2004
DOI: 10.1109/mic.2004.1260702
|View full text |Cite
|
Sign up to set email alerts
|

Business process choreography for b2b collaboration

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2005
2005
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 46 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“… Efficiently processing business process data is challenging due to the complex sequential nature of such data and the numerous direct short-term dependencies between activities within each trace [1][2][3][4].  Reasoning about anomalies is further complicated by the long-term spans of dependencies in many cases.…”
Section: A Overviewmentioning
confidence: 99%
See 1 more Smart Citation
“… Efficiently processing business process data is challenging due to the complex sequential nature of such data and the numerous direct short-term dependencies between activities within each trace [1][2][3][4].  Reasoning about anomalies is further complicated by the long-term spans of dependencies in many cases.…”
Section: A Overviewmentioning
confidence: 99%
“…It can be relatively short or lengthy. Longer processes often exhibit more interdependencies between activities [1][2][3]. Within the realm of business process analysis, anomalies can manifest as atypical process executions or noise present in event logs.…”
Section: Introductionmentioning
confidence: 99%
“…From a functional point of view, in all the considered cases, conversation controllers are able to maintain the states of conversations, to check for sequencing constraints and also to return error information when a message is not compliant with the protocol in execution. A common restriction is that protocols interpreted by conversation controllers, except the BPEL-based or Business Process Modeling Language-based descriptions [24,25,27], cannot be directly executed and must be translated into some executable representation, such as control tables [18], hash tables [23] or dual processes [24]. Petri nets are proposed in [20] as an executable specification, but this is done from a conceptual point of view, and no implementation is reported in the paper.…”
Section: Related Workmentioning
confidence: 99%
“…Unfortunately, these conversation controllers are still rather immature. Most of the proposals are prototypes [17,18,23] or complex architectural designs that will require further efforts for its implementation [20,25]. On the other hand, [24] describes the implementation of a conversation controller as a message handler for Axis; that is, it can transparently intercept a copy of messages sent and received by services.…”
Section: Related Workmentioning
confidence: 99%
“…The aim of this investigation was to check the possibility of the production of the uniform nano-sized protective coatings using the simple spraying deposition method (already used in lamp fabrication [4]) and inexpensive precursors.…”
Section: Introductionmentioning
confidence: 99%