Managing controlled violation of temporal process constraints

Akhil Kumar, Sharat R. Sabbella, Russell R. Barton

Research output: Chapter in Book/Report/Conference proceedingConference contribution

21 Scopus citations


Temporal workflows are becoming increasingly important in many real-world applications. In such workflows, activity durations and times are specified and it is necessary to ensure both at design time and run time that temporal constraints are not violated. However, in real-time workflows, such as in a medical process or emergency situations, some violations are unavoidable. Hence, a more nuanced view of violations should be taken. Here we introduce the notion of controlled violations as the ability to monitor a running process and develop an approach based on constraint satisfaction to determine the best schedule for its completion in a way so as to minimize the total penalty from the violations. The violations are evaluated in terms of metrics like number of violations, delay in process completion, and penalty of weighted violations. We also relate our work to the concept of controllability in literature and show how it can be checked using our method. Finally, the expressive power of our approach is discussed.

Original languageEnglish (US)
Title of host publicationBusiness Process Management - 13th International Conference, BPM 2015, Proceedings
EditorsJan Recker, Matthias Weidlich, Hamid Reza Motahari-Nezhad
PublisherSpringer Verlag
Number of pages17
ISBN (Print)9783319230627
StatePublished - 2015
Event13th International Conference on Business Process Management, BPM 2015 - Innsbruck, Austria
Duration: Aug 31 2015Sep 3 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other13th International Conference on Business Process Management, BPM 2015

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'Managing controlled violation of temporal process constraints'. Together they form a unique fingerprint.

Cite this