2011
DOI: 10.2298/csis100411031f
|View full text |Cite
|
Sign up to set email alerts
|

The trustworthiness analyzing of interacting business process based on the induction information

Abstract: Under the open environments, it is very difficult to guarantee the trustworthiness of interacting business process using traditional software engineering methods, at the same time, for dealing with the influence of external factors, some proposed business process mining methods are only effective 1-bounded business process, and some behavior dependent relationships are ignore. A behavior trustworthiness analysis method of business process based on induction information is presented in the pap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…5a-5e illustrates the cases of lost data. Its basic solutions are to remove the unnecessary data item in a write operation (i.e., Steps (1)-( 4), ( 7)-( 8), ( 11)- (15), and ( 18)-( 19) in Algorithm 3) or not repair (i.e., Steps (5)-( 6) and ( 16)- (17) in Algorithm 3). If a data item d satisfies Type(d) = Cons, the lost data in Figs.…”
Section: Repairing Unnecessary Lost Data (Ld)mentioning
confidence: 99%
See 1 more Smart Citation
“…5a-5e illustrates the cases of lost data. Its basic solutions are to remove the unnecessary data item in a write operation (i.e., Steps (1)-( 4), ( 7)-( 8), ( 11)- (15), and ( 18)-( 19) in Algorithm 3) or not repair (i.e., Steps (5)-( 6) and ( 16)- (17) in Algorithm 3). If a data item d satisfies Type(d) = Cons, the lost data in Figs.…”
Section: Repairing Unnecessary Lost Data (Ld)mentioning
confidence: 99%
“…In this paper, we use WFD-net systems to analyze the correctness of control-/data-flows in workflow systems. It is assumed that our control-flows in WFD-net systems are sound (i.e., no deadlocks [9,15,16] or livelocks [17][18][19]), without taking data operations into consideration [12,20,21]. The aim of this paper is to detect and repair four kinds of data-flow errors (i.e., redundant data, missing data, lost data, and inconsistent data) in WFD-net systems.…”
Section: Introductionmentioning
confidence: 99%
“…However, their work mostly concerned software rather than systems themselves. Xu and Nygard [7], Fang et al [16] proposed a method to locate change based on behavioral profiles. They determined the different parts by comparing the differences between two models.…”
Section: Related Workmentioning
confidence: 99%
“…This section describes the basic concepts and definitions used in this paper. For more details, the definitions of Petri nets and labeled Petri nets can be found in [16], [36]- [47]. For the definitions of the hidden Markov model and Bayes' theorem, we can refer to [48]- [58].…”
Section: Preliminariesmentioning
confidence: 99%
“…Based on extended the Martin-Lf's type theory (MTT) which supports a type-theoretic formulation of services behavior structured patterns, Yin [7] proposed the verification on consistency and compatibility of Web services behavior. Fang [8] studied the soundness property form the language viewpoint of the workflow net system. Net language depiction for soundness was presented to reveal the behavior characteristic of this basic property.…”
Section: Introductionmentioning
confidence: 99%