• 沒有找到結果。

D ETECTION OF R EDUNDANT W RITE A NOMALIES

CHAPTER 6. ILLUSTRATIVE EXAMPLE

6.3. D ETECTION OF R EDUNDANT W RITE A NOMALIES

Table 6.4 shows the steps to calculate the set of unused artifacts for every activity.

Table 6.4. Steps to Calculate the Unused Artifacts for Every Activity.

ps, ls1 NCu=

{

d ,d1 13

}

, NCc= ∅

t1 1

NCu=

{

d ,d , d , d , d , d , d13

( ) ( ) ( ) ( ) ( )

2 3 4 5 10

}

, NCc= ∅

t2 13 2

NCu=

{

d , d , d3 , d4 ,d ,d5 10

}

, NCc = ∅

le1,

t11 NCu=

{

d ,d , d13 5

( )

18

}

, NCc=

{

d , d6 9

}

xj3

{

13 5

} {

6 17 18

}

u c

NC = d ,d , NC = d ,d ,d

aj3 NCu=

{

d ,d , NC13 5

}

c=

{

d ,d ,d6 17 18

}

xj1,xs4

{

13 5

}

6 17 18

u c

NC = d ,d , NC =

{

d ,d , d

}

t12 NCu=

{

d ,d , d13 5

( )

20

}

, NCc =

{

d ,d6 17

}

t13 NCu=

{

d ,d , d13 5

( )

19

}

, NCc =

{

d ,d6 17

}

xj4 NCu=

{

d ,d , NC13 5

}

c=

{

d ,d ,d ,d6 17 20 19

}

t14

{

13 5

}

6 17 20

u c

NC = d ,d , NC =

{

d ,d , d , d19

}

pe

{

13 5

} {

6 17

}

u c

NC = d ,d , NC = d ,d

After visiting Process End vertex, the redundant update anomalies are detected as follows:

 Explicit Redundant Update

{

13 5

} { } {

21 13 5

}

u

EC NC= \Ow= d ,d \ d = d ,d is not empty and thus, a redundant update anomaly occurs for every artifact d EC∈ due to Completely Unused for the Process.

 Potential Redundant Update

{

6 17

} { } {

21 6 17

}

c

CC NC= \Ow= d ,d \ d = d ,d is not empty and thus, a redundant update anomaly occurs for every artifact d CC∈ due to Conditional Unused for the Process.

Chapter 7. Comparisons of Data-flow Analysis Approaches

Current workflow modeling and analyzing paradigms are mainly focused on the control-flow and resource dimensions. Literature reports indicate little work in data-flow dimension such as those in conventional programming languages. Sadiq et al. [7] and Sun et al. [8-10] are two groups working on the analysis in data-flow dimension. In this chapter, we compare our work with them.

Regarding the anomalies addressed, Sun et al. [8-10] claimed that seven types of data-flow anomalies proposed by Sadiq et al. [7] can be either represented by their three basic data-flow anomalies or not a problem at the conceptual level. The anomalies in [7] can be found with our model as follows.

A redundant data anomaly occurs when an activity produces an intermediate data output but this data is not required by any succeeding activity. This anomaly is classified as Redundant Write in our approach.

A lost data anomaly occurs when two parallel activities perform non-read operations on an artifact. This anomaly is classified as Conflict Write (Multiple Parallel Production/Updates) in our approach.

A missing data anomaly occurs when an artifact is accessed before it is initialized. This anomaly is classified as Missing Production in our approach.

A mismatched data anomaly occurs when the structure of the data produced by the source is incompatible with the structure required by the activity that uses the artifact. This anomaly can be regarded as the occurrence of both Missing Production and Redundant Write in our approach.

An inconsistent data anomaly occurs when an initial input artifact of a workflow is updated externally during the execution time of the workflow. As stated by Sun et al., this anomaly is not a problem at the conceptual level.

A misdirected data anomaly occurs when a data-flow direction conflicts with the control flow in a workflow schema. This anomaly is classified as Missing Production (Conditional Production) in our approach.

