Modeling alternatives in exception executions

Mati Golani*, Avigdor Gal, Eran Toch

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review


To date, the ability of a business process designer to produce a solid, well-validated workflow models is limited, especially since all necessary scenarios that need to be covered by the workflow are hard to predict. Workflow management systems (WfMSs), serving as the main vehicle of business process execution, should recognize those limits, and increase its support to designers in this task. One aspect of such assistance is in exception handlers generation. In this paper we propose a model language enrichment for expressing workflow semantics, in the context of alternative solutions, within the process model. Thus, enabling the designer to state which possible alternatives and their applicability to changing execution paths states. Using this enrichment, an inference algorithm can efficiently find an adequate alternative. The model language is used as a basis for a design tool and an execution environment, which semi-automatically generates exception handlers, resulting, due to a reduced search space, in a smaller set of exceptions for the designer/user to choose from.

Original languageEnglish
Title of host publicationBusiness Process Management Workshops - BPM 2007 International Workshops BPI, BPD, CBP, ProHealth, RefMod, semantics4ws, Revised Selected Papers
Number of pages12
StatePublished - 2008
Externally publishedYes
Event5th International Conference on Business Process Management, BPM 2007 - Brisbane, Australia
Duration: 24 Sep 200724 Sep 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4928 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference5th International Conference on Business Process Management, BPM 2007


Dive into the research topics of 'Modeling alternatives in exception executions'. Together they form a unique fingerprint.

Cite this