Configurable Process Models: Elicitation, Analysis, and Execution

Slides:



Advertisements
Similar presentations
Yammer Technical Solutions Overview
Advertisements

European Organization for Nuclear Research LHC GCS Recipes Geraldine Thomas 11 December 2009.
GEMINI Portal Charles Carpenter. GEMINI Portal Allows for a visual overview of slice.
Interception of User’s Interests on the Web Michal Barla Supervisor: prof. Mária Bieliková.
Finding the best in the family Schunselaar, Verbeek, Van der Aalst, Reijers.
Creating Sound and Reversible Configurable Process Models using CoSeNets Dennis Schunselaar, Verbeek, Van der Aalst, Reijers
Virtual Environments: Easy Modeling of Interdependent Virtual Appliances in the Cloud Xabriel J. Collazo-Mojica 1, S. Masoud Sadjadi 1, Fabio Kon 2, Dilma.
A Virtual Organisation for e-Learning Nicola Capuano, Pierre Carrolaggi, Jerome Combaz, Fabio Crestani, Matteo Gaeta, Erich Herber, Enver Sangineto, Krassen.
Mandatory Assignment Specification of IT Systems.
SalesForce Kyle Boris Chinwe Ijoma-Wosu Mary Ann Rafael.
ETW Session xPerfView xPerf 2. ETW contains a collection of configurable in-memory buffers 1. Any component that has been instrumented.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
1 Web Content Delivery Reading: Section and COS 461: Computer Networks Spring 2007 (MW 1:30-2:50 in Friend 004) Ioannis Avramopoulos Instructor:
Overview of Data Management solutions for the Control and Operation of the CERN Accelerators Database Futures Workshop, CERN June 2011 Zory Zaharieva,
Automatic Software Testing Tool for Computer Networks ARD Presentation Adi Shachar Yaniv Cohen Dudi Patimer
Show Car Event Management Solution PeoplePlus Copyright PeoplePlus Software 2011.
WC2011 Programming Mobile Devices Android Development Day 2.
W. Sliwinski – eLTC – 7March08 1 LSA & Safety – Integration of RBAC and MCS in the LHC control system.
Monitoring Latency Sensitive Enterprise Applications on the Cloud Shankar Narayanan Ashiwan Sivakumar.
A Business solution for your account payable capture process David Dejean.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
Implementing Identity Management, Provisioning, and LDAP Authentication for PeopleSoft June 8, 2007 USM Conference Coppin State University.
Marcel Casado NCAR/RAP WEATHER WARNING TOOL NCAR.
Part 04 – Preparing to Deploy to the Cloud Entity Framework and MVC Series Tom Perkins NTPCUG.
Starting Your Own Business Renee Williams EDTC560 University of Phoenix Susan Ferebee.
Introduction to network management. INTRODUCTION ● Course Overview ● Course Objectives.
Kenya Network Information Centre (KENIC). Introduction KENIC is the registry for the.KE ccTLD. Local and non-profit organization Mandate is to Manage.
Data Tagging Architecture for System Monitoring in Dynamic Environments Bharat Krishnamurthy, Anindya Neogi, Bikram Sengupta, Raghavendra Singh (IBM Research.
LITEBI 2011 © Company Overview. Who are we? Business Intelligence providers since 2007 Leading Cloud Computing Platform Customer and Partners in 24 countries.
ICDL 2004 Improving Federated Service for Non-cooperating Digital Libraries R. Shi, K. Maly, M. Zubair Department of Computer Science Old Dominion University.
For Goal-Driven Business Process Modeling Saeed A.Behnam,  Daniel Amyot, Gunter Mussbacher SITE, University of.
Monotonicity Schunselaar, Verbeek, Van der Aalst, Reijers.
A university for the world real R © 2009, Chapter 9 The Runtime Environment Michael Adams.
1 Chapter Overview Defining Operators Creating Jobs Configuring Alerts Creating a Database Maintenance Plan Creating Multiserver Jobs.
About OlaTech We create web based custom software applications for businesses.
Lesley Cowley Chief Executive The Management Challenges as a Registry grows.
Final Presentation Avilés-Angélica, Blanco-Alberto, Fuentes-Alba, Pell-Xavier, Schenini-Juan, Talukder-Nurul.
Developing and applying business process models in practice Statistics Norway Jenny Linnerud and Anne Gro Hustoft.
MAZETTE: Multi-agents MUSETTE for sharing and reusing ontologies Jesus Arana, Salima Hassas and Yannick Prié 28 October 2004 Claude Bernard University,
Module 12: Configuring and Managing Storage Technologies
Feb 24-27, 2004ICDL 2004, New Dehli Improving Federated Service for Non-cooperating Digital Libraries R. Shi, K. Maly, M. Zubair Department of Computer.
Understand Windows Services Software Development Fundamentals LESSON 5.3.
Selling a Product or Service Website. Website Objective Developing or Designing a Website 40 Questions and Questionnaire with 30 questions are to be filled.
Intelligent Database Systems Lab Presenter : JHOU, YU-LIANG Authors : Jae Hwa Lee, Aviv Segev 2012 CE Knowledge maps for e-learning.
Innovative Partnership Solution-Driven Commitment Agile Value Sustainable.
Interstage BPM v11.2 1Copyright © 2010 FUJITSU LIMITED INTERSTAGE BPM ARCHITECTURE BPMS.
Building a Better Mousetrap (Smarter). Introduction Background The Challenge Our Approach Why build models Thoughts.
CONTACT US: USA: , INDIA: ,
1 The XMSF Profile Overlay to the FEDEP Dr. Katherine L. Morse, SAIC Mr. Robert Lutz, JHU APL
Integrated Management System
YAWL in the Cloud: Supporting Process Sharing and Variability
Using a Gateway to Leverage On-Premises data in Power BI
SAP University Alliances
Lessons learned from moving to Microsoft Azure
On the road: Test automation in practice for a BMW map update service
ServiceNow Implementation Knowledge Management
YourDataStories: Transparency and Corruption Fighting through Data Interlinking and Visual Exploration Georgios Petasis1, Anna Triantafillou2, Eric Karstens3.
Welcome.
Complete 1z0-161 Exam Dumps - Pass In 24 Hours - Dumps4download.us
technical-service/ technical-service/
ACS and the Cloud.
Northbound API Dan Shmidt | January 2017
A test technique is a recipe these tasks that will reveal something
Hierarchical Search on DisCSPs
Jim Powers - Director, Fleet Engineering
Hierarchical Search on DisCSPs
Using Customer feedback for Automated Test-suite
Systems & Technologies of Business Intelligence
SOA Strategies for Enterprise X
Presentation transcript:

