Stochastic Modelling and Simulation of Dynamic Resource Allocation
In contrast to computer systems, human behaviour is only predictable to a certain degree of probability. In semi-automated business processes human actors are guided by predetermined policies and regulations but retain the freedom to react to unforeseen events. For example, if an urgent prescription has to be dispensed by a pharmacist and the current pharmacist on duty is busy, it is likely that they would interrupt their current activity. The assignment policies in a model of this process should accurately define exception handling procedures in order to realistically simulate business processes. Other policies may require task assignment to the least-qualified person available to do the job if the people involved have different levels of access rights and qualifications.
Unable to display preview. Download preview PDF.
- 1.Agrawal, A., et al.: Web Service Human Task (WS-HumanTask), version 1.0. Tech. rep., Adobe and BEA and Oracle and Active Endpoints and IBM and SAP (June 2007)Google Scholar
- 2.BOC-Group: ADONIS: Community Edition (2010), http://www.adonis-community.com/
- 3.Depke, R., Heckel, R., Küster, J.M.: Formal agent-oriented modeling with UML and graph transformation. In: Sci. Comput. Program, vol. 44, pp. 229–252. Elsevier North-Holland, Inc., Amsterdam (2002)Google Scholar
- 5.Group, L.P.W.: Little-JIL 1.5 Language Report. Tech. rep., Laboratory for Advanced Software Engineering Research, University of Massachusetts, Amherst (1997-2006)Google Scholar
- 6.Heckel, R., Wagner, A.: Ensuring consistency of conditional graph grammars - a constructive approach. In: Proc. of SEGRAGRA 1995 “Graph Rewriting and Computation”. ENTCS, p. 2 (1995)Google Scholar
- 7.Muehlen, M.z.: Workflow-based Process Controlling: Foundation, Design and Application of Workflow-driven Process Information Systems. Logos Verlag, Berlin (2002)Google Scholar
- 8.omg.org: Business process modeling notation (BPMN), version 1.2. Tech. rep., Object Managment Group(OMG) (January 2009)Google Scholar
- 9.Sandhu, R.S.: Role-based access control. In: Adv. in Computers, vol. 46, pp. 237–286. Academic Press, London (1998)Google Scholar