Computational geometry: an introduction
Computational geometry: an introduction
Artificial intelligence (3rd ed.)
Artificial intelligence (3rd ed.)
Database transaction models for advanced applications
Database transaction models for advanced applications
Case-based reasoning
An overview of workflow management: from process modeling to workflow automation infrastructure
Distributed and Parallel Databases - Special issue on software support for work flow management
Adept_flex—Supporting Dynamic Changes of Workflows Without Losing Control
Journal of Intelligent Information Systems - Special issue on workflow management systems
WebWork: METEOR_2‘s Web-Based Workflow Management System
Journal of Intelligent Information Systems - Special issue on workflow management systems
Machine Learning
A Scheme to Specify and Implement Ad-Hoc Recovery in Workflow Systems
EDBT '98 Proceedings of the 6th International Conference on Extending Database Technology: Advances in Database Technology
Knowledge Discovery in Databases: An Attribute-Oriented Approach
VLDB '92 Proceedings of the 18th International Conference on Very Large Data Bases
Poster on Exception Handling in ADOME Workflow Management System
COOPIS '97 Proceedings of the Second IFCIS International Conference on Cooperative Information Systems
Improving Business Process Quality through Exception Understanding, Prediction, and Prevention
Proceedings of the 27th International Conference on Very Large Data Bases
Computers in Industry - Special issue: Process/workflow mining
Efficient mining of both positive and negative association rules
ACM Transactions on Information Systems (TOIS)
Flows and views for scalable scientific process integration
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Supporting effective unexpected exceptions handling in workflow management systems
Proceedings of the 2007 ACM symposium on Applied computing
Efficient association rule mining among both frequent and infrequent items
Computers & Mathematics with Applications
Association rule and quantitative association rule mining among infrequent items
Proceedings of the 8th international workshop on Multimedia data mining: (associated with the ACM SIGKDD 2007)
A methodology for eliciting and modeling exceptions
Journal of Biomedical Informatics
Unexpected exceptions handling based on Chinese question answering in collaborative design
CSCWD'06 Proceedings of the 10th international conference on Computer supported cooperative work in design III
A multi-agent based method for handling exceptions in computer supported cooperative design
CSCWD'04 Proceedings of the 8th international conference on Computer Supported Cooperative Work in Design I
Designing workflow views with flows for large-scale business-to-business information systems
TES'04 Proceedings of the 5th international conference on Technologies for E-Services
Mining bridging rules between conceptual clusters
Applied Intelligence
A collaborative framework for unexpected exception handling
CRIWG'05 Proceedings of the 11th international conference on Groupware: design, Implementation, and Use
Knowledge-Based Behavior Specification
WI-IAT '12 Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 03
Hi-index | 0.00 |
The importance of exception handling within the context of workflow management has been widely recognized. While some exceptions are expected at design time and thus can be incorporated into the workflow design via some flexible mechanism, others are totally unexpected. Previous work in handling unexpected workflow exceptions focuses on the run-time support to, for example, allow the rollback of some already completed activities, validate the correctness of dynamic workflow change, and deploy a solution to handle exceptions. Authorized persons are responsible for deriving solutions to handle exceptions. In this paper we propose a novel approach to facilitating users in proposing solutions for resolving a given exception. Specifically, our approach scans through the previous records in handling exceptions, looking for those that are close to the current exception. The ways in which those exceptions were handled serve as useful information in determining how to handle the current one. Several algorithms are proposed and evaluated through both theoretical analysis and synthetic data set.