Configurable Process Models: Elicitation, Analysis, and Execution Dennis Schunselaar

Motivation CoSeLoG

Doing the same differently 3

Challenge 1 4

Challenge 2 1 2

Challenge 3 1 2 3

Challenge 4 1 2 3 4

Challenge 5 1 2 3 4 ≤ ≤ 5 ≤ ≤

Challenge 6 1 2 3 6 4 ≤ ≤ 5 ≤ ≤

Overview 1 2 3 6 4 ≤ ≤ 5 ≤ ≤

Configurable Process Models

Configurable Process Models

Configurable Process Models

Overview 1 2 3 6 4 ≤ ≤ 5 ≤ ≤

Merge

Merge

Merge

Merge

Merge

Merge

Overview 1 2 3 6 4 ≤ ≤ 5 ≤ ≤

Petra

Petra

Petra

Overview 1 2 3 6 4 ≤ ≤ 5 ≤ ≤

Automatic configuration support Domain Expert Organisation Process Model ??? Information System Clerk Financial Employee Civil register Financial data Archive

Automatic configuration support Modelling Expert Domain Expert Organisation Process Model Information System Clerk Financial Employee Civil register Financial data Archive

Automatic configuration support Consistency graph Concepts Domain Expert Organisation Process Model Information System Clerk Financial Employee Civil register Financial data Archive

Automatic configuration support excerpt customer clerk adm. empl. Fin. empl. recept. produce sign ask send - to pay {<cust.>} {<cust., clerk>} {<cust., fin. empl.>} {<cust., clerk, ask>, <cust., fin. empl., ask>} {<excerpt>} {<excerpt, clerk>}

Overview 1 2 3 6 4 ≤ ≤ 5 ≤ ≤

≤ Monotonicity ≤ ≤ ≤ ≤ ≤ ≤ Throughput time

Every case is done at-least-as fast ≤ Monotonicity ≤ E A G ≤ B F D F G G A E Every case is done at-least-as fast ≤ C G ≤ ≤ E A G C F G D F G A E B E G ≤ A G D F G

Every case is done at-least-as fast ≤ Monotonicity ≤ E A G ≤ B F D G Mapping F G A E Every case is done at-least-as fast C G V’ V E’ E

Overview 1 2 3 6 4 ≤ ≤ 5 ≤ ≤

Cloud IS = Information System E = Event log M = Models

Cloud IS-SaaS = Information System (SaaS-based BPMS) E = Event log CM = Configurable Models C = Configuration

Cloud Management Component YAWL in the cloud Router In 1 Router In k Load balancer DB Router Out 1 Router Out l Load balancer - No changes to YAWL - No difference for the end-user

Conclusion 1 2 3 6 4 ≤ ≤ 5 ≤ ≤

Questions