scispace - formally typeset
Search or ask a question
Topic

Workflow

About: Workflow is a research topic. Over the lifetime, 31996 publications have been published within this topic receiving 498339 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: A deep-Q-network model in a multi-agent reinforcement learning setting to guide the scheduling of multi-workflows over infrastructure-as-a-service clouds and experimental results suggest that the proposed approach outperforms traditional ones, e.g., non-dominated sorting genetic algorithm-II, multi-objective particle swarm optimization, and game-theoretic-based greedy algorithms, in terms of optimality of scheduling plans generated.
Abstract: Cloud Computing provides an effective platform for executing large-scale and complex workflow applications with a pay-as-you-go model. Nevertheless, various challenges, especially its optimal scheduling for multiple conflicting objectives, are yet to be addressed properly. The existing multi-objective workflow scheduling approaches are still limited in many ways, e.g., encoding is restricted by prior experts' knowledge when handling a dynamic real-time problem, which strongly influences the performance of scheduling. In this paper, we apply a deep-Q-network model in a multi-agent reinforcement learning setting to guide the scheduling of multi-workflows over infrastructure-as-a-service clouds. To optimize multi-workflow completion time and user's cost, we consider a Markov game model, which takes the number of workflow applications and heterogeneous virtual machines as state input and the maximum completion time and cost as rewards. The game model is capable of seeking for correlated equilibrium between make-span and cost criteria without prior experts' knowledge and converges to the correlated equilibrium policy in a dynamic real-time environment. To validate our proposed approach, we conduct extensive case studies based on multiple well-known scientific workflow templates and Amazon EC2 cloud. The experimental results clearly suggest that our proposed approach outperforms traditional ones, e.g., non-dominated sorting genetic algorithm-II, multi-objective particle swarm optimization, and game-theoretic-based greedy algorithms, in terms of optimality of scheduling plans generated.

203 citations

Journal ArticleDOI
TL;DR: A comprehensive survey and analysis of state of the art workflow scheduling schemes for scheduling simple and scientific workflows in the cloud computing and provides a classification of the proposed schemes based on the type of scheduling algorithm applied in each scheme.

203 citations

Journal ArticleDOI
TL;DR: An approach to identify so-called configurable elements of a workflow modeling language and to add configuration opportunities to workflow models is presented in this paper.
Abstract: Workflow modeling languages allow for the specification of executable business processes. They, however, typically do not provide any guidance for the adaptation of workflow models, i.e. they do not offer any methods or tools explaining and highlighting which adaptations of the models are feasible and which are not. Therefore, an approach to identify so-called configurable elements of a workflow modeling language and to add configuration opportunities to workflow models is presented in this paper. Configurable elements are the elements of a workflow model that can be modified such that the behavior represented by the model is restricted. More precisely, a configurable element can be either set to enabled, to blocked, or to hidden. To ensure that such configurations lead only to desirable models, our approach allows for imposing so-called requirements on the model's configuration. They have to be fulfilled by any configuration, and limit therefore the freedom of configuration choices. The identification of configurable elements within the workflow modeling language of YAWL and the derivation of the new "configurable YAWL" language provide a concrete example for a rather generic approach. A transformation of configured models into lawful YAWL models demonstrates its applicability.

202 citations

Journal ArticleDOI
TL;DR: A proper understanding of CPOE as a collaborative effort and the transformation of the health care activities into integrated care programs requires an understanding of how orders are created and processed, how C POE as part of an integrated system can support the workflow, and how risks affecting patient care can be identified and reduced.

202 citations

Patent
Wayne F. Miller1, Alan Tsu-I Yaung1
28 Jun 2001
TL;DR: In this paper, a plurality of graphical user interfaces (GUI) panels are displayed through which a user may define nodes of a workflow and associate at least one action and user with each node.
Abstract: Provided is a method, system, and program for generating a workflow. A plurality of graphical user interfaces (GUI) panels are displayed through which a user may define nodes of a workflow and associate at least one action and user with each node. During workflow execution of each node, the associated user performs the associated action. Further, multiple nodes define actions that process at least one object that is routed through multiple nodes of the workflow. A workflow model is generated from information entered into the GUI panels including the nodes and workflow defined by the user through the GUI panels that process the at least one object. The workflow model is transformed into a workflow definition language (WDL) file. The WDL file is then transferred to a workflow server, wherein the workflow server interacts with a database to implement the workflow model defined in the WDL file in the database. When executing the implementation of the workflow, a request by one user associated with one node is received to access the node when no other user is accessing the node. The user requesting access to the node is granted access to the node to perform the action associated with the node. The node is locked to prevent other users associated with the node from accessing the node. The lock on the node is released when the user granted access to the node completes the action associated with the node, wherein other users can access the node after the lock is released.

201 citations


Network Information
Related Topics (5)
Software
130.5K papers, 2M citations
89% related
Information system
107.5K papers, 1.8M citations
84% related
The Internet
213.2K papers, 3.8M citations
82% related
Deep learning
79.8K papers, 2.1M citations
82% related
Cluster analysis
146.5K papers, 2.9M citations
81% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
20234,414
20229,010
20211,461
20201,579
20191,702