University of Ireland, IDA Business Park, Galway, Ireland</affiliation>
<affiliation>E-mail: armin.haller@deri.org</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<typeOfResource>text</typeOfResource>
<genre displayLabel="OriginalPaper" authority="ISTEX" authorityURI="https://content-type.data.istex.fr" type="conference" valueURI="https://content-type.data.istex.fr/ark:/67375/XTP-BFHXPBJJ-3">conference</genre>
<originInfo>
<publisher>Springer Berlin Heidelberg</publisher>
<place>
<placeTerm type="text">Berlin, Heidelberg</placeTerm>
</place>
<dateIssued encoding="w3cdtf">2007</dateIssued>
<copyrightDate encoding="w3cdtf">2007</copyrightDate>
</originInfo>
<language>
<languageTerm type="code" authority="rfc3066">en</languageTerm>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<abstract lang="en">Abstract: A continuous evolution of business process parameters, constraints and needs, hardly foreseeable initially, requires from the business process management systems a continuous design and a reliable process model. In this paper, we are interested in developing a reactive design through a process log analysis ensuring process re-engineering and execution reliability. We propose to analyse workflow logs to discover workflow transactional behavior and to improve and correct related recovery mechanisms subsequently. Our approach starts by collecting workflow logs. Then, we build, by statistical analysis techniques, an intermediate representation specifying elementary dependencies between activities. These dependencies are refined to mine the transactional workflow model. The analysis of the discrepancies between the discovered model and the initially designed model enables us to detect design gaps, concerning particularly the recovery mechanisms. Thus, based on this mining step, we apply a set of rules on the initially designed workflow to improve workflow reliability.</abstract>
<relatedItem type="host">
<titleInfo>
<title>Conceptual Modeling - ER 2007</title>
<subTitle>26th International Conference on Conceptual Modeling, Auckland, New Zealand, November 5-9, 2007. Proceedings</subTitle>
</titleInfo>
<name type="personal">
<namePart type="given">Christine</namePart>
<namePart type="family">Parent</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Klaus-Dieter</namePart>
<namePart type="family">Schewe</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Veda</namePart>
<namePart type="given">C.</namePart>
<namePart type="family">Storey</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Bernhard</namePart>
<namePart type="family">Thalheim</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<genre type="book-series" authority="ISTEX" authorityURI="https://publication-type.data.istex.fr" valueURI="https://publication-type.data.istex.fr/ark:/67375/JMC-0G6R5W5T-Z">book-series</genre>
<originInfo>
<publisher>Springer</publisher>
<copyrightDate encoding="w3cdtf">2007</copyrightDate>
<issuance>monographic</issuance>
</originInfo>
<subject>
<genre>Book-Subject-Collection</genre>
<topic authority="SpringerSubjectCodes" authorityURI="SUCO11645">Computer Science</topic>
</subject>
<subject>
<genre>Book-Subject-Group</genre>
<topic authority="SpringerSubjectCodes" authorityURI="I">Computer Science</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I18024">Database Management</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I18040">Information Systems Applications (incl.Internet)</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I16048">Mathematical Logic and Formal Languages</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I21017">Artificial Intelligence (incl. Robotics)</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I18016">Models and Principles</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I14029">Software Engineering</topic>
</subject>
<identifier type="DOI">10.1007/978-3-540-75563-0</identifier>
<identifier type="ISBN">978-3-540-75562-3</identifier>
<identifier type="eISBN">978-3-540-75563-0</identifier>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="BookTitleID">157140</identifier>
<identifier type="BookID">978-3-540-75563-0</identifier>
<identifier type="BookChapterCount">40</identifier>
<identifier type="BookVolumeNumber">4801</identifier>
<identifier type="BookSequenceNumber">4801</identifier>
<identifier type="PartChapterCount">3</identifier>
<part>
<date>2007</date>
<detail type="part">
<title>Reuse and Reengineering</title>
</detail>
<detail type="volume">
<number>4801</number>
<caption>vol.</caption>
</detail>
<extent unit="pages">
<start>485</start>
<end>501</end>
</extent>
</part>
<recordInfo>
<recordOrigin>Springer Berlin Heidelberg, 2007</recordOrigin>
</recordInfo>
</relatedItem>
<relatedItem type="series">
<titleInfo>
<title>Lecture Notes in Computer Science</title>
</titleInfo>
<name type="personal">
<namePart type="given">David</namePart>
<namePart type="family">Hutchison</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Takeo</namePart>
<namePart type="family">Kanade</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Josef</namePart>
<namePart type="family">Kittler</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jon</namePart>
<namePart type="given">M.</namePart>
<namePart type="family">Kleinberg</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Friedemann</namePart>
<namePart type="family">Mattern</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">John</namePart>
<namePart type="given">C.</namePart>
<namePart type="family">Mitchell</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moni</namePart>
<namePart type="family">Naor</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Oscar</namePart>
<namePart type="family">Nierstrasz</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">C.</namePart>
<namePart type="family">Pandu Rangan</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Bernhard</namePart>
<namePart type="family">Steffen</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Madhu</namePart>
<namePart type="family">Sudan</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Demetri</namePart>
<namePart type="family">Terzopoulos</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Doug</namePart>
<namePart type="family">Tygar</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moshe</namePart>
<namePart type="given">Y.</namePart>
<namePart type="family">Vardi</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Gerhard</namePart>
<namePart type="family">Weikum</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<originInfo>
<publisher>Springer</publisher>
<copyrightDate encoding="w3cdtf">2007</copyrightDate>
<issuance>serial</issuance>
</originInfo>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="SeriesID">558</identifier>
<recordInfo>
<recordOrigin>Springer Berlin Heidelberg, 2007</recordOrigin>
</recordInfo>
</relatedItem>
<identifier type="istex">AFC6E77868E7646E99939B44EC965068E855C954</identifier>
<identifier type="ark">ark:/67375/HCB-FQK0WL31-K</identifier>
<identifier type="DOI">10.1007/978-3-540-75563-0_33</identifier>
<identifier type="ChapterID">33</identifier>
<identifier type="ChapterID">Chap33</identifier>
<accessCondition type="use and reproduction" contentType="copyright">Springer Berlin Heidelberg, 2007</accessCondition>
<recordInfo>
<recordContentSource authority="ISTEX" authorityURI="https://loaded-corpus.data.istex.fr" valueURI="https://loaded-corpus.data.istex.fr/ark:/67375/XBH-RLRX46XW-4">springer</recordContentSource>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2007</recordOrigin>
</recordInfo>
</mods>
<json:item>
<extension>json</extension>
<original>false</original>
<mimetype>application/json</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-FQK0WL31-K/record.json</uri>
</json:item>
</metadata>
</istex>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Istex/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 002964 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Istex/Corpus/biblio.hfd -nk 002964 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    Istex
   |étape=   Corpus
   |type=    RBID
   |clé=     ISTEX:AFC6E77868E7646E99939B44EC965068E855C954
   |texte=   Mining and Re-engineering Transactional Workflows for Reliable Executions
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022