You are not logged in.

Workflow temporal verification for monitoring parallel business processes

Liu, Xiao, Wang, Dingxian, Yuan, Dong, Wang, Futian and Yang, Yun 2016, Workflow temporal verification for monitoring parallel business processes, Journal of software: evolution and process, vol. 28, pp. 286-302, doi: 10.1002/smr.1761.

Attached Files
Name Description MIMEType Size Downloads

Title Workflow temporal verification for monitoring parallel business processes
Author(s) Liu, XiaoORCID iD for Liu, Xiao orcid.org/0000-0002-4151-8522
Wang, Dingxian
Yuan, Dong
Wang, Futian
Yang, Yun
Journal name Journal of software: evolution and process
Volume number 28
Start page 286
End page 302
Total pages 17
Publisher John Wiley & Sons
Place of publication Chichester, England
Publication date 2016-05
ISSN 2047-7473
2047-7481
Keyword(s) temporal verification
checkpoint selection
parallel processes
quality of service
cloud computing
Science & Technology
Technology
Computer Science, Software Engineering
Computer Science
DYNAMIC VERIFICATION
SYSTEMS
CONSTRAINTS
SELECTION
STRATEGY
Summary Workflow temporal verification is conducted to guarantee on-time completion, which is one of the most important QoS (Quality of Service) dimensions for business processes running in the cloud. However, as today's business systems often need to handle a large number of concurrent customer requests, conventional response-time based process monitoring strategies conducted in a one-by-one fashion cannot be applied efficiently to a large batch of parallel processes because of significant time overhead. Similar situations may also exist in software companies where multiple software projects are carried out at the same time by software developers. To address such a problem, based on a novel runtime throughput consistency model, this paper proposes a QoS-aware throughput based checkpoint selection strategy, which can dynamically select a small number of checkpoints along the system timeline to facilitate the temporal verification of throughput constraints and achieve the target on-time completion rate. Experimental results demonstrate that our strategy can achieve the best efficiency and effectiveness compared with the state-of-the-art as and other representative response-time based checkpoint selection strategies.
Language eng
DOI 10.1002/smr.1761
Field of Research 080109 Pattern Recognition and Data Mining
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category C1 Refereed article in a scholarly journal
ERA Research output type C Journal article
Grant ID LP0990393
LP130100324
Copyright notice ©2016, John Wiley & Sons
Persistent URL http://hdl.handle.net/10536/DRO/DU:30085250

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 1 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 59 Abstract Views, 0 File Downloads  -  Detailed Statistics
Created: Thu, 18 Aug 2016, 13:24:54 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.