Resources tend to follow certain availability patterns, due to the maintenance cycles, work shifts, etc. Such availability patterns heavily influence the efficiency and effectiveness of enterprise resource management. Most existing process scheduling and resource management approaches focus on process structure and resource utilisation, yet neglect the resource availability constraints. In this paper, we investigate how to plan the business process instances scheduling in accordance with resource availability patterns, so that enterprise resources can be rationally and sufficiently used. Three planning strategies are proposed to maximise the process instance throughput using different criteria. Experiments are conducted to evaluate the performance of these strategies in different settings with analysis on strategy characteristics.
Since any organizational environment is typically resource constrained, especially in terms of human capital, organization managers would like to maximize the utilization of available human resources. However, tasks cannot simply be assigned to arbitrary employees since the employee needs to have the necessary capabilities for executing a task. Furthermore, security policies constrain the assignment of tasks to employees, especially given the other tasks assigned to the same employee. Since role based access control (RBAC) is the most commonly used access control model for commercial information systems, we limit our attention to consider constraints in RBAC. In this paper, we define the Employee Assignment Problem (EAP) which aims to identify an employee to role assignment such that it permits the maximal flexibility in assigning tasks to employees, while ensuring that the required security constraints are met. We prove that finding an optimal solution is NP-complete and therefore provide a greedy solution. Experimental evaluation of the proposed approach shows that it is both efficient as well as effective.
Requirements elicitation consists in collecting and documenting information about the requirements from a system-to-be, and about the environment of that system. Elicitation forms a critical step in the design of any information system, subject to many challenges like information incompleteness, variability or ambiguity. To deal with these challenges, requirements engineers heavily rely on stakeholders, who turn out to be one of the most significant provider of information during elicitation. Sometimes, this comes at the cost of lesser attention being paid by engineers to other sources of information accessible in a business. In this paper, we try to deal with this issue by studying the different sources of information that can be used by engineers when designing a system. We propose TELIS, a taxonomy of Elicitation Information Sources, which can be used during elicitation to review more systematically the sources of information about a system-to-be. TELIS was produced through a series of empirical studies, and was partially validated through a real-world case study. Our objective in this paper is to increase the awareness of engineers about the other information providers within a business. Ultimately, we believe our taxonomy may help in better dealing with classical elicitation challenges, and increase the chances of successful information systems design.