228 research outputs found
GSM+T: A Timed Artifact-Centric Process Model
We introduce an extension to the declarative and artifact-centric Guard Stage Milestone (GSM) process modeling language to represent temporal aspects (duration, deadlines, lower- and upper-bound constraints), define the correctness of executions of GSM processes with respect to temporal constraints, check controllability of processes, compute execution plans respecting temporal constraints, and provide a translation method allowing to execute controllable GSM+T processes on standard GSM Engines
CAiSE Radar 2016
The CAiSE Radar is an experimental format, established for CAiSE 2016, to make CAiSE workshops livelier, exciting, stimulate discussions, and attract additional active participants by establishing an environment where not only well established and validated research is reported but research in infancy, new ideas, and potentially interesting research projects can be presented and discussed. So similarly to a radar, the idea is to enable researchers to look into the future of the field and identify upcoming trends early. The aim of such effort is on one hand to contribute to the building of research communities and promote the integration of young researchers into the community, and on the other hand to provide opportunities to discuss ideas early and to receive additional opinions on planned research
CAiSE Radar 2016
The CAiSE Radar is an experimental format, established for CAiSE 2016, to make CAiSE workshops livelier, exciting, stimulate discussions, and attract additional active participants by establishing an environment where not only well established and validated research is reported but research in infancy, new ideas, and potentially interesting research projects can be presented and discussed. So similarly to a radar, the idea is to enable researchers to look into the future of the field and identify upcoming trends early. The aim of such effort is on one hand to contribute to the building of research communities and promote the integration of young researchers into the community, and on the other hand to provide opportunities to discuss ideas early and to receive additional opinions on planned research
Early Detection of Temporal Constraint Violations
Software systems rely on events for logging, system coordination, handling unexpected situations, and more. Monitoring events at runtime can ensure that a business service system complies with policies, regulations, and business rules. Notably, detecting violations of rules as early as possible is much desired as it allows the system to reclaim resources from erring service enactments. We formalize a model for events and a logic-based rule language to specify temporal and data constraints. The primary goal of this paper is to develop techniques for detecting each rule violation as soon as it becomes inevitable. We further develop optimization techniques to reduce monitoring overhead. Finally, we implement a monitoring algorithm and experimentally evaluate it to demonstrate our approach to early violation detection is beneficial and effective for processing service enactments
10151 Abstracts Collection -- Enabling Holistic Approaches to Business Process Lifecycle Management
From 11.04. to 16.04.2010, the Dagstuhl Seminar 10151 ``Enabling Holistic Approaches to Business Process Lifecycle Management \u27\u27 was held
in Schloss Dagstuhl~--~Leibniz Center for Informatics.
During the seminar, several participants presented their current
research, and ongoing work and open problems were discussed. Abstracts of
the presentations given during the seminar as well as abstracts of
seminar results and ideas are put together in this paper. The first section
describes the seminar topics and goals in general.
Links to extended abstracts or full papers are provided, if available
Discriminating DDoS flows from flash crowds using information distance
Discriminating DDoS flooding attacks from flash crowds poses a tough challenge for the network security community. Because of the vulnerability of the original design of the Internet, attackers can easily mimic the patterns of legitimate network traffic to fly under the radar. The existing fingerprint or feature based algorithms are incapable to detect new attack strategies. In this paper, we aim to differentiate DDoS attack flows from flash crowds. We are motivated by the following fact: the attack flows are generated by the same prebuilt program (attack tools), however, flash crowds come from randomly distributed users all over the Internet. Therefore, the flow similarity among DDoS attack flows is much stronger than that among flash crowds. We employ abstract distance metrics, the Jeffrey distance, the Sibson distance, and the Hellinger distance to measure the similarity among flows to achieve our goal. We compared the three metrics and found that the Sibson distance is the most suitable one for our purpose. We apply our algorithm to the real datasets and the results indicate that the proposed algorithm can differentiate them with an accuracy around 65%.<br /
The Internet-of-Things Meets Business Process Management: Mutual Benefits and Challenges
The Internet of Things (IoT) refers to a network of connected devices
collecting and exchanging data over the Internet. These things can be
artificial or natural, and interact as autonomous agents forming a complex
system. In turn, Business Process Management (BPM) was established to analyze,
discover, design, implement, execute, monitor and evolve collaborative business
processes within and across organizations. While the IoT and BPM have been
regarded as separate topics in research and practice, we strongly believe that
the management of IoT applications will strongly benefit from BPM concepts,
methods and technologies on the one hand; on the other one, the IoT poses
challenges that will require enhancements and extensions of the current
state-of-the-art in the BPM field. In this paper, we question to what extent
these two paradigms can be combined and we discuss the emerging challenges
FREPA: An Automated and Formal Approach to Requirement Modeling and Analysis in Aircraft Control Domain
Formal methods are promising for modeling and analyzing system requirements.
However, applying formal methods to large-scale industrial projects is a
remaining challenge. The industrial engineers are suffering from the lack of
automated engineering methodologies to effectively conduct precise requirement
models, and rigorously validate and verify (V&V) the generated models. To
tackle this challenge, in this paper, we present a systematic engineering
approach, named Formal Requirement Engineering Platform in Aircraft (FREPA),
for formal requirement modeling and V\&V in the aerospace and aviation control
domains. FREPA is an outcome of the seamless collaboration between the academy
and industry over the last eight years. The main contributions of this paper
include 1) an automated and systematic engineering approach FREPA to construct
requirement models, validate and verify systems in the aerospace and aviation
control domain, 2) a domain-specific modeling language AASRDL to describe the
formal specification, and 3) a practical FREPA-based tool AeroReq which has
been used by our industry partners. We have successfully adopted FREPA to seven
real aerospace gesture control and two aviation engine control systems. The
experimental results show that FREPA and the corresponding tool AeroReq
significantly facilitate formal modeling and V&V in the industry. Moreover, we
also discuss the experiences and lessons gained from using FREPA in aerospace
and aviation projects.Comment: 12 pages, Published by FSE 202
UTR introns, antisense RNA and differentially spliced transcripts between Plasmodium yoelii subspecies
Additional file 1. Evaluation of RNA quality from the two NSM parasite samples in agarose gel (a), and a flow chart of data processing and analysis (b)
- …