Modeling and simulation of time and value throughputs of data-aware workflow processes
- 66 Downloads
Time and value throughputs reflect the actual workload and gross profit of enterprises over a period of time, respectively. Both of them are of great importance to the operation of data-aware workflow processes, since they can help managers to balance production capacity at each stage as well as determine how much capital should be recycled over a period of time. However, the existing methods have not investigated both time and value throughputs of data-aware workflow processes. In this paper, we propose a new approach to modeling and simulation of time and value throughputs of data-aware workflow processes. First of all, we construct an abstract model with time and value elements. Second, the abstract model is transformed into a simulation model in CPN Tools. Finally, we obtain and analyze the time and value throughputs automatically via the simulation logs. Compared with the existing methods, this is the first attempt to propose both time and value throughputs of data-aware workflow processes, and the whole procedure of modeling and simulation of them. Furthermore, the procedure of obtaining time and value throughputs through analyzing the logs is proposed, and a prototype system is designed and developed.
KeywordsData-aware workflow process Time throughput Value throughput Petri net Simulation
This work was supported by the National Natural Science Foundation of China under Grant No. 61473035.
- De Leoni, M., Munoz-Gama, J., Carmona, J., & van der Aalst, W. M. P. (2014a). Decomposing alignment-based conformance checking of data-aware process models. In Proceedings of international conferences: CoopIS, and ODBASE (pp. 3–20).Google Scholar
- De Leoni, M., Munoz-Gama, J., Carmona, J., & van der Aalst, W. M. P. (2014b). Decomposing conformance checking on Petri nets with data. BPM Center Report BPM-14-06.Google Scholar
- De Leoni, M., & van der Aalst, W. M. P. (2013). Data-aware process mining: Discovering decisions in processes using alignments. In Proceedings of 28th annual ACM symposium on applied computing (pp. 1454–1461).Google Scholar
- Li, C., Ge, J., Hu, H., & Luo, B. (2015). Method for conformance checking based on token log. Journal of Software, 26(3), 509–532.Google Scholar
- Liu, X., Wang, D., Yuan, D., Wang, F., & Yang, Y. (2014). Throughput based temporal verification for monitoring large batch of parallel processes. In Proceedings of 2014 international conference on software and system process (pp. 124–133).Google Scholar
- Liu, X., Yang, Y., Cao, D., & Yuan, D. (2013). Selecting checkpoints along the time line: A novel temporal checkpoint selection strategy for monitoring a batch of parallel business processes. In Proceedings of 35th international conference on software engineering (pp. 1281–1284).Google Scholar
- Othman, A., Nicod, J., Philippe, L., & Rehn-Sonigo, V. (2012). Optimal energy consumption and throughput for workflow applications on distributed architectures. Sustainable Computing: Informatics and Systems, 4(1), 44–51.Google Scholar
- Trčka, N., vander Aalst, W. M. P., & Sidorova, N. (2009). Data-flow anti-patterns: Discovering data-flow errors in workflows. Advanced Information Systems Engineering, 5565, 425–439.Google Scholar
- Wang, Z. Xu, X., Chu, D., & Ma, C. (2010). A value-driven approach for the determination of global optimization objective of service composition. In Proceedings of 2010 IEEE international conference on services computing (pp. 210–217).Google Scholar
- Yin, D., & Kosar, T. (2011). A data-aware workflow scheduling algorithm for heterogeneous distributed systems. In Proceedings of 2011 international conference on high performance computing & simulation (pp. 114–120).Google Scholar