scispace - formally typeset
Search or ask a question
Topic

Workflow

About: Workflow is a research topic. Over the lifetime, 31996 publications have been published within this topic receiving 498339 citations.


Papers
More filters
Patent
21 Aug 2009
TL;DR: In this paper, a workflow management system to process medical image data generated by a medical imaging device has been presented, where a user selects a workflow template with a predefined set of image processing stages, and applies the workflow template to the medical data.
Abstract: Some embodiments of a workflow management system to process medical image data generated by a medical imaging device have been presented. In one embodiment, a user selects a workflow template with a predefined set of image processing stages, and applies the workflow template to the medical image data. Each of the predefined set of image processing stages in the workflow template includes one or more image processing operations. Each of the image processing operations is capable of generating metadata for processing the medical image data. The medical image data is then processed through each of the predefined image processing stages. The result of processing is a collection of metadata. Each metadata in the collection can be applied to the medical image data to generate a medical image view.

93 citations

Proceedings ArticleDOI
28 Jun 2004
TL;DR: A model for constrained workflow systems that includes local and global cardinality constraints, separation ofduty constraints and binding of duty constraints is defined, and the notion of a workflow specification and of a constrained workflow authorization schema are defined.
Abstract: Workflow management systems (WFMSs) have attracteda lot of interest both in academia and the business community.A workflow consists of a collection of tasks that areorganized to facilitate some business process specification.To simplify the complexity of security administration, it iscommon to use role-based access control (RBAC) to grantauthorization to roles and users. Typically, security policiesare expressed as constraints on users, roles, tasks and theworkflow itself. A workflow system can become very complexand involve several organizations or different units ofan organization, thus the number of security policies may bevery large and their interactions very complex. It is clearlyimportant to know whether the existence of such constraintswill prevent certain instances of the workflow from completing.Unfortunately, no existing constraint models have consideredthis problem satisfactorily.In this paper we define a model for constrained workflowsystems that includes local and global cardinality constraints,separation of duty constraints and binding of dutyconstraints. We define the notion of a workflow specificationand of a constrained workflow authorization schema.Our main result is to establish necessary and sufficient conditionsfor the set of constraints that ensure a sound constrainedworkflow authorization schema, that is, for anyuser or any role who are authorized to a task, there is atleast one complete workflow instance when this user or thisrole executes this task.

93 citations

Journal ArticleDOI
TL;DR: This paper developed a BPEL ranking platform that allows to find in a service repository, a set of service candidates satisfying user requirements, and then, to rank these candidates using a behavioral-based similarity measure.
Abstract: Finding useful services is a challenging and important task in several applications. Current approaches for services retrieval are mostly limited to the matching of their inputs/outputs. In this paper, we argue that in several applications (services having multiple and dependent operations and scientific workflows), the service discovery should be based on the specification of service behavior. The idea behind is to develop matching techniques that operate on behavior models and allow delivery of approximate matches and evaluation of semantic distance between these matches and the user requirements. To do so, we reduce the problem of behavioral matching to a graph matching problem and adapt existing algorithms for this purpose. To validate our approach, we developed a BPEL ranking platform that allows to find in a service repository, a set of service candidates satisfying user requirements, and then, to rank these candidates using a behavioral-based similarity measure.

93 citations

Patent
12 Jun 1998
TL;DR: A computer system for managing applied knowledge and workflows in multiple dimensions and contexts which includes an assessor program for screening subjects and collecting, assessing and creating objects to represent the subjects using flexible domain and subdomain descriptors; a system manager for identifying sentinel data; and at least one activity manager for creating and managing activity plans and completions for various types of task performers is described in this article.
Abstract: A computer system for managing applied knowledge and workflows in multiple dimensions and contexts which includes: an assessor program for screening subjects and collecting, assessing and creating objects to represent the subjects using flexible domain and subdomain descriptors; a system manager for identifying sentinel data; and at least one activity manager for creating and managing activity plans and completions for various types of task performers. In a preferred embodiment, the assessor program is able to interactively collect data about a subject and classify the information into a number of domain descriptors. Each object domain descriptor, in turn may have several subdomain descriptors. The system manager uses applied knowledge databases to identify which domain and subdomain descriptors for an object are significant for the overall assessment and system purposes and identifies these as sentinel data. Sentinel data, in turn, are analyzed by the system manager according to the knowledge database(s) to determine what, if any, activities to take to lower risks or maximize resource usage. Activities range from doing nothing, to modifying the object (individual), modifying the object's (individual's) environment or some combination of these. The system manager develops one or more plans which are turned over to one or more activity manager programs. An activity manager assigns activities and tasks to responsible task performers, notifies them of the tasks to be done, verifies completion of the tasks, and possibly initiates re-assessments.

93 citations

Patent
16 Jul 2004
TL;DR: In this paper, a method and system for roaming users to access a host service provider's network utilising a variety of authentication methods in an intuitive and user-friendly manner is disclosed.
Abstract: A method and system is disclosed for roaming users to access a host service provider’s network utilising a variety of authentication methods in an intuitive and user-friendly manner. The interface and workflow greatly enhances ease-of-use by minimising the amount of technical knowledge required by users and providing the ability for support pages to be delivered in user’s native languages. This reduces user confusion and customer support costs.

93 citations


Network Information
Related Topics (5)
Software
130.5K papers, 2M citations
89% related
Information system
107.5K papers, 1.8M citations
84% related
The Internet
213.2K papers, 3.8M citations
82% related
Deep learning
79.8K papers, 2.1M citations
82% related
Cluster analysis
146.5K papers, 2.9M citations
81% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
20234,414
20229,010
20211,461
20201,579
20191,702