802 research outputs found

    A Constrained Object Model for Configuration Based Workflow Composition

    Full text link
    Automatic or assisted workflow composition is a field of intense research for applications to the world wide web or to business process modeling. Workflow composition is traditionally addressed in various ways, generally via theorem proving techniques. Recent research observed that building a composite workflow bears strong relationships with finite model search, and that some workflow languages can be defined as constrained object metamodels . This lead to consider the viability of applying configuration techniques to this problem, which was proven feasible. Constrained based configuration expects a constrained object model as input. The purpose of this document is to formally specify the constrained object model involved in ongoing experiments and research using the Z specification language.Comment: This is an extended version of the article published at BPM'05, Third International Conference on Business Process Management, Nancy Franc

    State-of-the-art on evolution and reactivity

    Get PDF
    This report starts by, in Chapter 1, outlining aspects of querying and updating resources on the Web and on the Semantic Web, including the development of query and update languages to be carried out within the Rewerse project. From this outline, it becomes clear that several existing research areas and topics are of interest for this work in Rewerse. In the remainder of this report we further present state of the art surveys in a selection of such areas and topics. More precisely: in Chapter 2 we give an overview of logics for reasoning about state change and updates; Chapter 3 is devoted to briefly describing existing update languages for the Web, and also for updating logic programs; in Chapter 4 event-condition-action rules, both in the context of active database systems and in the context of semistructured data, are surveyed; in Chapter 5 we give an overview of some relevant rule-based agents frameworks

    Enforcing Context-Sensitive Policies in Collaborative Business Environments

    Full text link

    HTN planning: Overview, comparison, and beyond

    Get PDF
    Hierarchies are one of the most common structures used to understand and conceptualise the world. Within the field of Artificial Intelligence (AI) planning, which deals with the automation of world-relevant problems, Hierarchical Task Network (HTN) planning is the branch that represents and handles hierarchies. In particular, the requirement for rich domain knowledge to characterise the world enables HTN planning to be very useful, and also to perform well. However, the history of almost 40 years obfuscates the current understanding of HTN planning in terms of accomplishments, planning models, similarities and differences among hierarchical planners, and its current and objective image. On top of these issues, the ability of hierarchical planning to truly cope with the requirements of real-world applications has been often questioned. As a remedy, we propose a framework-based approach where we first provide a basis for defining different formal models of hierarchical planning, and define two models that comprise a large portion of HTN planners. Second, we provide a set of concepts that helps in interpreting HTN planners from the aspect of their search space. Then, we analyse and compare the planners based on a variety of properties organised in five segments, namely domain authoring, expressiveness, competence, computation and applicability. Furthermore, we select Web service composition as a real-world and current application, and classify and compare the approaches that employ HTN planning to solve the problem of service composition. Finally, we conclude with our findings and present directions for future work. In summary, we provide a novel and comprehensive viewpoint on a core AI planning technique.<br/

    Towards an implementation of information flow security using semantic web technologies

    Get PDF
    Controlling the flow of sensitive data has been widely acknowledged as a critical aspect for securing web information systems. A common limitation of previous approaches for the implementation of the information flow control is their proposal of new scripting languages. This makes them infeasible to be applied to existing systems written in traditional programming languages as these systems need to be redeveloped in the proposed scripting language. This paper proposes a methodology that offers a common interlinqua through the use of Semantic Web technologies for securing web information systems independently of their programming language. © 2012 IEEE

    Monitoring Complex Processes to Verify System Conformance: A Declarative Rule-Based Framework

    Get PDF
    Over the last 60 years, computers and software have favoured incredible advancements in every field. Nowadays, however, these systems are so complicated that it is difficult – if not challenging – to understand whether they meet some requirement or are able to show some desired behaviour or property. This dissertation introduces a Just-In-Time (JIT) a posteriori approach to perform the conformance check to identify any deviation from the desired behaviour as soon as possible, and possibly apply some corrections. The declarative framework that implements our approach – entirely developed on the promising open source forward-chaining Production Rule System (PRS) named Drools – consists of three components: 1. a monitoring module based on a novel, efficient implementation of Event Calculus (EC), 2. a general purpose hybrid reasoning module (the first of its genre) merging temporal, semantic, fuzzy and rule-based reasoning, 3. a logic formalism based on the concept of expectations introducing Event-Condition-Expectation rules (ECE-rules) to assess the global conformance of a system. The framework is also accompanied by an optional module that provides Probabilistic Inductive Logic Programming (PILP). By shifting the conformance check from after execution to just in time, this approach combines the advantages of many a posteriori and a priori methods proposed in literature. Quite remarkably, if the corrective actions are explicitly given, the reactive nature of this methodology allows to reconcile any deviations from the desired behaviour as soon as it is detected. In conclusion, the proposed methodology brings some advancements to solve the problem of the conformance checking, helping to fill the gap between humans and the increasingly complex technology.Negli ultimi 60 anni, i computer e i programmi hanno favorito incredibili avanzamenti in ogni campo. Oggigiorno, purtroppo, questi sistemi sono così complicati che è difficile – se non impossibile – capire se soddisfano qualche requisito o mostrano un comportamento o una proprietà desiderati. Questa tesi introduce un approccio a posteriori Just-In-Time (JIT) per effettuare il controllo di conformità ed identificare appena possibile ogni deviazione dal comportamento desiderato, ed eventualmente applicare qualche correzione. Il framework dichiarativo che implementa il nostro approccio – interamente sviluppato su una promettente piattaforma open source di Production Rule System (PRS) chiamata Drools – si compone di tre elementi: 1. un modulo per il monitoraggio basato su una nuova implementazione efficiente di Event Calculus (EC), 2. un modulo generale per il ragionamento ibrido (il primo del suo genere) che supporta ragionamento temporale, semantico, fuzzy e a regole, 3. un formalismo logico basato sul concetto di aspettativa che introduce le Event-Condition-Expectation rules (ECE-rules) per valutare la conformità globale di un sistema. Il framework è anche accompagnato da un modulo opzionale che fornisce Probabilistic Inductive Logic Programming (PILP). Spostando il controllo di conformità da dopo l’esecuzione ad appena in tempo, questo approccio combina i vantaggi di molti metodi a posteriori e a priori proposti in letteratura. Si noti che, se le azioni correttive sono fornite esplicitamente, la natura reattiva di questo metodo consente di conciliare le deviazioni dal comportamento desiderato non appena questo viene rilevato. In conclusione, la metodologia proposta introduce alcuni avanzamenti per risolvere il problema del controllo di conformità, contribuendo a colmare il divario tra l’uomo e la tecnologia, sempre più complessa
    • …
    corecore