An insufficient data anomaly occurs when data specified are not sufficient to complete an activity successfully. This anomaly results from ill-designed activity and can be classified as Missing Production in our approach at the semantic level. Table 7.1 summaries the comparison of anomalies addressed among Sadiq et al., Sun et al., and our work.

Table 7.1. Comparison of anomalies addressed.

Our approach Sadiq et al. Sun et al.

After Last Write Redundant data

Mismatched data Redundant data No Consumption

After Last Write

Conflict Write

Multiple Parallel Productions

Lost data

Conflicting data Multiple Parallel Updates

N/A

Parallel Read and Update N/A

Sadiq et al. [7] identify and justify the importance of data modeling in overall workflow design process. In addition, data-flow validation issues and essential requirements of data-flow modeling in workflow specifications are identified. They illustrate and define seven potential data-flow anomalies in above table. However, Sadiq’s work is discussed only on the conceptual level and thus, neither concrete data-flow model nor detecting algorithms are proposed.

Furthermore, operations on data are only classified into read and write type.

Sun et al. [8-10] formulate the data-flow perspective by means of dependency analysis. The data-flow matrix and an extension of the unified modeling language (UML) activity diagram are proposed to specify the data flow in a business process. Then, three basic types of data-flow anomalies, missing data, redundant data, and conflicting data, are defined. Based on the dependency analysis, algorithms to data-flow analysis for discovering the data-flow anomalies are presented. However, as Sadiq’s work, no explicit model is proposed to characterize the behaviors of data. Also, read and initial write operation types are considered only.

Our approach presents a process model to describe workflow schemas. The behaviors of an artifact are explicitly modeled by a finite state machine. The operation types including Initialize, Read, Update, and Destroy, are concerned in this dissertation. Table 7.2 summaries the comparisons.

Table 7.2. A summary of comparisons.

Sadiq et al. Sun et al. This Work

Process Model

N/A

(Conceptual Level)

Data-flow matrices Process data diagram

Control flow Diagram

Operations

Concerned Read, Write Read, Write Read, Initialize, Update, Destroy Detecting

Method N/A Data dependency

analysis

Artifact Usage dependency analysis

Concrete

Algorithm N/A Yes Yes

Complexity N/A Ο(n )3

Ο(n)for Redundant Write and Conflict Writes

Ο(n) for missing productions (without destroy operations)

(n )2

Ο for missing productions (with destroy operations)

Chapter 8. Conclusion and Future Work

The main contribution of this dissertation is to introduce an artifact usage analysis technique into workflow design phase. To achieve this goal, this dissertation presents a business process model for describing a business process and analyzes the artifact usages on this model. In our model, the usages of an artifact are characterized by its state transition diagram. Among the usages of artifacts, three types with thirteen cases of improper artifact usage affecting workflow execution are identified and formulated and a set of algorithms to discovering these anomalies is presented. An example is demonstrated to validate the usability of the proposed algorithms.

We are currently continuing our research in several directions. First, we plan to implement the proposed model and algorithms on current workflow management systems, such as Agentflow [38], so that our research result can be tested in real-world applications. Second, we will continue the analysis on composite artifacts with more complex usages using Revise operations. The third is to integrate resource constrains analysis techniques with our work to build a practical workflow design methodology.

Reference

1 The Workflow Management Coalition, “The workflow reference model”, Document Number TC00-1003, January 1995.

2 P. Senkul and I.H. Toroslu, “An architecture for workflow scheduling under resource allocation constraints”, Information Systems, Vol. 30, Issue 5, pp. 399-422, PERGAMON, July 2005.

3 H. Li, Y. Yang and T.Y. Chen, “Resource constraints analysis of workflow specifications”, Journal of Systems and Software, Vol. 73, No. 2, pp. 271–285, Elsevier Science, October 2004.

4 C. Liu, X. Lin, M.E. Orlowska, and X. Zhou, “Confirmation: increasing resource availability for transactional workflows”, Information Sciences, Vol. 153, Issue 1, pp. 37-53, Elsevier Science Inc, July 2003.

