{"title":"Applying Protocol Service for the monitoring of business process","authors":"Xiaofeng Du, B. Bordbar, M. Alodib, B. Majeed","doi":"10.1109/IEEEGCC.2011.5752622","DOIUrl":null,"url":null,"abstract":"Identifying occurrences of failure is a major challenge in business process management. Current business monitoring techniques are invaluable tool for debugging and evaluating business process executions. In this paper a method of extending existing monitoring capabilities of the systems to allow real-time or near-real-time monitoring is discussed. The presented method draws on the existing Model Driven Development techniques to automatically create a new module called Protocol Service. The created Protocol Service is deployed with the existing system to monitor occurrences of undesirable events and failure. In this paper the outline of the approach will be presented.","PeriodicalId":119104,"journal":{"name":"2011 IEEE GCC Conference and Exhibition (GCC)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE GCC Conference and Exhibition (GCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IEEEGCC.2011.5752622","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Identifying occurrences of failure is a major challenge in business process management. Current business monitoring techniques are invaluable tool for debugging and evaluating business process executions. In this paper a method of extending existing monitoring capabilities of the systems to allow real-time or near-real-time monitoring is discussed. The presented method draws on the existing Model Driven Development techniques to automatically create a new module called Protocol Service. The created Protocol Service is deployed with the existing system to monitor occurrences of undesirable events and failure. In this paper the outline of the approach will be presented.