skip to main content
10.1145/1989284.1989286acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
keynote

A quest for beauty and wealth (or, business processes for database researchers)

Published:13 June 2011Publication History

ABSTRACT

While classic data management focuses on the data itself, research on Business Processes considers also the context in which this data is generated and manipulated, namely the processes, the users, and the goals that this data serves. This allows the analysts a better perspective of the organizational needs centered around the data. As such, this research is of fundamental importance.

Much of the success of database systems in the last decade is due to the beauty and elegance of the relational model and its declarative query languages, combined with a rich spectrum of underlying evaluation and optimization techniques, and efficient implementations. This, in turn, has lead to an economic wealth for both the users and vendors of database systems. Similar beauty and wealth are sought for in the context of Business Processes. Much like the case for traditional database research, elegant modeling and rich underlying technology are likely to bring economic wealth for the Business Process owners and their users; both can benefit from easy formulation and analysis of the processes. While there have been many important advances in this research in recent years, there is still much to be desired: specifically, there have been many works that focus on the processes behavior (flow), and many that focus on its data, but only very few works have dealt with both. We will discuss here the important advantages of a holistic flow-and-data framework for Business Processes, the progress towards such a framework, and highlight the current gaps and research directions.

Skip Supplemental Material Section

Supplemental Material

sigmod110613.flv

References

  1. Serge Abiteboul, Pierre Bourhis, Alban Galland, and Bogdan Marinoiu. The axml artifact model. In TIME, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Serge Abiteboul, Pierre Bourhis, and Victor Vianu. Comparing workflow specification languages: a matter of views. In ICDT, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Serge Abiteboul, Richard Hull, and Victor Vianu. Foundations of Databases. Addison-Wesley, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Serge Abiteboul, Luc Segoufin, and Victor Vianu. Static analysis of active xml systems. ACM Trans. Database Syst., 34(4), 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Serge Abiteboul, Victor Vianu, Brad Fordham, and Yelena Yesha. Relational transducers for electronic commerce. In PODS, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Umut Acar, Peter Buneman, James Cheney, Jan Van Den Bussche, Natalia Kwasnikowska, and Stijn Vansummeren. A graph model of data and workflow provenance. In TaPP, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Active XML. http://activexml.net/.Google ScholarGoogle Scholar
  8. R. Alur, M. Benedikt, K. Etessami, P. Godefroid, T. Reps, and M. Yannakakis. Analysis of recursive state machines. ACM Trans. Program. Lang. Syst., 27(4), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Zhuowei Bao, Susan B. Davidson, Sanjeev Khanna, and Sudeepa Roy. An optimal labeling scheme for workflow provenance using skeleton labels. In SIGMOD, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. C. Beeri, A. Eyal, T. Milo, and A. Pilberg. Monitoring business processes with queries. In Proc. of VLDB, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Benedikt, P. Godefroid, and T. Reps. Model checking of unrestricted hierarchical state machines. In ICALP, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Michael Benedikt, Evgeny Kharlamov, Dan Olteanu, and Pierre Senellart. Probabilistic XML via Markov chains. PVLDB, 3(1), September 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Grady Booch, James Rumbaugh, and Ivar Jacobson. The Unified Modeling Language user guide. Addison Wesley Longman Publishing Co., Inc., 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Business Process Execution Language for Web Services. http://www.ibm.com/developerworks/library/ws-bpel/.Google ScholarGoogle Scholar
  15. Daniel Brand and Pitro Zafiropulo. On communicating finite-state machines. J. ACM, 30, 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. T. Bultan, J. Su, and X. Fu. Analyzing conversations of web services. IEEE Internet Computing, 10(1), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. P. Buneman, J. Cheney, and S. Vansummeren. On the expressiveness of implicit provenance in query and update languages. ACM Trans. Database Syst., 33(4), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Peter Buneman, James Cheney, and Stijn Vansummeren. On the expressiveness of implicit provenance in query and update languages. In ICDT, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Peter Buneman, Sanjeev Khanna, and Wang Chiew Tan. Why and where: A characterization of data provenance. In Proc. of ICDT, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. J. R. Burch, E. M. Clarke, K. L. McMillan, D. L. Dill, and L. J. Hwang. Symbolic model checking: 1020 states and beyond. Inf. Comput., 98(2), 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. O. Burkart and B. Steffen. Model checking for context-free processes, 1992.Google ScholarGoogle Scholar
