Temporal Reasoning in Workflow Systems

被引:1
|
作者
Claudio Bettini
X. Sean Wang
Sushil Jajodia
机构
[1] DSI,ISE Department
[2] Università di Milano,undefined
[3] George Mason University,undefined
来源
Distributed and Parallel Databases | 2002年 / 11卷
关键词
workflow; temporal reasoning; schedule; time granularity;
D O I
暂无
中图分类号
学科分类号
摘要
In a workflow system, autonomous agents perform various activities cooperatively to complete a common task. Successful completion of the task often depends on correct synchronization and scheduling of agents' activities. It would greatly enhance the capabilities of current workflow systems if quantitative temporal constraints on the duration of activities and their synchronization requirements can be specified and reasoned about. This paper investigates such requirements and related reasoning algorithms. In particular, the paper studies the consistency, prediction and enactment services in a workflow system, and provides corresponding algorithms. The consistency service is to ensure that the specification of the temporal constraints is possible to satisfy; the prediction service is to foretell the time frame for the involved activities; and the enactment service is to schedule the activities so that, as long as each agent starts and finishes its task within the specified time period, the overall constraints will always be satisfied. For the enactment service, the paper identifies two practically interesting families of enactment schedules for autonomous agents, namely “free schedules” and “restricted due-time schedules”. In a free schedule, an agent may use any amount of time to finish the task as long as it is between the minimum and maximum time declared by the agent when the workflow is designed. A restricted due-time schedule is a more restrictive one in which the maximum amount of time that an agent may use is limited to a smaller number than the declared maximum. The paper presents efficient algorithms to find free and restricted due-time schedules. The paper also provides algorithms for the above services when multiple time granularities are involved in the temporal constraint specification.
引用
收藏
页码:269 / 306
页数:37
相关论文
共 50 条
  • [1] Temporal reasoning in workflow systems
    Bettini, C
    Wang, XS
    Jajodia, S
    DISTRIBUTED AND PARALLEL DATABASES, 2002, 11 (03) : 269 - 306
  • [2] Temporal Reasoning in Multi-agent Workflow Systems Based on Formal Models
    Hsieh, Fu-Shiung
    Lin, Jim-Bon
    INTELLIGENT INFORMATION AND DATABASE SYSTEMS (ACIIDS 2012), PT I, 2012, 7196 : 33 - 42
  • [3] Temporal representation and reasoning for workflow in engineering design change review
    Chinn, SJ
    Madey, GR
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2000, 47 (04) : 485 - 492
  • [4] Temporal social reasoning in dynamic multi-agent systems
    Allouche, M
    Boissier, O
    Sayettat, C
    FOURTH INTERNATIONAL CONFERENCE ON MULTIAGENT SYSTEMS, PROCEEDINGS, 2000, : 23 - 30
  • [5] Linear temporal inference of workflow management systems based on timed petri nets models
    Yang, Q
    Chuang, L
    Jiye, W
    ENGINEERING AND DEPLOYMENT OF COOPERATIVE INFORMATION SYSTEMS, PROCEEDINGS, 2002, 2480 : 30 - 44
  • [6] An automated reasoning method used in workflow management system
    Qiu, XP
    Du, YJ
    Zheng, FB
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 5016 - 5021
  • [7] Temporal Reasoning with Layered Preferences
    Anselma, Luca
    Mazzei, Alessandro
    Piovesan, Luca
    Terenziani, Paolo
    FOUNDATIONS OF INTELLIGENT SYSTEMS (ISMIS 2018), 2018, 11177 : 367 - 376
  • [8] Temporal reasoning in process planning
    Balaban, M
    Braha, D
    AI EDAM-ARTIFICIAL INTELLIGENCE FOR ENGINEERING DESIGN ANALYSIS AND MANUFACTURING, 1999, 13 (02): : 91 - 104
  • [9] Uncertanity in temporal representation and reasoning
    Pani, AK
    Bhattacharjee, GP
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1999, 73 (01) : 37 - 54
  • [10] Implementing workflow systems
    Dreyer, L
    Olivier, M
    RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY, 2003, 128 : 61 - 72