• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Querying structural and behavioral properties of business processes (2007)

by Daniel Deutch, Tova Milo
Venue:In DBPL
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 13
Next 10 →

Type Inference and Type Checking for Queries on Execution Traces

by Daniel Deutch, et al. , 2008
"... This paper studies, for the first time, the management of type information for an important class of semi-structured data: nested DAGs (Directed Acyclic Graphs) that describe execution traces of business processes (BPs for short). Specifically, we consider here type inference and type checking for q ..."
Abstract - Cited by 15 (10 self) - Add to MetaCart
This paper studies, for the first time, the management of type information for an important class of semi-structured data: nested DAGs (Directed Acyclic Graphs) that describe execution traces of business processes (BPs for short). Specifically, we consider here type inference and type checking for queries over BP execution traces. The queries that we consider select portions of the traces that are of interest to the user; the types describe the possible shape of the execution traces in the input/output of the query. We formally define and characterize here three common classes of BP execution traces and their respective notions of type inference and type checking. We study the complexity of the two problems for query languages of varying expressive power and present efficient type inference/checking algorithms whenever possible. Our analysis offers a nearly complete picture of which combinations of trace classes and query features lead to PTIME algorithms and which to NP-complete or undecidable problems.
(Show Context)

Citation Context

...er query formalisms sharing similar expressive power. A detailed comparison to related data models and query languages (including temporal logics [18], MSO, equational sets [9], etc.) can be found in =-=[10]-=-. In the Related Work section (Section 6) we further compare known results on these models to our results, highlighting our relative contribution. The paper is organized as follows. Section 2 introduc...

TOP-K Projection Queries for Probabilistic Business Processes

by Daniel Deutch, Tova Milo
"... A Business Process (BP) consists of some business activities undertaken by one or more organizations in pursuit of some business goal. Tools for querying and analyzing BP specifications are extremely valuable for companies. In particular, given a BP specification, identifying the top-k flows that ar ..."
Abstract - Cited by 11 (6 self) - Add to MetaCart
A Business Process (BP) consists of some business activities undertaken by one or more organizations in pursuit of some business goal. Tools for querying and analyzing BP specifications are extremely valuable for companies. In particular, given a BP specification, identifying the top-k flows that are most likely to occur in practice, out of those satisfying the criteria of a given query, is crucial for various applications such as personalized advertisements and BP web-site design. This paper studies, for the first time, top-k query evaluation for queries with projection in this context. We analyze the complexity of the problem for different classes of distribution functions for the flows likelihood, and provide efficient (PTIME) algorithms whenever possible. Furthermore, we show an interesting application of our algorithms to the analysis of BP execution traces (logs), for recovering missing information about the run-time process behavior, that has not been recorded in the logs. 1
(Show Context)

Citation Context

...complete with respect to the query size to decide whether there exists a projection q↓(e) with score greater than t. NP-hardness may be proved by reduction from emptiness of the results set, shown in =-=[13]-=- to be NPhard. The NP algorithm is based on a “Pumping Lemma”, guaranteeing that it suffices to use polynomial sized “guesses” (details omitted for space constraints). Interestingly, the problem remai...

Evaluating top-k queries over business processes

by Daniel Deutch, Tova Milo
"... Abstract — A Business Process (BP) consists of some business activities undertaken by one or more organizations in pursuit of some business goal. Tools for querying and analyzing BP specifications are extremely valuable for companies as they allow to optimize the BP, identify potential problems, and ..."
Abstract - Cited by 7 (2 self) - Add to MetaCart
Abstract — A Business Process (BP) consists of some business activities undertaken by one or more organizations in pursuit of some business goal. Tools for querying and analyzing BP specifications are extremely valuable for companies as they allow to optimize the BP, identify potential problems, and reduce operational costs. In particular, given a BP specification, identifying the top-k execution flows that are most likely to occur in practice out of those satisfying the query criteria, is crucial for various applications. To address this need, we introduce in this paper the notion of likelihood for BP execution flows, and study top-k query evaluation (finding the k most likely matches) for queries over BP specifications. We analyze the complexity of query evaluation in this context and present novel algorithms for computing topk query results. To our knowledge, this is the first paper that studies such top-k query evaluation for BP specifications. I.
(Show Context)

Citation Context

...s used by commercial vendors for the specification of BPs [3]. The same arguments hold for our setting. A detailed comparison to related, non-probabilistic data models and query languages is given in =-=[7]-=-, and we next review some of the related probabilistic models. Probabilistic Databases (PDBs) [8], [9] and Probabilistic Relational Models (PRMs) [10] allow representation of uncertain information. Ho...

Modeling and verifying security policies in business processes

by Mattia Salnitri, Fabiano Dalpiaz, Paolo Giorgini - In Proc. of BPMDS’14
"... Abstract. Modern information systems are large-sized and comprise multiple heterogeneous and autonomous components. Autonomy enables decentralization, but it also implies that components providers are free to change, retire, or intro-duce new components. This is a threat to security, and calls for a ..."
Abstract - Cited by 5 (3 self) - Add to MetaCart
Abstract. Modern information systems are large-sized and comprise multiple heterogeneous and autonomous components. Autonomy enables decentralization, but it also implies that components providers are free to change, retire, or intro-duce new components. This is a threat to security, and calls for a continuous veri-fication process to ensure compliance with security policies. Existing verification frameworks either have limited expressiveness—thereby inhibiting the specifi-cation of real-world requirements—, or rely on formal languages that are hardly employable for modeling and verifying large systems. In this paper, we overcome the limitations of existing approaches by proposing a framework that enables: (1) specifying information systems in SecBPMN, a security-oriented extension of BPMN; (2) expressing security policies through SecBPMN-Q, a query lan-guage for representing security policies; and (3) verifying SecBPMN-Q against SecBPMN specifications via an implemented query engine. We report on the ap-plicability of our approach via a case study about air traffic management.
(Show Context)

Citation Context

...at are compliant with patterns that are defined through the query language proposed; however, BPMN is not used as a basis for the query language. Similarly, the Business Process Query Language (BPQL) =-=[8]-=- permits to graphically define both queries and business process models using the same language. Unfortunately, BPQL is not based on BPMN, hence the learning process is likely to be less quick than th...

