摘要:
An extensible process design provides an ability to dynamically inject changes into a running process instance, such as a BPEL instance. Using a combination of BPEL, rules and events, processes can be designed to allow flexibility in terms of adding new activities, removing or skipping activities and adding dependent activities. These changes do not require redeployment of the orchestration process and can affect the behavior of in-flight process instances. The extensible process design includes a main orchestration process, a set of task execution processes and a set of generic trigger processes. The design also includes a set of rules evaluated during execution of the tasks of the orchestration process. The design can further include three types of events: an initiate process event, a pre-task execution event and a post-task execution event. These events and rules can be used to alter the behavior of the main orchestration process at runtime.
摘要:
An extensible process design provides an ability to dynamically inject changes into a running process instance, such as a BPEL instance. Using a combination of BPEL, rules and events, processes can be designed to allow flexibility in terms of adding new activities, removing or skipping activities and adding dependent activities. These changes do not require redeployment of the orchestration process and can affect the behavior of in-flight process instances. The extensible process design includes a main orchestration process, a set of task execution processes and a set of generic trigger processes. The design also includes a set of rules evaluated during execution of the tasks of the orchestration process. The design can further include three types of events: an initiate process event, a pre-task execution event and a post-task execution event. These events and rules can be used to alter the behavior of the main orchestration process at runtime.
摘要:
A computer-readable medium, computer-implemented method, and financial close management system are provided that includes a integration framework that allows an end user to leverage services or interfaces from external applications as part of a business process, such as a financial close process, of a financial close management system. The integration framework can integrate a task that requires the user to interact with a user interface of an external application (identified as an “end user task”) with the financial close management system. The integration framework can also integrate a task that runs without any user interaction required, and that interacts with a web service of an external application (identified as a “system automated task”) with the financial close management system.
摘要:
A computer-readable medium, computer-implemented method, and financial close management system are provided that manage a schedule. A schedule is a core object of the financial close management system, and is an expression of a template. Managing a schedule can include creating a new schedule, modifying an existing schedule, deleting an existing schedule, duplicating an existing schedule, validating an existing schedule, creating a template from an existing schedule, setting a status of an existing schedule, and importing and exporting an existing schedule. In addition, managing a schedule can include defining task type parameters that can be set during scheduling and setting task parameters of a schedule at a schedule level rather than a task level.
摘要:
An integrated circuit (IC) die has side input/output (IO) pads located along each side of the die interior. Each die corner has a corner IO pad. The side IO pads adjacent to the corner IO pads have shortened passivation regions in the top metal layer (TML) that define TML access regions. TML traces run through the TML access regions to connect the corner IO pads to the die interior. Providing corner IO pads enables an IC die to have up to four more IO pads than a comparable conventional IC die that does not have any corner IO pads, or an IC die to have the same number of IO pads within a smaller overall footprint.
摘要:
The invention, referred to herein as PeaCoCk, uses a unique blend of technologies from statistics, information theory, and graph theory to quantify and discover patterns in relationships between entities, such as products and customers, as evidenced by purchase behavior. In contrast to traditional purchase-frequency based market basket analysis techniques, such as association rules which mostly generate obvious and spurious associations, PeaCoCk employs information-theoretic notions of consistency and similarity, which allows robust statistical analysis of the true, statistically significant, and logical associations between products. Therefore, PeaCoCk lends itself to reliable, robust predictive analytics based on purchase-behavior.
摘要:
A method of modeling includes quantifying a co-operative strength value for a plurality of pairs of variables, and identifying a clique of at least three variables based on a graph of the co-operative strength values of a plurality of pairs of variables. The method also includes selecting a first pair of variables of the plurality of pairs of variables having a high co-operative strength value. A second clique may also be identified. A model of the first clique and a model of the second clique are made. The outputs of these models are combined to form a combined model which is used to make various decisions with respect to real time data.
摘要:
A system for classifying a transaction as fraudulent includes a training component and a scoring component. The training component acts on historical data and also includes a multi-dimensional risk table component comprising one or more multidimensional risk tables each of which approximates an initial risk value for a substantially empty cell in a risk table based upon risk values in cells related to the substantially empty cell. The scoring component produces a score, based in part, on the risk tables associated with groupings of variables having values determined by the training component. The scoring component includes a statistical model that produces an output and wherein the transaction is classified as fraudulent when the output is above a selected threshold value.
摘要:
The invention, referred to herein as PeaCoCk, uses a unique blend of technologies from statistics, information theory, and graph theory to quantify and discover patterns in relationships between entities, such as products and customers, as evidenced by purchase behavior. In contrast to traditional purchase-frequency based market basket analysis techniques, such as association rules which mostly generate obvious and spurious associations, PeaCoCk employs information-theoretic notions of consistency and similarity, which allows robust statistical analysis of the true, statistically significant, and logical associations between products. Therefore, PeaCoCk lends itself to reliable, robust predictive analytics based on purchase-behavior.
摘要:
The invention, referred to herein as PeaCoCk, uses a unique blend of technologies from statistics, information theory, and graph theory to quantify and discover patterns in relationships between entities, such as products and customers, as evidenced by purchase behavior. In contrast to traditional purchase-frequency based market basket analysis techniques, such as association rules which mostly generate obvious and spurious associations, PeaCoCk employs information-theoretic notions of consistency and similarity, which allows robust statistical analysis of the true, statistically significant, and logical associations between products. Therefore, PeaCoCk lends itself to reliable, robust predictive analytics based on purchase-behavior.