SlideShare une entreprise Scribd logo
1  sur  22
Correcting Choreographiesusing Graph Similarities Niels Lohmann BPM 2008 ▪ Milan ▪ 2 September 2008 http://service-technology.org/bpm2008 UNIVERSITÄT ROSTOCK
2 a deadlock in a choreography How can weavoid this? What wentwrong? Who is toblame? http://thisboyissmooth.wordpress.com/2008/02/12/sistemas-operativos-e-deadlocks/
State-of-the-art choreography analysis  3 translate BPEL choreography into formal model check for deadlocks if deadlock found: choose a "scapegoat" participant remove it from the choreography synthesize a corrected version (if possible) retranslate synthesized participant back to BPEL Full tool support available! [WS-FM2007]
Problem with that approach 4 the synthesized service is built independently from the scapegoat gives no information what was changed is correct, yet might not cover the original intention
Example choreography 5 ✓
Example choreography 6 ✗
Fix the customer service 7 ✗ scapegoat ✓ ✓ better choice
Setting 8 given: a service (the scapegoat) a set ofcandidates find: the candidate that is most similar to the scapegoat …without sequentially checking all candidates
Operating Guidelines in a Nutshell 9 automaton annotated with Boolean formulae characterizes all partners of a service [ATPN2007] partner iffsimulated by OG + fulfilling the annotations
OG characterizes all possible corrections 10 and 2001 additional candidates ✓ ✗ ✓
Setting (refined) 11 given: a service automaton (the scapegoat) an operating guideline characterizing allcandidates find: the candidate that is most similar to the scapegoat …without sequentially checking all candidates
Graph edit distance a measure to compare graphs: edit distance= no. of needed actions to achieve graph isomorphism maybe associated with a cost function b a modify b to a a d 0,5 a d add c branch e c d c d e 0,7 delete e branch e 0,3 12
Graph edit distance vs. behavior !a ?b !c ?b !a low edit distance unsimilar behavior high edit distance equivalent behavior  !c !a ?b ?b !a high edit distance unsimilar behavior !c 13
Simulation-based graph similarity Idea: find a similarity that respects simulation compare two states and find best transitionsw.r.t. successor states  [TACAS2006] a a b c c b d d d 14
Simulation-based graph similarity Mismatches are treated with stuttering steps penalize stuttering by label similarity function choose best pairs by maximizing label similarity a a b c c b e d ε f 15
Simulation-based edit distance label similarity function defines an edit distance (a,a)	➙keep a (e,d)	➙change e to d (ε,x)	➙insert x (f,ε)	➙delete f values can be derived from semantic Webinformation (!€,!$) or (?receipt,?confirmation) rather high (!login,?invoice) rather low a a b c b c e d ε f 16
Simulation and OG matching 17 Simulation is only one part of the OG matching next step: make edit distance aware of formulas ✗
Respect formulas 18 instead of comparison with the OG's structure… compare with satisfying assignments of the formula worst-case complexity: O(|QSA|⋅|QOG|⋅2|I|⋅|I|!) assignments edge permutations
Experimental results 19 Simulation- and matching-based edit distance implemented in tool RAChEL Dynamic programming exploits structure of the problem  Most results within few seconds Exceptions have near-worst-case structure/formulas Repairing Automata forChoreographies by Editing Labels
20 edit actions can be mapped back to original service result can be influenced by adjusting label similarities  Fixing the example with Rachel
21 choreographies can be fixed using the edit distance can help to only change little partsof the scapegoat prototype shows that fixing of real-life processesworks(tool + slides at http://service-technology.org/bpm2008) Open questions: Which service to fix? What about cyclic or nondeterministic services? How does the mapping backto BPEL really work? Can we support more elaborate edit actions? Can heuristics help to improve performance?  Take home points Thank you! Any questions?
22 [TACAS2006] Oleg Sokolsky, SampathKannan, and Insup Lee. Simulation-based graph similarity. In TACAS 2006, volume 3920 of LNCS, pages 426–440. Springer, 2006. [WS-FM2007] Niels Lohmann, Oliver Kopp, Frank Leymann, and Wolfgang Reisig. Analyzing BPEL4Chor: Verification and participant synthesis. In WS-FM 2007, volume 4937 of LNCS, pages 46–60. Springer, 2008. [ATPN2007] Niels Lohmann, Peter Massuthe, and Karsten Wolf. Operating guidelines for finite-state services. In ICATPN 2007, volume 4546 of LNCS, pages 321-341. Springer, 2007. References

