Database transaction models for advanced applications
Database transaction models for advanced applications
Concurrency control and recovery of multidatabase work flows in telecommunication applications
SIGMOD '93 Proceedings of the 1993 ACM SIGMOD international conference on Management of data
An overview of workflow management: from process modeling to workflow automation infrastructure
Distributed and Parallel Databases - Special issue on software support for work flow management
Flexible specification of workflow compensation scopes
GROUP '97 Proceedings of the international ACM SIGGROUP conference on Supporting group work: the integration challenge
FlowBack: providing backward recovery for workflow management systems
SIGMOD '98 Proceedings of the 1998 ACM SIGMOD international conference on Management of data
Event-based detection of concurrency
SIGSOFT '98/FSE-6 Proceedings of the 6th ACM SIGSOFT international symposium on Foundations of software engineering
Modeling and Analysis of Workflows Using Petri Nets
Journal of Intelligent Information Systems - Special issue on workflow management systems
Verification problems in conceptual workflow specifications
Data & Knowledge Engineering - Special issue on ER '96
Exterminating the Dynamic Change Bug: A Concrete Approach to Support Workflow Change
Information Systems Frontiers
A Multidatabase Transaction Model for InterBase
VLDB '90 Proceedings of the 16th International Conference on Very Large Data Bases
A Data Warehouse for Workflow Logs
EDCIS '02 Proceedings of the First International Conference on Engineering and Deployment of Cooperative Information Systems
CooplS '02 Proceedings of the 7th International Conference on Cooperative Information Systems
COOPIS '96 Proceedings of the First IFCIS International Conference on Cooperative Information Systems
Workflow mining: a survey of issues and approaches
Data & Knowledge Engineering
Computers in Industry - Special issue: Process/workflow mining
AICT-ICIW '06 Proceedings of the Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services
Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance
Electronic Notes in Theoretical Computer Science (ENTCS)
Towards mining structural workflow patterns
DEXA'05 Proceedings of the 16th international conference on Database and Expert Systems Applications
Web service mining and verification of properties: an approach based on event calculus
ODBASE'06/OTM'06 Proceedings of the 2006 Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, DOA, GADA, and ODBASE - Volume Part I
Conformance testing: measuring the fit and appropriateness of event logs and process models
BPM'05 Proceedings of the Third international conference on Business Process Management
Log-based transactional workflow mining
Distributed and Parallel Databases
Verifying composite service transactional behavior using event calculus
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part I
Hi-index | 0.00 |
A continuous evolution of business process parameters, constraints and needs, hardly foreseeable initially, requires from the business process management systems a continuous design and a reliable process model. In this paper, we are interested in developing a reactive design through a process log analysis ensuring process re-engineering and execution reliability. We propose to analyse workflow logs to discover workflow transactional behavior and to improve and correct related recovery mechanisms subsequently. Our approach starts by collecting workflow logs. Then, we build, by statistical analysis techniques, an intermediate representation specifying elementary dependencies between activities. These dependencies are refined to mine the transactional workflow model. The analysis of the discrepancies between the discovered model and the initially designed model enables us to detect design gaps, concerning particularly the recovery mechanisms. Thus, based on this mining step, we apply a set of rules on the initially designed workflow to improve workflow reliability.