Modelling service workflow outcomes by assessing the underlying message flows

Damian Clarke, Iman Saleh, M. Brian Blake

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations


A major tenet of the service-oriented computing paradigm is the just-in-time approach to composing web services. While the majority of related research projects use nonfunctional evaluators to choose the best, cross-organizational composition scheme from many options, few projects leverage the real, domain-specific functional data. In this paper we describe a data-centric modelling approach that leverages the real operational data of any web service workflow. This model is a core aspect for the control of adaptive collaboration software that integrates web services that span distributed enterprises. Using Bayesian inference, we assess the message flow of long-running service workflows, and, in this paper, we introduce an operational model that represents the service workflow behavior. We believe that our operational model can be used for off-line or real-time adaptation of operational service workflows.

Original languageEnglish (US)
Title of host publicationProceedings of the Workshop on Enabling Technologies
Subtitle of host publicationInfrastructure for Collaborative Enterprises, WETICE
EditorsSumitra M. Reddy
PublisherIEEE Computer Society
Number of pages6
ISBN (Electronic)9781479942497
StatePublished - Oct 16 2014
Externally publishedYes
Event23rd IEEE International WETICE Conference, WETICE 2014 - Parma, Italy
Duration: Jun 23 2014Jun 25 2014

Publication series

NameProceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE
ISSN (Print)1524-4547


Other23rd IEEE International WETICE Conference, WETICE 2014


  • enterprise collaboration
  • service oriented computing
  • workflows

ASJC Scopus subject areas

  • Hardware and Architecture
  • Software


Dive into the research topics of 'Modelling service workflow outcomes by assessing the underlying message flows'. Together they form a unique fingerprint.

Cite this