5 W. Du and M.C. Shan, “Enterprise workflow resource management”, Proceedings of the Ninth International Workshop on Research Issues on Data Engineering: Information Technology for Virtual Enterprises, pp. 108-115, IEEE Computer Society, March 1999.

6 M.Z. Muehlen, “Resource modeling in workflow applications”, Proceedings of the 1999 Workflow Management Conference, pp. 137-153, Münster, Germany, November 1999.

7 S. Sadiq, M.E. Orlowska, W. Sadiq, and C. Foulger, ”Data flow and validation in workflow modeling”, Proceedings of the 15th Australasian database conference, pp. 207-214, Dunedin, New Zealand, January 2004.

8 S.X. Sun, and J.L. Zhao, "A data flow approach to workflow design", Proceedings of the 14th Workshop on Information Technology and Systems (WITS’04), pp. 80-85, 2004.

9 S.X. Sun, J.L. Zhao, and O.R. Sheng, "Data flow modeling and verification in business process management", Proceedings of the AIS Americas Conference on Information Systems, pp. 4064-4073, New York, August 5-8, 2004.

10 S.X. Sun, J.L. Zhao, J.F. Nunamaker, and O.R.L. Sheng, “Formulating the data flow perspective for business process management”, Information Systems Research, Vol. 17, No. 4, pp. 374-391, December 2006.

11 H. Zhuge, “Component-based workflow systems development”, Decision Support Systems, Vol. 35, Issue 4, pp. 517-536, Elsevier Science Publishers, July 2003.

12 A.S. Hitomi and D. Le, “Endeavors and component reuse in web-driven process workflow”, Proceedings of the California Software Symposium, pp. 15-20, Irvine, CA, USA, October 1998.

13 H.-J Hsu, “Using state diagrams to validate artifact specifications on primitive workflow schema”, National Chiao-Tung University, M.S. Thesis, 2005.

14 F.-J. Wang, C.-L. Hsu, and H.-J. Hsu, “Analyzing inaccurate artifact usages in a workflow schema”, Proceedings of the 30th Annual International Computer Software and Applications Conference (COMPSAC'06), Vol. 2, pp. 109-114, September 17-21, 2006.

15 B. Curtis, M.I. Kellner, and J. Over, “Process modeling”, CACM Vol. 35, No. 9, pp. 75–90.

16 S. Jablonski and C. Bussler, Workflow management: modeling concepts, architecture, and implementation, International Thomson Computer Press, London, UK, 1996.

17 C. Karamanolis, D. Giannakopoulou, J. Magee, and S.M. Wheater, “Model checking of workflow schemas”, Proceeding of Fourth International Enterprise Distributed Object Computing Conference (EDOC'00), pp. 170-179, IEEE Computer Society, September 2000.

18 W.M.P. van der Aalst, “The application of petri nets to workflow management”, Journal of Circuits, Systems and Computers, Vol. 8, No. 1, pp. 21-66, 1998.

19 W.M.P. van der Aalst and A.H.M. ter Hofstede, “Verification of workflow task structures: a petri-net-based approach”, Information Systems, Vol. 25, No. 1, pp. 43-69, 2000.

20 W.M.P. van der Aalst, A.H.M. ter Hofstede, B. Kiepuszewski, and A.P. Barros, “Workflow patterns”, BETA Working Paper Series, WP 47, Eindhoven University of Technology, Eindhoven, 2000.

21 W.M.P. van der Aalst, A.H.M. ter Hofstede, B. Kiepuszewski, and A.P. Barros, “Advanced workflow patterns”, Proceeding of 7th International Conference on Cooperative Information Systems (CoopIS 2000), Vol. 1901 of Lecture Notes in Computer Science, pp. 18-29.

Springer-Verlag, Berlin, 2000.

22 W.M.P. van der Aalst, A.H.M. ter Hofstede, B. Kiepuszewski, and A.P. Barros, “Workflow

patterns”, Distributed and Parallel Databases, Vol. 14, No. 1, pp. 5-51, July 2003.