  22. S. Ceri, P. Fraternali, A. Bongio, S. Comai M. Brambilla, and M. Matera. Designing data-intensive Web applications. Morgan-Kaufmann, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. James Cheney, Stephen Chong, Nate Foster, Margo I. Seltzer, and Stijn Vansummeren. Provenance: a future history. In Proc. of OOPSLA, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. David Cohn, Pankaj Dhoolia, Fenno Heath, Iii, Florian Pinel, and John Vergo. Siena: From powerpoint to web app in 5 minutes. In ICSOC, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. David Cohn and Richard Hull. Business artifacts: A data-centric approach to modeling business operations and processes. IEEE Data Eng. Bull., 32(3):3--9, 2009.Google ScholarGoogle Scholar
  26. B. Courcelle. Recognizable sets of graphs, hypergraphs and relational structures : a survey. In DLT '04, volume 3340 of LNCS, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Susan B. Davidson, Sanjeev Khanna, Sudeepa Roy, and Sarah Cohen Boulakia. Privacy issues in scientific workflow provenance. In WANDS, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. D. Deutch and T. Milo. Type inference and type checking for queries on execution traces. In Proc. of VLDB, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. D. Deutch and T. Milo. Evaluating top-k queries over business processes (short paper). In Proc. of ICDE, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. D. Deutch and T. Milo. Top-k projection queries for probabilistic business processes. In Proc. of ICDT, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. D. Deutch, T. Milo, N. Polyzotis, and T. Yam. Optimal top-k query evaluation for weighted business processes. In Proc. of VLDB, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. A. Deutsch, M. Marcus, L. Sui, V. Vianu, and D. Zhou. A verifier for interactive, data-driven web applications. In Proc. of SIGMOD, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. A. Deutsch, M. Marcus, L. Sui, V. Vianu, and D. Zhou. A verifier for interactive, data-driven web applications. In Proc. of SIGMOD, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. A. Deutsch, L. Sui, V. Vianu, and D. Zhou. Verification of communicating data-driven web services. In Proc. of PODS, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Alin Deutsch, Liying Sui, and Victor Vianu. Specification and verification of data-driven web services. In PODS, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Bruce Powel Douglass. Uml statecharts. Embedded Systems Programming, 1999.Google ScholarGoogle Scholar
  37. E. A. Emerson. Temporal and modal logic. In J. van Leeuwen, editor, Handbook of Theoretical Computer Science: Volume B: Formal Models and Semantics. Elsevier, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. K. Etessami and M. Yannakakis. Algorithmic verification of recursive probabilistic state machines. In TACAS, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. K. Etessami and M. Yannakakis. Recursive markov chains, stochastic grammars, and monotone systems of nonlinear equations. JACM, 56(1), 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. J. N. Foster, T. J. Green, and V. Tannen. Annotated xml: queries and provenance. In PODS, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. J.N. Foster, T.J. Green, and V. Tannen. Annotated XML: queries and provenance. In PODS, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. C. Fritz, R. Hull, and J. Su. Automatic construction of simple artifact-based business processes. In ICDT, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. W. Gaaloul and C. Godart. Mining workflow recovery from event based logs. In Business Process Management, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. T.J. Green, G. Karvounarakis, Z. Ives, and V. Tannen. Update exchange with mappings and provenance. In VLDB, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Todd J. Green, Gregory Karvounarakis, and Val Tannen. Provenance semirings. In Proc. of PODS, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. D. Grigori, F. Casati, M. Castellanos, M.Sayal U .Dayal, and M. Shan. Business process intelligence. Computers in Industry, 53, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. D. Harel. Statecharts: A visual formalism for complex systems. Science of Comp. Programming, 8:231--274, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. J.E. Hopcroft and J.D. Ullman. Introduction To Automata Theory, Languages, And Computation. Addison-Wesley Longman Publishing Co., Inc., 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. J. Huang, T. Chen, A. Doan, and J. F. Naughton. On the provenance of non-answers to queries over extracted data. Proc. VLDB, 1, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. R. Hull and J. Su. Tools for composite web services: a short overview. SIGMOD Rec., 34(2), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Robert Ikeda, Hyunjung Park, and Jennifer Widom. Provenance for generalized map and reduce workflows. In CIDR, 2011.Google ScholarGoogle Scholar
