Improving the detection of sequential anomalies associated with a loop

Faisal Fahmi, Pei Shu Huang, Feng-Jian Wang

Research output: Contribution to conferencePaperpeer-review

4 Scopus citations

Abstract

Workflow models are widely applied in business software design. A workflow model contains a set of systematic ordered tasks to achieve designated business goal(s) under the designed flow control. Analyzing artifact usage during design phase can prevent unexpected artifact result due to abnormal artifact operation(s). A sequential anomaly indicates a pair of activities operating on the same artifact that can result in redundant write or missing production. On the other hand, the iteration of a loop structure in a workflow cannot be statically analyzed, thus, detecting process of artifact anomalies in a loop is costly. In this paper, we present an effective method to detect all anomalies associated with a loop by removing the redundant computation due to the repeated structure of the body and control in the iterations. After the removing, the anomalies can be detected on a single iteration generated instead. Here, the process of anomaly detection is now simplified into two phases: First, a workflow model is transformed into a corresponding C-tree structure and next, the proposed anomaly detection methodology is applied to the C-tree. Compared with current approaches, our method can reduce the space complexity and decrease the execution times of anomaly detection as linear.

Original languageAmerican English
Pages127-134
Number of pages8
DOIs
StatePublished - 1 Jul 2019
Event43rd IEEE Annual Computer Software and Applications Conference, COMPSAC 2019 - Milwaukee, United States
Duration: 15 Jul 201919 Jul 2019

Conference

Conference43rd IEEE Annual Computer Software and Applications Conference, COMPSAC 2019
Country/TerritoryUnited States
CityMilwaukee
Period15/07/1919/07/19

Keywords

  • Artifact anomaly
  • Redundant computation
  • Workflow

Fingerprint

Dive into the research topics of 'Improving the detection of sequential anomalies associated with a loop'. Together they form a unique fingerprint.

Cite this