Contenu connexe

En vedette

Assigning a static ip address
Assigning a static ip addressAssigning a static ip address
Assigning a static ip addressVimar Dohinog
 
Experiment conclusion
Experiment conclusionExperiment conclusion
Experiment conclusionroshanrm
 
rockIT Fashion Visual Marketing Plan
rockIT Fashion Visual Marketing PlanrockIT Fashion Visual Marketing Plan
rockIT Fashion Visual Marketing PlanAshley Hoffman
 
Skydiving Information
Skydiving InformationSkydiving Information
Skydiving InformationHopeKroel
 
Age of Acquisition
Age of AcquisitionAge of Acquisition
Age of AcquisitionSùng A Tô
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality AssuranceSachithra Gayan
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality Assurancelakshmi1693
 

En vedette (9)

Matter1
Matter1Matter1
Matter1
 
Assigning a static ip address
Assigning a static ip addressAssigning a static ip address
Assigning a static ip address
 
Set Algebra for Service Behavior
Set Algebra for Service BehaviorSet Algebra for Service Behavior
Set Algebra for Service Behavior
 
Experiment conclusion
Experiment conclusionExperiment conclusion
Experiment conclusion
 
rockIT Fashion Visual Marketing Plan
rockIT Fashion Visual Marketing PlanrockIT Fashion Visual Marketing Plan
rockIT Fashion Visual Marketing Plan
 
Skydiving Information
Skydiving InformationSkydiving Information
Skydiving Information
 
Age of Acquisition
Age of AcquisitionAge of Acquisition
Age of Acquisition
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality Assurance
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality Assurance
 

Similaire à Correcting Deadlocking Service Choreographies Using a Simulation-Based Graph Edit Distance

Scalable Conformance Checking of Business Processes
Scalable Conformance Checking of Business ProcessesScalable Conformance Checking of Business Processes
Scalable Conformance Checking of Business ProcessesMarlon Dumas
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Compressed domain video retargeting
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Compressed domain video retargetingIEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Compressed domain video retargeting
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Compressed domain video retargetingIEEEBEBTECHSTUDENTPROJECTS
 
Patching the gap in collaborating on models
Patching the gap in collaborating on modelsPatching the gap in collaborating on models
Patching the gap in collaborating on modelsÁbel Hegedüs
 
Crude-Oil Scheduling Technology: moving from simulation to optimization
Crude-Oil Scheduling Technology: moving from simulation to optimizationCrude-Oil Scheduling Technology: moving from simulation to optimization
Crude-Oil Scheduling Technology: moving from simulation to optimizationBrenno Menezes
 
Boetticher Presentation Promise 2008v2
Boetticher Presentation Promise 2008v2Boetticher Presentation Promise 2008v2
Boetticher Presentation Promise 2008v2gregoryg
 
result analysis for deep leakage from gradients
result analysis for deep leakage from gradientsresult analysis for deep leakage from gradients
result analysis for deep leakage from gradients國騰 丁
 
Incremental and Interactive Process Model Repair
Incremental and Interactive Process Model RepairIncremental and Interactive Process Model Repair
Incremental and Interactive Process Model RepairMarlon Dumas
 
Do I need tests when I have the compiler - Andrzej Jóźwiak - TomTom Dev Day 2020
Do I need tests when I have the compiler - Andrzej Jóźwiak - TomTom Dev Day 2020Do I need tests when I have the compiler - Andrzej Jóźwiak - TomTom Dev Day 2020
Do I need tests when I have the compiler - Andrzej Jóźwiak - TomTom Dev Day 2020Andrzej Jóźwiak
 
Edge backpropagation for noisy logo recognition
Edge backpropagation for noisy logo recognitionEdge backpropagation for noisy logo recognition
Edge backpropagation for noisy logo recognitionAmir Shokri
 
Breathe Life Into Your IDE
Breathe Life Into Your IDEBreathe Life Into Your IDE
Breathe Life Into Your IDEBenoit Combemale
 
Travelling Salesman Problem, Robotics & Inverse Kinematics
Travelling Salesman Problem, Robotics & Inverse KinematicsTravelling Salesman Problem, Robotics & Inverse Kinematics
Travelling Salesman Problem, Robotics & Inverse Kinematicsmcoond
 
SiriusCon 2015 - Breathe Life into Your Designer!
SiriusCon 2015 - Breathe Life into Your Designer!SiriusCon 2015 - Breathe Life into Your Designer!
SiriusCon 2015 - Breathe Life into Your Designer!melbats
 
