Process-aware Information Systems: Bridging People and Software Through Process Technology
This publication takes on the formidable task of establishing a unifying foundation and set of common underlying principles to effectively model, design, and implement process-aware information systems. Authored by leading authorities and pioneers in the field, Process-Aware Information Systems helps readers gain a thorough understanding of major concepts, languages, and techniques for building process-aware applications, including:
* UML and EPCs: two of the most widely used notations for business process modeling
* Concrete techniques for process design and analysis
* Process execution standards: WfMC and BPEL
* Representative commercial tools: ARIS, TIBCO Staffware, and FLOWer
Each chapter begins with a description of the problem domain and then progressively unveils relevant concepts and techniques. Examples and illustrations are used extensively to clarify and simplify complex material. Each chapter ends with a set of exercises, ranging from simple questions to thought-provoking assignments. Sample solutions for many of the exercises are available on the companion Web site.
Armed with a new and deeper understanding, readers are better positioned to make their own contributions to the field and evaluate various approaches to a particular task or problem. This publication is recommended as a textbook for graduate and advanced undergraduate students in computer science and information systems, as well as for professionals involved in workflow and business process management, groupware and teamwork, enterprise application integration, and business-to-business integration.
A Solution's Manual is available online. An Instructor Support FTP site is also available.
WIL M. P. van der AALST, PhD, is Professor at Eindhoven University of Technology and Adjunct Professor at Queensland University of Technology. He is coauthor of the textbook Workflow Management: Models, Methods, and Systems, and editor of several other books in the areas of business process management and Petri nets.
ARTHUR H. M. ter HOFSTEDE, PhD, is Associate Professor at Queensland University of Technology. He, along with Professor van der Aalst, is codesigner of the YAWL workflow language and open-source system, coauthor of the Workflow Patterns Web site, and cofounder of the International Conference on Business Process Management.
Table of Contents
PART I Concepts.
1 Introduction (Marlon Dumas, Wil van der Aalst, and Arthur H. M. ter Hofstede).
1.1 From Programs and Data to Processes.
1.2 PAIS: Definition and Rationale.
1.3 Techniques and Tools.
1.5 About the Book.
2 Person-to-Application Processes: Workflow Management (Andreas Oberweis).
2.2 Workflow Terminology.
2.3 Workflow Modeling.
2.4 Workflow Management Systems.
3 Person-to-Person Processes: Computer-Supported Collaborative Work (Clarence A. Ellis, Paulo Barthelmess, Jun Chen, and Jacques Wainer).
3.2 Characterization of Person-to-Person Interactions.
3.3 Characterization of Person-to-Person Systems.
3.4 Example Systems.
3.5 Summary and Conclusions.
4 Enterprise Application Integration and Business-to-Business Integration Processes (Christoph Bussler).
4.2 Examples of EAI and B2B Processes.
4.3 Concepts, Architectures, and Tools.
4.4 Future Developments.
PART II Modeling Languages.
5 Process Modeling Using UML (Gregor Engels, Alexander Förster, Reiko Heckel, and Sebastian Thöne).
5.2 Modeling Control Flow with Activity Diagrams.
5.3 Modeling Objects and Object Flow.
5.4 Modeling Organizational Structure.
5.5 Modeling Business Partner Interactions.
5.6 System-Specific Process Models.
6 Process Modeling Using Event-Driven Process Chains (August-Wilhelm Scheer, Oliver Thomas, and Otmar Adam).
6.2 Overview of EPC.
6.3 The ARIS Business Process Meta-Model.
6.4 How to Correctly Model EPCs.
6.5 The ARIS Architecture.
6.6 Future Extensions.
7 Process Modeling Using Petri Nets (Jörg Desel).
7.2 Petri Nets.
7.3 Petri Net Classes and Behavior.
7.4 Modeling Single Processes Without Resources.
7.5 Modeling Processes with Resources.
7.6 Behavior and Refinement.
7.8 Net Classes.
8 Patterns of Process Modeling (Wil van der Aalst, Arthur H. M. ter Hofstede, and Marlon Dumas).
8.2 Classification of Patterns.
8.3 Examples of Control-Flow Patterns.
PART III Techniques.
9 Process Design and Redesign (Hajo A. Reijers).
9.2 Methodologies, Techniques, and Tools.
9.3 Business Process Performance Indicators.
9.4 Redesigning Processes Using Best Practices.
9.5 Information-Based Business Process Design.
10 Process Mining (Wil van der Aalst and A.J.M.M. (Ton) Weijters).
10.2 Process Mining: An Overview.
10.3 Process Mining with the Algorithm.
10.4 Limitations of the Alpha Approach and Possible Solutions.
11 Transactional Business Processes (Gustavo Alonso).
11.2 Transactional Consistency.
11.4 Infrastructure for Implementing Atomicity.
11.6 Exercises and Assignments.
PART IV Standards and Tools.
12 Standards for Workflow Definition and Execution (Jan Mendling, Michael zur Muehlen, and Adrian Price).
12.2 Standardization Bodies Relevant to PAIS.
12.3 WfMC Reference Model and WfMC Glossary.
12.4 Process Definition in XPDL.
12.5 Process Invocation Using WF-XML.
13 The Business Process Execution Language for Web Services (Rania Khalaf, Nirmal Mukhi, Francisco Curbera, and Sanjiva Weerawarana).
13.1 Introduction to Web Services.
14 Workflow Management in Staffware (Charles Brown).
14.3 Integration Tools.
15 The FLOWer Case-Handling Approach: Beyond Workflow Management (Paul Berens).
15.2 Overview of Case Handling and FLOWer.
15.3 Conceptual Integrity of FLOWer.
15.4 Golden Rules of Process Management.
Appendix: Readings and Resources.
This story is becoming frustratingly old. Cyber threats are continuously advancing in their adaptability speed, sophistication, and degree of stealthiness. At the same time, the exposed footprint is expanding. More business operations are moving online and end-user devices—corporate-issued and user-owned—are expanding in number and variety. A reasonable question asked by executives responsible for making decisions on their organisations’ security budgets is whether their money and resources are being spent wisely. Are their businesses buying and using the best mix of security technologies to meet their needs and obligations? Read on.
GeForms allows you to create your own forms or fill in existing forms electronically. Using GeForms you are provided with sophisticated form design tools which ...
Allianz Shared Infrastructure Services SE (ASIC) wanted to replace its current suite of management tools, some of which had been developed in-house, with a standard solution for the management of 600 network components in its data centre, in order to reduce costs and further improve quality. Find out what approach they took download today.
- FTTechnical Business AnalystNSW
- FTTest EngineerVIC
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTLead Software EngineerSA
- FTOS Web Applications DeveloperNSW
- FTSenior Python DeveloperNSW
- FTQuality ManagerSA
- FTWeb Analyst - WebTrendsVIC
- FTFlash / ActionScript Developer - ContractNSW
- FTR&D EngineerSA
- CITRIX SYNERGY ’13: Look beyond Cloud infrastructure, says Liang
- CITRIX SYNERGY ’13: Christiancen highlights the need for collaboration
- CITRIX SYNERGY ’13: Devices will change how people work, says Duursma
- IN PICTURES: Citrix Solutions expo (49 photos)
- IN PICTURES: Citrix parties one more night with Maroon 5 ( +57 photos)
- Analytics and personalisation drive leading marketer behaviour: Report
- Innovation and big data take centre stage during CMO panel
- Twitter targets second screen interaction with Amplify advertising partnerships
- Facebook talks hyper-targeting, analytics and cross-platform at AANA event
- Tapping into social experience: Tourism Australia