23 W.M.P. van der Aalst, “Verification of workflow nets”, Proceedings of the 18th International Conference on Application and Theory of Petri Nets, pp. 407-426, Toulouse, France, June 23-27, 1997.

24 W.M.P. van der Aalst, “The application of petri-nets to workflow management”, Journal of Circuits, Systems and Computers, Vol. 8, No. 1, pp. 21-66, 1998.

25 W.M.P. van der Aalst and T. Basten, “Inheritance of workflows: an approach to tackling problems related to change”, Theoretical Computer Science, Vol. 270, No. 1-2, pp. 125-203, 2002.

26 H.M.W. Verbeek and W.M.P. van der Aalst, “Woflan 2.0: a petri-net-based workflow diagnosis tool”, Proceedings of the 21st International Conference of Application and Theory of Petri Nets (ICATPN 2000), pp. 475-484, Aarhus, Denmark, June 26-30, 2000.

27 C. Karamanolis, D. Giannakopoulou, J. Magee, and S.M. Wheater, “Formal verification of workflow schemas”, Technical Report, Control and Coordination of Complex Distributed Services, ESPRIT Long Term Research Project, 2000.

28 H.M.W. Verbeek, T. Basten, and W.M.P. van der Aalst, “Diagnosing workflow processes using woflan”, The Computer Journal, Vol. 44, No. 4, pp. 246-279, 2001.

29 L. Gong and H.-Y. Wang, “A method to verify the soundness of workflow control logic”, Computer Supported Cooperative Work in Design, Vol. 1, pp. 284-388, May 2004.

30 W. Sadiq and M.E. Orlowska, “Analyzing process models using graph reduction techniques”, Information Systems, Vol. 25, No. 2, pp. 117-134, Elsevier Science Publishers, 2000.

31 W. Sadiq and M.E. Orlowska, “On correctness issues in conceptual modeling of workflows”, Proceedings of the 5th European Conference on Information Systems (ECIS ‘97), Cork, Ireland, June 19-21, 1997.

32 W. Sadiq and M.E. Orlowska, “Applying graph reduction techniques for identifying structural conflicts in process models”, Proceedings of the 11th International Conference on Advanced Information Systems Engineering (CAiSE '99), Vol. 1626 of Lecture Notes in Computer Science, pp. 195-209, Springer-Verlag, Berlin, 1999.

33 N. Russell, A.H.M. ter Hofstede, D. Edmond, and W.M.P. van der Aalst, “Workflow data patterns”, QUT Technical report, FIT-TR-2004-01, Queensland University of Technology, Brisbane, 2004.

34 J. Bae, H. Bae, S.-H. Kang, and Y. Kim, “Automatic control of workflow processes using ECA rules”, IEEE Transaction on Knowledge and Date Engineering, Vol. 14, No. 8, pp. 1010-1023, IEEE Computer Society, August 2004.

35 J.H. Son, and M.H. Kim, “Extracting the workflow critical path from the extended well-formed workflow schema”, Journal of Computer and System Sciences, Vol. 70, Issue 1, pp. 86-106, Elsevier Science Publishers, February 2005.

36 D.-H. Chang, J.H. Son, and M.H. Kim, “Critical path identification in the context of a workflow”, Information & Software Technology, Vol. 44, No. 7, pp. 405-417, Elsevier Science Publishers, May 2002.

37 Object Management Group. 2006, Business Process Modeling Notation (BPMN), http://www.bpmn.org/.

38 Flowring Technology Corp., http://www.flowring.com, accessed May 2006.

39 The Workflow Management Coalition, “Terminology & glossary”, Document Number WFMC-TC-1011, February 1999.

40 N.R. Adam, V. Atluri, and W.K. Huang, “Modeling and analysis of workflows using petri nets”, Journal of Intelligent Information Systems, Vol. 10, No. 2, pp. 131-158, March/April 1998.

41 M. Koubarakis and D. Plexousakis, “A formal framework for business process modelling and design”, Information Systems, Vol. 27, No. 5, pp. 299-319, July 2002.