LocFaults, a bounded constraint-based approach to aid for error localization
LocFaults, a bounded constraint-based approach to aid for error localizationLocFaults, a bounded constraint-based approach to aid for error localization
LocFaults, a bounded constraint-based approach to aid for error localizationMohammed Bekkouche
 

Similaire à Correcting Deadlocking Service Choreographies Using a Simulation-Based Graph Edit Distance (20)

Scalable Conformance Checking of Business Processes
Scalable Conformance Checking of Business ProcessesScalable Conformance Checking of Business Processes
Scalable Conformance Checking of Business Processes
 
Repair dagstuhl jan2017
Repair dagstuhl jan2017Repair dagstuhl jan2017
Repair dagstuhl jan2017
 
A Theory of Service Behavior
A Theory of Service BehaviorA Theory of Service Behavior
A Theory of Service Behavior
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Compressed domain video retargeting
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Compressed domain video retargetingIEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Compressed domain video retargeting
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Compressed domain video retargeting
 
Dag amendment lowres
Dag amendment lowresDag amendment lowres
Dag amendment lowres
 
Patching the gap in collaborating on models
Patching the gap in collaborating on modelsPatching the gap in collaborating on models
Patching the gap in collaborating on models
 
Crude-Oil Scheduling Technology: moving from simulation to optimization
Crude-Oil Scheduling Technology: moving from simulation to optimizationCrude-Oil Scheduling Technology: moving from simulation to optimization
Crude-Oil Scheduling Technology: moving from simulation to optimization
 
APSEC2020 Keynote
APSEC2020 KeynoteAPSEC2020 Keynote
APSEC2020 Keynote
 
Boetticher Presentation Promise 2008v2
Boetticher Presentation Promise 2008v2Boetticher Presentation Promise 2008v2
Boetticher Presentation Promise 2008v2
 
result analysis for deep leakage from gradients
result analysis for deep leakage from gradientsresult analysis for deep leakage from gradients
result analysis for deep leakage from gradients
 
Incremental and Interactive Process Model Repair
Incremental and Interactive Process Model RepairIncremental and Interactive Process Model Repair
Incremental and Interactive Process Model Repair
 
Do I need tests when I have the compiler - Andrzej Jóźwiak - TomTom Dev Day 2020
Do I need tests when I have the compiler - Andrzej Jóźwiak - TomTom Dev Day 2020Do I need tests when I have the compiler - Andrzej Jóźwiak - TomTom Dev Day 2020
Do I need tests when I have the compiler - Andrzej Jóźwiak - TomTom Dev Day 2020
 
Generative AI for Reengineering Variants into Software Product Lines: An Expe...
Generative AI for Reengineering Variants into Software Product Lines: An Expe...Generative AI for Reengineering Variants into Software Product Lines: An Expe...
Generative AI for Reengineering Variants into Software Product Lines: An Expe...
 
Edge backpropagation for noisy logo recognition
Edge backpropagation for noisy logo recognitionEdge backpropagation for noisy logo recognition
Edge backpropagation for noisy logo recognition
 
Breathe Life Into Your IDE
Breathe Life Into Your IDEBreathe Life Into Your IDE
Breathe Life Into Your IDE
 
Fool me twice
Fool me twiceFool me twice
Fool me twice
 
Travelling Salesman Problem, Robotics & Inverse Kinematics
Travelling Salesman Problem, Robotics & Inverse KinematicsTravelling Salesman Problem, Robotics & Inverse Kinematics
Travelling Salesman Problem, Robotics & Inverse Kinematics
 
16May_ICSE_MIP_APR_2023.pptx
16May_ICSE_MIP_APR_2023.pptx16May_ICSE_MIP_APR_2023.pptx
16May_ICSE_MIP_APR_2023.pptx
 
SiriusCon 2015 - Breathe Life into Your Designer!
SiriusCon 2015 - Breathe Life into Your Designer!SiriusCon 2015 - Breathe Life into Your Designer!
SiriusCon 2015 - Breathe Life into Your Designer!
 
