Using artifact flow diagrams to model artifact usage anomalies

Hwai Jung Hsu*, Feng-Jian Wang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

Workflow is a set of tasks which are systematized to achieve certain business goal(s), where the tasks run in a particular order under automatic control. Artifacts, collections of data items, are necessary for task (process) executions in a workflow. However, an execution may yield unexpected results due to improper artifact manipulation: e.g., activities miss artifact or artifact conflict occur at an activity dynamically. Therefore, the analyses on artifact usage in design phase are very important for quality insurance. This paper presents a model of artifact flow diagrams to state the artifact usage anomalies in processes transmitting artifacts based on DCDC, Distinct Control and Data Channel, model. There are four types of artifact usage anomalies identified in DCDC and the formal statement of each anomaly is described correspondingly for future study of anomaly search.

Original languageEnglish
Title of host publicationProceedings - 2009 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009
Pages275-280
Number of pages6
DOIs
StatePublished - 23 Nov 2009
Event2009 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009 - Seattle, WA, United States
Duration: 20 Jul 200924 Jul 2009

Publication series

NameProceedings - International Computer Software and Applications Conference
Volume2
ISSN (Print)0730-3157

Conference

Conference2009 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009
Country/TerritoryUnited States
CitySeattle, WA
Period20/07/0924/07/09

Keywords

  • Artifact
  • Artifact flow diagram
  • DCDC
  • Workflow

Fingerprint

Dive into the research topics of 'Using artifact flow diagrams to model artifact usage anomalies'. Together they form a unique fingerprint.

Cite this