摘要:
Techniques are disclosed for capturing, storing, querying and analyzing provenance data for automatic discovery of enterprise process information. For example, a computer-implemented method for managing a process associated with an enterprise comprises the following steps. Data associated with an actual end-to-end execution of an enterprise process is collected. Provenance data is generated based on at least a portion of the collected data, wherein the provenance data is indicative of a lineage of one or more data items. A provenance graph that provides a visual representation of the generated provenance data is generated, wherein nodes of the graph represent records associated with the collected data and edges of the graph represent relations between the records. The generated provenance graph is stored in a repository for use in analyzing the enterprise process.
摘要:
A method, system and computer program product for determining health of a case. The method includes the steps of: obtaining at least one correlated trace from (i) task descriptions or (ii) data related to the task descriptions or a process instance; calculating at least one current metric using (i) the task descriptions, (ii) the data, (iii) the correlated trace or (iv) a first model; calculating at least one prognostic metric using a second model; and creating at least one combination metric from the current metric and the prognostic metric; where at least one of the steps is carried out using a computer device.
摘要:
Techniques are disclosed for capturing, storing, querying and analyzing provenance data for automatic discovery of enterprise process information. For example, a computer-implemented method for managing a process associated with an enterprise comprises the following steps. Data associated with an actual end-to-end execution of an enterprise process is collected. Provenance data is generated based on at least a portion of the collected data, wherein the provenance data is indicative of a lineage of one or more data items. A provenance graph that provides a visual representation of the generated provenance data is generated, wherein nodes of the graph represent records associated with the collected data and edges of the graph represent relations between the records. The generated provenance graph is stored in a repository for use in analyzing the enterprise process.
摘要:
Techniques are disclosed for extracting information through analysis of provenance data. For example, a computer-implemented method of extracting information regarding an execution of an enterprise process comprises the following steps. Provenance data is generated, wherein the provenance data is based on collected data associated with an actual end-to-end execution of the enterprise process and is indicative of a lineage of one or more data items. A provenance graph is generated that provides a visual representation of the generated provenance data, wherein nodes of the graph represent records associated with the collected data and edges of the graph represent relations between the records. At least a portion of the generated provenance data from the graph is analyzed so as to extract information about the execution of the enterprise process based on the analysis.
摘要:
Techniques are disclosed for extracting information through analysis of provenance data. For example, a computer-implemented method of extracting information regarding an execution of an enterprise process comprises the following steps. Provenance data is generated, wherein the provenance data is based on collected data associated with an actual end-to-end execution of the enterprise process and is indicative of a lineage of one or more data items. A provenance graph is generated that provides a visual representation of the generated provenance data, wherein nodes of the graph represent records associated with the collected data and edges of the graph represent relations between the records. At least a portion of the generated provenance data from the graph is analyzed so as to extract information about the execution of the enterprise process based on the analysis.
摘要:
Techniques are disclosed for capturing, storing, querying and analyzing provenance data for automatic discovery of enterprise process information. For example, a computer-implemented method for managing a process associated with an enterprise comprises the following steps. Data associated with an actual end-to-end execution of an enterprise process is collected. Provenance data is generated based on at least a portion of the collected data, wherein the provenance data is indicative of a lineage of one or more data items. A provenance graph that provides a visual representation of the generated provenance data is generated, wherein nodes of the graph represent records associated with the collected data and edges of the graph represent relations between the records. The generated provenance graph is stored in a repository for use in analyzing the enterprise process.
摘要:
Techniques are disclosed for capturing, storing, querying and analyzing provenance data for automatic discovery of enterprise process information. For example, a computer-implemented method for managing a process associated with an enterprise comprises the following steps. Data associated with an actual end-to-end execution of an enterprise process is collected. Provenance data is generated based on at least a portion of the collected data, wherein the provenance data is indicative of a lineage of one or more data items. A provenance graph that provides a visual representation of the generated provenance data is generated, wherein nodes of the graph represent records associated with the collected data and edges of the graph represent relations between the records. The generated provenance graph is stored in a repository for use in analyzing the enterprise process.
摘要:
Techniques are disclosed for influencing behavior of enterprise operations during process enactment using provenance data. For example, a computer-implemented method of influencing a behavior of an enterprise process comprises the following steps. Provenance data is generated, wherein the provenance data is based on collected data associated with at least a partial actual execution of the enterprise process and is indicative of a lineage of one or more data items. A provenance graph is generated that provides a visual representation of the generated provenance data, wherein nodes of the graph represent records associated with the collected data and edges of the graph represent relations between the records. At least a portion of the generated provenance data from the graph is analyzed to generate an execution pattern corresponding to the at least partial actual execution of the enterprise process. The execution pattern is compared to one or more previously stored patterns. A determination is made as to whether or not to alter the enterprise process based on a result of the comparison.
摘要:
Techniques are disclosed for influencing behavior of enterprise operations during process enactment using provenance data. For example, a computer-implemented method of influencing a behavior of an enterprise process comprises the following steps. Provenance data is generated, wherein the provenance data is based on collected data associated with at least a partial actual execution of the enterprise process and is indicative of a lineage of one or more data items. A provenance graph is generated that provides a visual representation of the generated provenance data, wherein nodes of the graph represent records associated with the collected data and edges of the graph represent relations between the records. At least a portion of the generated provenance data from the graph is analyzed to generate an execution pattern corresponding to the at least partial actual execution of the enterprise process. The execution pattern is compared to one or more previously stored patterns. A determination is made as to whether or not to alter the enterprise process based on a result of the comparison.
摘要:
Techniques are disclosed for validating compliance with enterprise operations based on provenance data. For example, a computer-implemented method for validating that an enterprise process is in compliance with a rule comprises the following steps. Provenance data is generated, wherein the provenance data is based on collected data associated with an actual end-to-end execution of the enterprise process and is indicative of a lineage of one or more data items. A provenance graph is generated that provides a visual representation of the generated provenance data, wherein nodes of the graph represent records associated with the collected data and edges of the graph represent relations between the records. A correlation is generated between one or more entities in the rule and one or more record types in the provenance data. One or more control points are generated in accordance with the generated correlation. A validation is performed as to whether the enterprise process is in compliance with the rule using the one or more control points.