LocFaults, a bounded constraint-based approach to aid for error localization
LocFaults, a bounded constraint-based approach to aid for error localizationLocFaults, a bounded constraint-based approach to aid for error localization
LocFaults, a bounded constraint-based approach to aid for error localization
 

Plus de Universität Rostock

Pragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementationsPragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementationsUniversität Rostock
 
Where did I go wrong? Explaining errors in process models
Where did I go wrong? Explaining errors in process modelsWhere did I go wrong? Explaining errors in process models
Where did I go wrong? Explaining errors in process modelsUniversität Rostock
 
Decidability Results for Choreography Realization
Decidability Results for Choreography RealizationDecidability Results for Choreography Realization
Decidability Results for Choreography RealizationUniversität Rostock
 
Artifact-centric modeling using BPMN
Artifact-centric modeling using BPMNArtifact-centric modeling using BPMN
Artifact-centric modeling using BPMNUniversität Rostock
 
Compliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business ProcessesCompliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business ProcessesUniversität Rostock
 
Verification with LoLA: 7 Implementation
Verification with LoLA: 7 ImplementationVerification with LoLA: 7 Implementation
Verification with LoLA: 7 ImplementationUniversität Rostock
 
Verification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLAVerification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLAUniversität Rostock
 
Verification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case StudiesVerification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case StudiesUniversität Rostock
 
Verification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLAVerification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLAUniversität Rostock
 
Verification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space ReductionVerification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space ReductionUniversität Rostock
 
Verification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input LanguageVerification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input LanguageUniversität Rostock
 
Internal Behavior Reduction for Services
Internal Behavior Reduction for ServicesInternal Behavior Reduction for Services
Internal Behavior Reduction for ServicesUniversität Rostock
 
Karsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial SymposiumKarsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial SymposiumUniversität Rostock
 
Implementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDAImplementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDAUniversität Rostock
 
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...Universität Rostock
 
Demonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and FionaDemonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and FionaUniversität Rostock
 

Plus de Universität Rostock (20)

Pragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementationsPragmatic model checking: from theory to implementations
Pragmatic model checking: from theory to implementations
 
Where did I go wrong? Explaining errors in process models
Where did I go wrong? Explaining errors in process modelsWhere did I go wrong? Explaining errors in process models
Where did I go wrong? Explaining errors in process models
 
Decidability Results for Choreography Realization
Decidability Results for Choreography RealizationDecidability Results for Choreography Realization
Decidability Results for Choreography Realization
 
Artifact-centric modeling using BPMN
Artifact-centric modeling using BPMNArtifact-centric modeling using BPMN
Artifact-centric modeling using BPMN
 
Compliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business ProcessesCompliance by Design for Artifact-Centric Business Processes
Compliance by Design for Artifact-Centric Business Processes
 
Verification with LoLA
Verification with LoLAVerification with LoLA
Verification with LoLA
 
Verification with LoLA: 7 Implementation
Verification with LoLA: 7 ImplementationVerification with LoLA: 7 Implementation
Verification with LoLA: 7 Implementation
 
Verification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLAVerification with LoLA: 6 Integrating LoLA
Verification with LoLA: 6 Integrating LoLA
 
Verification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case StudiesVerification with LoLA: 5 Case Studies
Verification with LoLA: 5 Case Studies
 
Verification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLAVerification with LoLA: 4 Using LoLA
Verification with LoLA: 4 Using LoLA
 
Verification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space ReductionVerification with LoLA: 3 State Space Reduction
Verification with LoLA: 3 State Space Reduction
 
Verification with LoLA: 1 Basics
Verification with LoLA: 1 BasicsVerification with LoLA: 1 Basics
Verification with LoLA: 1 Basics
 
Verification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input LanguageVerification with LoLA: 2 The LoLA Input Language
Verification with LoLA: 2 The LoLA Input Language
 
Saarbruecken
SaarbrueckenSaarbruecken
Saarbruecken
 
Ws4 dsec talk @ Kickoff RS3
Ws4 dsec talk @ Kickoff RS3Ws4 dsec talk @ Kickoff RS3
Ws4 dsec talk @ Kickoff RS3
 
Internal Behavior Reduction for Services
Internal Behavior Reduction for ServicesInternal Behavior Reduction for Services
Internal Behavior Reduction for Services
 
Karsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial SymposiumKarsten Wolf @ Carl Adam Petri Memorial Symposium
Karsten Wolf @ Carl Adam Petri Memorial Symposium
 
Implementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDAImplementation of an Interleaving Semantics for TLDA
Implementation of an Interleaving Semantics for TLDA
 
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
 
Demonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and FionaDemonstration of BPEL2oWFN and Fiona
Demonstration of BPEL2oWFN and Fiona
 

Dernier

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Correcting Deadlocking Service Choreographies Using a Simulation-Based Graph Edit Distance