Querying Web-Based Applications Under Models of Uncertainty

by Daniel Deutch , 2008
"... Many businesses offer their services to customers via Webbased application interfaces. Reasoning about execution flows of such applications is extremely valuable for companies. Such reasoning must often operate under terms of uncertainty and partial information, due to partial tracing, effects of un ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Many businesses offer their services to customers via Webbased application interfaces. Reasoning about execution flows of such applications is extremely valuable for companies. Such reasoning must often operate under terms of uncertainty and partial information, due to partial tracing, effects of unknown external parameters, and more. The objectives of this research are (1) to define models for capturing Web application executions, with partial information and uncertainly of various flavors, (2) to design algorithms that allow for efficient reasoning over applications/execution traces under these models, and (3) to provide practical implementations that exploit these sound theoretical foundations for effective optimization of Web applications. We identify a restricted class of models that capture realistic scenarios, while allowing for an efficient query-based applications analysis. Hardness results indicate the necessity of such restricted models. We describe these results, highlight open problems, and consider directions for future research.

Querying and Monitoring Distributed Business Processes

by Tova Milo, et al.
"... ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract not found

Type inference and type checking for queries over execution traces

by Daniel Deutch, Tova Milo , 2012
"... ... for queries over the execution traces of Business Processes. We define formal models for such execution traces, allowing to capture various realistic scenarios of partial information about these traces. We then define corresponding notions of types, and the problems of type inference and type ch ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
... for queries over the execution traces of Business Processes. We define formal models for such execution traces, allowing to capture various realistic scenarios of partial information about these traces. We then define corresponding notions of types, and the problems of type inference and type checking in this context. We further provide a comprehensive study of the decidability and complexity of these problems, in various cases, and suggest efficient algorithms where possible.

Answering DAG queries . . .

by Maya Ben-Ari , 2008
"... ..."
Abstract - Add to MetaCart
Abstract not found

On Models and Query Languages for Probabilistic Processes

by Daniel Deutch, Tova Milo
"... Probabilistic processes appear naturally in various contexts, with applications to Business Processes, XML data management and more. Many models for specifying and querying such processes exist in the literature; a main goal of research in this area is to design models that are expressive enough to ..."
Abstract - Add to MetaCart
Probabilistic processes appear naturally in various contexts, with applications to Business Processes, XML data management and more. Many models for specifying and querying such processes exist in the literature; a main goal of research in this area is to design models that are expressive enough to capture real-life processes and analysis tasks, but at the same time allow for efficient query evaluation. We depict the model established in [13, 16, 17, 18], and claim that it achieves a good balance between expressivity and query evaluation complexity. We compare and contrast the model with other common models for probabilistic processes, highlighting the different choices made in models design and their effect on expressivity and incurred complexity.
(Show Context)

Citation Context

...anguage but not in temporal logic. To that end, note that temporal logics are bisimulationinvariant, intuitively meaning that they can query only the process “behavior” rather than its structure (see =-=[14]-=- for exact notions). In contrast, our query language takes a database approach and allows to further query the structure of the process as well as the structure of its possible executions. Indeed, we ...

Querying Contract Databases Based on Temporal Behavior

by Elio Damaggio, Alin Deutsch, Dayou Zhou
"... Considering a broad definition for service contracts (beyond web services and software, e.g. airline tickets and insurance policies), we tackle the challenges of building a high performance broker in which contracts are both specified and queried through their temporal behavior. The temporal dimensi ..."
Abstract - Add to MetaCart
Considering a broad definition for service contracts (beyond web services and software, e.g. airline tickets and insurance policies), we tackle the challenges of building a high performance broker in which contracts are both specified and queried through their temporal behavior. The temporal dimension, in conjunction with traditional relational attributes, enables our system to better address difficulties arising from the great deal of information regarding the temporal interaction of the various events cited in contracts (e.g. "No refunds are allowed after a reschedule of the flight, which can be requested only before any flight leg has been used"). On the other hand, querying large repositories of temporal specifications poses an interesting indexing challenge. In this paper, we introduce two distinct and complementary indexing techniques that enable our system to scale the evaluation of a novel and theoretically sound notion of permission of a temporal query by a service contract. Our notion of permission is inspired by previous work on model checking but, given the specific characteristic of our problem, does not reduce to it. We evaluate experimentally our implementation, showing that it scales well with both the number and the complexity of the contracts. Categories and Subject Descriptors
(Show Context)

Citation Context

...aphs encoding the BPEL specification. An exact query evaluation algorithm is presented that allows to query the structure of the specification graphs using graph queries. The framework is extended in =-=[7]-=-, in order to consider some behavioral semantics. The premise of this line of work differs from ours in that business processes are handled as procedural implementations (workflows), while in our work...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University