Browse > Article
http://dx.doi.org/10.5392/JKCA.2011.11.8.043

Evaluation Model of Business process Contextual Situations using goal-scenario  

Baek, Su-Jin (경희대학교 컴퓨터공학부)
Ko, Jong-Won (경희대학교 컴퓨터공학부)
Song, Young-Jae (경희대학교 컴퓨터공학부)
Publication Information
Abstract
The scope of the problems that could be solved by monitoring and the improvement of the recognition time is directly correlated to the performance of the management function of the business process. However, the current event-managing monitoring system and the real-time advanced alarming business monitoring system decided whether to apply warnings or not by assuming a fixed environment and showing expressions based on the design rules. Therefore, there is a limit for distinguishing the range of occurrence and the level of severity in regard to the new external problems occurring in a complicated environment. Such problems cannot be abstracted. In this paper, evaluation model of business process contextual situations using goal scenario is suggested to provide constant services through the current monitoring process in regard to the service demands of the new scenario which occurs outside. The new demands based on the outside situation are analyzed according to the target scenario for the process activities. Also, a similar process model is found and identified by combining similarity and interrelationship. The process can be stopped in advance or adjusted to the wanted direction.
Keywords
Business Activity Monitoring; Analysis based goal-scenario; Evaluation Method of Contextual Situations;
Citations & Related Records
연도 인용수 순위
  • Reference
1 H. Dresner, "Business Activity Monitoring: BAM Architecture," Gartner Symposium ITXPO, Cannes, France, 2003(11).
2 F. Camci and R. B. Chinnam, "General support vector representation machine for one-class classification of non-stationary classes," Pattern Recognition, Vol.41, No.10, pp.3021-3034. 2008.   DOI   ScienceOn
3 D. Grigori, F. Casati, M. Castellanos, U. Dayal, M. sayal, and M. C. Shan, "Business Process Intelligence," Computers in Industry, Vol.53, pp.321-343, 2004.   DOI   ScienceOn
4 A. Sharma, K. Pujari, and K. Paliwal, "Intrusion detection using text processing techniques with a kernel based similarity measure," Computers and Security, Vol.26, pp.488-495, 2007.   DOI   ScienceOn
5 S. Srinivasan, V. Krishna, and S. Holmes, "Web-log -driven business activity monitoring," IEEE Computer, Vol.38, No.3, pp.61-68. 2005.   DOI   ScienceOn
6 D. Sonnen and H. D. Morris, Businessfactor : Event-driven business performance management White paper. IDC, 2004.
7 E. Howard and Shrobe, "Model-Based Diagnosis for Information Survivability," IWSAS, pp.142-157, 2001.
8 D. Garlan, B. Schmerl, and J. Chang, "Using gauges for architecture-based monitoring and adaptation," In Proceeding of the Working Conference on Complex and Dynamic Systems Architecture, 2001(12).
9 J. Cobleig, "Containment units : a hierarchically composable architecture for adaptive system," ACM SIGSOFT Software Engineering Notes, Vol.27, No.6, pp.159-165, 2002(11).   DOI   ScienceOn
10 J. Kim, S. Park, and V. Sugumaran, "A Linguistics-Based Approach for Use Case Driven Analysis Using Goal and Scenario Authoring," NLDB 2004, LNCS 3136, Springer-Verlag, pp.159-170, 2004(6).   DOI   ScienceOn