42 H. Davulcu, M. Kifer, C.R. Ramakrishnan, and I.V. Ramakrishnan, “Logic based modeling and analysis of workflows”, Proceedings of the 17th ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems, pp. 25-33, Seattle, Washington, United States, June 01-04, 1998.

43 P. Senkul, M. Kifer and I.H. Toroslu, “A logical framework for scheduling workflows under resource allocation constraints”, Proceeding of 28th International Conference on Very Large

Data Bases (VLDB’02), pp. 694–702, August 2002.

44 G. Trajcevski, C. Baral, and J. Lobo, “Formalizing (and Reasoning About) the specifications of workflows”, Proceedings of the 7th International Conference on Cooperative Information Systems, pp. 1-17, September 06-08, 2000.

45 N. Tatbul, S. Nural, P. Karagoz, I. Cingil, E. Gokkoca, M. Altinel, P. Koksal, and A. Dogac, “A workflow specification language and its scheduler”, Proceedings of International Conference on Computer and Information Sciences, pp. 163-170, Antalya, Turkey, November 1997.

46 S. Chinn, and G. Madey, “Temporal representation and reasoning for workflow in engineering design change review”, IEEE Transactions on Engineering Management, Vol. 47, No. 4, pp.

485-492, 2000.

47 A.H.M. ter Hofstede and M.E. Orlowska, “On the complexity of some verification problems in process control specifications”, The Computer Journal, Vol. 42, No. 5, pp. 349-359, 1999.

48 A.H.M. ter Hofstede, M.E. Orlowska, and J. Rajapakse, “Verification problems in conceptual workflow specifications”, Data and Knowledge Engineering, Vol. 24, Iss. 3, pp. 239-256, 1998.

49 C. Karamanolis, D. Giannakopoulou, J. Magee, and S. Wheater, “Modeling and analysis of workflow processes”. Technical Report 99/2, Department of Computing, Imperial College.

50 K. Kim, C.A. Ellis, “Performance analytic models and analyses for workflow architectures”, Journal of Information Systems Frontiers, Vol. 3, No. 3, pp. 339-355, September 2001.

51 A. Zaidi, “On temporal logic programming using petri nets”, IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans, Vol. 29, Issue 3, pp. 245-254, 1999.

52 M. Rosemann and M. zur Mühlen, “Evaluation of workflow management systems: a meta-model approach”,: Australian Journal of Information Systems, Vol. 6, No. 1, pp. 103-116, 1998.

53 E. Bertino; E. Ferrari, and V. Atluri, “The specification and enforcement of authorization constraints in workflow management systems”, ACM Transactions on Information and System Security, Vol. 2 , Iss. 1, pp. 65-104, 1999.

54 O. Marjanovic, “Dynamic verification of temporal constraints in production workflows”,

Proceedings of the Australian Database Conference ADC'2000, pp. 74-81, January 31-February 03, 2000.

55 M. Reichert and P. Dadam, “Adeptflex—Supporting Dynamic Changes of Workflows Without Losing Control”, Journal of Intelligent Information Systems, Vol. 10, No. 2, pp. 93-129, March/April 1998.

56 A. Bajaj and S. Ram, "Seam: a state-entity-activity-model for a well-defined workflow development methodology", IEEE Transactions on Knowledge and Data Engineering, Vol. 14, No. 2, pp. 415-431, March/April 2002.

57 A. Kumar and J.L. Zhao, "Dynamic routing and operational control in workflow management systems", Management Science, Vol. 35, No. 2, pp. 253-272, February 1999.

58 M.M. Kwan and P.R. Balasubramanian, "Dynamic workflow management: a framework for modeling workflows", Proceedings of the 13th Hawaii International Conference on System Sciences, Vol. 4, pp. 367-376, January 7-10, 1997.

59 H.B. Luo, Y.S. Fan, and C. Wu, “Analysis of event balance in the verification of workflow soundness”, Journal of Software, Vo1. 13, No. 8, pp. 1686-1691, 2002.

相關文件