TY - GEN
T1 - Managing controlled violation of temporal process constraints
AU - Kumar, Akhil
AU - Sabbella, Sharat R.
AU - Barton, Russell R.
N1 - Publisher Copyright:
©Springer International Publishing Switzerland 2015.
PY - 2015
Y1 - 2015
N2 - Temporal workflows are becoming increasingly important in many real-world applications. In such workflows, activity durations and times are specified and it is necessary to ensure both at design time and run time that temporal constraints are not violated. However, in real-time workflows, such as in a medical process or emergency situations, some violations are unavoidable. Hence, a more nuanced view of violations should be taken. Here we introduce the notion of controlled violations as the ability to monitor a running process and develop an approach based on constraint satisfaction to determine the best schedule for its completion in a way so as to minimize the total penalty from the violations. The violations are evaluated in terms of metrics like number of violations, delay in process completion, and penalty of weighted violations. We also relate our work to the concept of controllability in literature and show how it can be checked using our method. Finally, the expressive power of our approach is discussed.
AB - Temporal workflows are becoming increasingly important in many real-world applications. In such workflows, activity durations and times are specified and it is necessary to ensure both at design time and run time that temporal constraints are not violated. However, in real-time workflows, such as in a medical process or emergency situations, some violations are unavoidable. Hence, a more nuanced view of violations should be taken. Here we introduce the notion of controlled violations as the ability to monitor a running process and develop an approach based on constraint satisfaction to determine the best schedule for its completion in a way so as to minimize the total penalty from the violations. The violations are evaluated in terms of metrics like number of violations, delay in process completion, and penalty of weighted violations. We also relate our work to the concept of controllability in literature and show how it can be checked using our method. Finally, the expressive power of our approach is discussed.
UR - http://www.scopus.com/inward/record.url?scp=84944679135&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84944679135&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-23063-4_20
DO - 10.1007/978-3-319-23063-4_20
M3 - Conference contribution
AN - SCOPUS:84944679135
SN - 9783319230627
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 280
EP - 296
BT - Business Process Management - 13th International Conference, BPM 2015, Proceedings
A2 - Recker, Jan
A2 - Weidlich, Matthias
A2 - Motahari-Nezhad, Hamid Reza
PB - Springer Verlag
T2 - 13th International Conference on Business Process Management, BPM 2015
Y2 - 31 August 2015 through 3 September 2015
ER -