  52. D. Janssens and G. Rozenberg. Graph grammars with node-label controlled rewriting and embedding. In Proc. of COMPUGRAPH, 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Antonın Kucera, Javier Esparza, and Richard Mayr. Model checking probabilistic pushdown automata. Logical Methods in Computer Science, 2(1), 2006.Google ScholarGoogle Scholar
  54. K. Lary and S. J. Young. The estimation of stochastic context-free grammars using the inside-outside algrithm. Computer, Speech and Language, 4:35--56, 1990.Google ScholarGoogle ScholarCross RefCross Ref
  55. Z. Manna and A. Pnueli. The temporal logic of reactive and concurrent systems. Springer-Verlag, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Thierry Massart, Cédric Meuter, and Laurent Van Begin. On the complexity of partial order trace model checking. Inf. Process. Lett., 106(3):120--126, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. S. P. Meyn and R. L. Tweedie. Markov Chains and Stochastic Stability. Springer-Verlag, 1993.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. T. Murata. Petri nets: Properties, analysis and applications. Proceedings of the IEEE, 77(4), 1989.Google ScholarGoogle Scholar
  59. Martin S. Olivier, Reind P. van de Riet, and Ehud Gudes. Specifying application-level security in workflow systems. In DEXA, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. T. Pavlidis. Linear and context-free graph grammars. J. ACM, 19(1), 1972. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. D. M. Sayal, F. Casati, U. Dayal, and M. Shan. Business Process Cockpit. In Proc. of VLDB, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. R. Silva, J. Zhang, and J. G. Shanahan. Probabilistic workflow mining. In Proc. of KDD, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Alkis Simitsis, Panos Vassiliadis, and Timos Sellis. State-space optimization of etl workflows. IEEE Transactions on Knowledge and Data Engineering, 17:1404--1419, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Marc Spielmann. Verification of relational transducers for electronic commerce. Journal of Computer and Systems Sciences (JCSS), 66, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. Abdullah Uz Tansel, James Clifford, Shashi Gadia, Sushil Jajodia, Arie Segev, and Richard Snodgrass, editors. Temporal databases: theory, design, and implementation. Benjamin-Cummings Publishing Co., Inc., 1993.Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. W. M. P. van der Aalst, B. F. van Dongen, J. Herbst, L. Maruster, G. Schimm, and A. J. M. M. Weijters. Workflow mining: a survey of issues and approaches. Data Knowl. Eng., 47(2), 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Stijn Vansummeren and James Cheney. Recording provenance for sql queries and updates. IEEE Data Eng. Bull., 30(4):29--37, 2007.Google ScholarGoogle Scholar
  68. Victor Vianu. Automatic verification of database-driven systems: a new frontier. In ICDT, pages 1--13, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Marko Vrhovnik, Holger Schwarz, Oliver Suhre, Bernhard Mitschang, Volker Markl, Albert Maier, and Tobias Kraft. An approach to optimize data processing in business processes. In VLDB, pages 615--626, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Fan Yang, Nitin Gupta, Nicholas Gerner, Xin Qi, Alan Demers, Johannes Gehrke, and Jayavel Shanmugasundaram. A unified platform for data driven web applications with automatic client-server partitioning. In WWW, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. W. Zhou, M. Sherr, T. Tao, X. Li, B. T. Loo, and Y. Mao. Efficient querying and maintenance of network provenance at internet-scale. In SIGMOD Conference, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A quest for beauty and wealth (or, business processes for database researchers)

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        PODS '11: Proceedings of the thirtieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
        June 2011
        332 pages
        ISBN:9781450306607
        DOI:10.1145/1989284

        Copyright © 2011 ACM

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 13 June 2011

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • keynote

        Acceptance Rates

        Overall Acceptance Rate476of1,835submissions,26%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!