  • 1. Correcting Choreographiesusing Graph Similarities Niels Lohmann BPM 2008 ▪ Milan ▪ 2 September 2008 http://service-technology.org/bpm2008 UNIVERSITÄT ROSTOCK
  • 2. 2 a deadlock in a choreography How can weavoid this? What wentwrong? Who is toblame? http://thisboyissmooth.wordpress.com/2008/02/12/sistemas-operativos-e-deadlocks/
  • 3. State-of-the-art choreography analysis 3 translate BPEL choreography into formal model check for deadlocks if deadlock found: choose a "scapegoat" participant remove it from the choreography synthesize a corrected version (if possible) retranslate synthesized participant back to BPEL Full tool support available! [WS-FM2007]
  • 4. Problem with that approach 4 the synthesized service is built independently from the scapegoat gives no information what was changed is correct, yet might not cover the original intention
  • 7. Fix the customer service 7 ✗ scapegoat ✓ ✓ better choice
  • 8. Setting 8 given: a service (the scapegoat) a set ofcandidates find: the candidate that is most similar to the scapegoat …without sequentially checking all candidates
  • 9. Operating Guidelines in a Nutshell 9 automaton annotated with Boolean formulae characterizes all partners of a service [ATPN2007] partner iffsimulated by OG + fulfilling the annotations
  • 10. OG characterizes all possible corrections 10 and 2001 additional candidates ✓ ✗ ✓
  • 11. Setting (refined) 11 given: a service automaton (the scapegoat) an operating guideline characterizing allcandidates find: the candidate that is most similar to the scapegoat …without sequentially checking all candidates
  • 12. Graph edit distance a measure to compare graphs: edit distance= no. of needed actions to achieve graph isomorphism maybe associated with a cost function b a modify b to a a d 0,5 a d add c branch e c d c d e 0,7 delete e branch e 0,3 12
  • 13. Graph edit distance vs. behavior !a ?b !c ?b !a low edit distance unsimilar behavior high edit distance equivalent behavior  !c !a ?b ?b !a high edit distance unsimilar behavior !c 13
  • 14. Simulation-based graph similarity Idea: find a similarity that respects simulation compare two states and find best transitionsw.r.t. successor states [TACAS2006] a a b c c b d d d 14
  • 15. Simulation-based graph similarity Mismatches are treated with stuttering steps penalize stuttering by label similarity function choose best pairs by maximizing label similarity a a b c c b e d ε f 15
  • 16. Simulation-based edit distance label similarity function defines an edit distance (a,a) ➙keep a (e,d) ➙change e to d (ε,x) ➙insert x (f,ε) ➙delete f values can be derived from semantic Webinformation (!€,!$) or (?receipt,?confirmation) rather high (!login,?invoice) rather low a a b c b c e d ε f 16
  • 17. Simulation and OG matching 17 Simulation is only one part of the OG matching next step: make edit distance aware of formulas ✗
  • 18. Respect formulas 18 instead of comparison with the OG's structure… compare with satisfying assignments of the formula worst-case complexity: O(|QSA|⋅|QOG|⋅2|I|⋅|I|!) assignments edge permutations
  • 19. Experimental results 19 Simulation- and matching-based edit distance implemented in tool RAChEL Dynamic programming exploits structure of the problem Most results within few seconds Exceptions have near-worst-case structure/formulas Repairing Automata forChoreographies by Editing Labels
  • 20. 20 edit actions can be mapped back to original service result can be influenced by adjusting label similarities Fixing the example with Rachel
  • 21. 21 choreographies can be fixed using the edit distance can help to only change little partsof the scapegoat prototype shows that fixing of real-life processesworks(tool + slides at http://service-technology.org/bpm2008) Open questions: Which service to fix? What about cyclic or nondeterministic services? How does the mapping backto BPEL really work? Can we support more elaborate edit actions? Can heuristics help to improve performance? Take home points Thank you! Any questions?
  • 22. 22 [TACAS2006] Oleg Sokolsky, SampathKannan, and Insup Lee. Simulation-based graph similarity. In TACAS 2006, volume 3920 of LNCS, pages 426–440. Springer, 2006. [WS-FM2007] Niels Lohmann, Oliver Kopp, Frank Leymann, and Wolfgang Reisig. Analyzing BPEL4Chor: Verification and participant synthesis. In WS-FM 2007, volume 4937 of LNCS, pages 46–60. Springer, 2008. [ATPN2007] Niels Lohmann, Peter Massuthe, and Karsten Wolf. Operating guidelines for finite-state services. In ICATPN 2007, volume 4546 of LNCS, pages 321-341. Springer, 2007. References

Notes de l'éditeur

  1. manyparticipantsno globalcontrol
  2. applications: e.g. testing (as you will see)
  3. Zahlen feiern! (für Kathrin)