228 research outputs found

    GSM+T: A Timed Artifact-Centric Process Model

    Get PDF
    We introduce an extension to the declarative and artifact-centric Guard Stage Milestone (GSM) process modeling language to represent temporal aspects (duration, deadlines, lower- and upper-bound constraints), define the correctness of executions of GSM processes with respect to temporal constraints, check controllability of processes, compute execution plans respecting temporal constraints, and provide a translation method allowing to execute controllable GSM+T processes on standard GSM Engines

    CAiSE Radar 2016

    Get PDF
    The CAiSE Radar is an experimental format, established for CAiSE 2016, to make CAiSE workshops livelier, exciting, stimulate discussions, and attract additional active participants by establishing an environment where not only well established and validated research is reported but research in infancy, new ideas, and potentially interesting research projects can be presented and discussed. So similarly to a radar, the idea is to enable researchers to look into the future of the field and identify upcoming trends early. The aim of such effort is on one hand to contribute to the building of research communities and promote the integration of young researchers into the community, and on the other hand to provide opportunities to discuss ideas early and to receive additional opinions on planned research

    CAiSE Radar 2016

    Get PDF
    The CAiSE Radar is an experimental format, established for CAiSE 2016, to make CAiSE workshops livelier, exciting, stimulate discussions, and attract additional active participants by establishing an environment where not only well established and validated research is reported but research in infancy, new ideas, and potentially interesting research projects can be presented and discussed. So similarly to a radar, the idea is to enable researchers to look into the future of the field and identify upcoming trends early. The aim of such effort is on one hand to contribute to the building of research communities and promote the integration of young researchers into the community, and on the other hand to provide opportunities to discuss ideas early and to receive additional opinions on planned research

    Early Detection of Temporal Constraint Violations

    Get PDF
    Software systems rely on events for logging, system coordination, handling unexpected situations, and more. Monitoring events at runtime can ensure that a business service system complies with policies, regulations, and business rules. Notably, detecting violations of rules as early as possible is much desired as it allows the system to reclaim resources from erring service enactments. We formalize a model for events and a logic-based rule language to specify temporal and data constraints. The primary goal of this paper is to develop techniques for detecting each rule violation as soon as it becomes inevitable. We further develop optimization techniques to reduce monitoring overhead. Finally, we implement a monitoring algorithm and experimentally evaluate it to demonstrate our approach to early violation detection is beneficial and effective for processing service enactments

    10151 Abstracts Collection -- Enabling Holistic Approaches to Business Process Lifecycle Management

    Get PDF
    From 11.04. to 16.04.2010, the Dagstuhl Seminar 10151 ``Enabling Holistic Approaches to Business Process Lifecycle Management \u27\u27 was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper. The first section describes the seminar topics and goals in general. Links to extended abstracts or full papers are provided, if available

    Discriminating DDoS flows from flash crowds using information distance

    Full text link
    Discriminating DDoS flooding attacks from flash crowds poses a tough challenge for the network security community. Because of the vulnerability of the original design of the Internet, attackers can easily mimic the patterns of legitimate network traffic to fly under the radar. The existing fingerprint or feature based algorithms are incapable to detect new attack strategies. In this paper, we aim to differentiate DDoS attack flows from flash crowds. We are motivated by the following fact: the attack flows are generated by the same prebuilt program (attack tools), however, flash crowds come from randomly distributed users all over the Internet. Therefore, the flow similarity among DDoS attack flows is much stronger than that among flash crowds. We employ abstract distance metrics, the Jeffrey distance, the Sibson distance, and the Hellinger distance to measure the similarity among flows to achieve our goal. We compared the three metrics and found that the Sibson distance is the most suitable one for our purpose. We apply our algorithm to the real datasets and the results indicate that the proposed algorithm can differentiate them with an accuracy around 65%.<br /

    The Internet-of-Things Meets Business Process Management: Mutual Benefits and Challenges

    Get PDF
    The Internet of Things (IoT) refers to a network of connected devices collecting and exchanging data over the Internet. These things can be artificial or natural, and interact as autonomous agents forming a complex system. In turn, Business Process Management (BPM) was established to analyze, discover, design, implement, execute, monitor and evolve collaborative business processes within and across organizations. While the IoT and BPM have been regarded as separate topics in research and practice, we strongly believe that the management of IoT applications will strongly benefit from BPM concepts, methods and technologies on the one hand; on the other one, the IoT poses challenges that will require enhancements and extensions of the current state-of-the-art in the BPM field. In this paper, we question to what extent these two paradigms can be combined and we discuss the emerging challenges

    FREPA: An Automated and Formal Approach to Requirement Modeling and Analysis in Aircraft Control Domain

    Full text link
    Formal methods are promising for modeling and analyzing system requirements. However, applying formal methods to large-scale industrial projects is a remaining challenge. The industrial engineers are suffering from the lack of automated engineering methodologies to effectively conduct precise requirement models, and rigorously validate and verify (V&V) the generated models. To tackle this challenge, in this paper, we present a systematic engineering approach, named Formal Requirement Engineering Platform in Aircraft (FREPA), for formal requirement modeling and V\&V in the aerospace and aviation control domains. FREPA is an outcome of the seamless collaboration between the academy and industry over the last eight years. The main contributions of this paper include 1) an automated and systematic engineering approach FREPA to construct requirement models, validate and verify systems in the aerospace and aviation control domain, 2) a domain-specific modeling language AASRDL to describe the formal specification, and 3) a practical FREPA-based tool AeroReq which has been used by our industry partners. We have successfully adopted FREPA to seven real aerospace gesture control and two aviation engine control systems. The experimental results show that FREPA and the corresponding tool AeroReq significantly facilitate formal modeling and V&V in the industry. Moreover, we also discuss the experiences and lessons gained from using FREPA in aerospace and aviation projects.Comment: 12 pages, Published by FSE 202

    UTR introns, antisense RNA and differentially spliced transcripts between Plasmodium yoelii subspecies

    Get PDF
    Additional file 1. Evaluation of RNA quality from the two NSM parasite samples in agarose gel (a), and a flow chart of data processing and analysis (b)
    • …
    corecore