SlideShare a Scribd company logo
Roberto Perez-Rodriguez
Manuel Caeiro-Rodriguez
Luis Anido-Rifon
University of Vigo, Spain
Introduction
 The most common approach to provide online
education is based in courses as fundamental units to
deliver contents and provide communication facilities.
 Some Educational Modelling Languages (EMLs) such
as IMS-LD and PoEML provide a means to design and
run scripted courses
 Learning sequences or rich structures in which
participants are engaged
Introduction (ii)
 The life-cycle of an EML-based course is:
 Authoring-time
 Instantiation-time
 Run-time
 The problem with the above subdivision is that these
stages are overlapped in real-world practice
 During run-time a course may suffer deviations from the
designed behaviour during design-time, in order to
adapt itself to a new situation
Introduction (iii)
 In this paper:
 We make a review of the state-of-the-art of exception
management in scripted collaborative courses in terms
of process metamodel and execution metamodel.
 We propose an execution semantics to support run-time
changes in course instances, enabling thus the
resolution of unexpected exceptions.
Related Work
 IMS Learning Design
 This issue has not been seriously addressed.
 Coppercore provides neither mechanism for dynamic
modification of learning design nor support for the resolution
of abnormal situation.
 Workflow-based collaborative learning
 Approaches based on using a generic-purpose workflow
engine to enact collaborative courses rely on the capabilities
of the workflow engine of choice.
 Previous work from the authors use jBPM to enact learning
processes. Regrettably, jBPM does not provide mechanisms to
change process definitions at run-time.
Background: Analysis of Exceptions
in Scripted Collaborative Courses
 Exceptions are deviations from normal execution arising during a process.
 Classification of exceptions:
 Basic failures
 They are triggered by the underlying system
 Failure of the DBMS, failure of the operating system, network failure
 Application failures
 They are triggered by the groupware tools that are used at a task level
 An internal error in the groupware tool
 Expected exceptions
 They are triggered by the execution engine. This kind of exceptions may occur
frequently, therefore they need to be modelled and automated.
 A task has reached its deadline, a participant leaves a course in which he/she was
enrolled into, etc.
 Unexpected exceptions
 They are triggered by a human user when he/she detects that that the semantics of the
process definition does not fulfil the requirements.
 The course is over-dimensioned and the teacher wants to skip some tasks, the teacher
wants to correct the process schema, etc.
Background (ii)
 The exception life-cycle:
 Signalling: a software component or a human actor
detect the exception and signal it.
 Propagating: the exception signal propagates through a
typical layered architecture.
 Handling/resoluting: finally, the exception is handled by
a software component or an authorized user. Three types
of resolution are identified:
 Manual resolution
 Automatic resolution
 Mixed resolution
Our approach: Process Language
 We present a process language that is a subset of PoEML
(Perspective-oriented EML), and an execution semantics that
allows for run-time changes on the control flow.
 Process language:
 The process language provides the definition and format of data
involved in learning processes.
 The process language takes into account the expected exceptions.
 The most relevant elements in our process language are:
 Data element: it is a generic container for process variables. A data
element may store information such as a student’s grade, the age of a
student, etc.
 Data expression: it is a logic expression with a boolean output that takes
data elements (process variables) as inputs.
 Goal: it represents a functional objective. Its state can be directly
inferred from the value of certain data expressions.
 Scenario: it provides a context for the rest of elements.
Our approach: Execution Semantics
 A dynamic model is composed of the following parts
 Definition part: the process language
 Situation part: it captures information specific to a
particular situation
 Execution part: it defines the transition from one
situation to another one
 Change part: it defines how a process instance goes from
one state to another one due to a run-time change on the
process definition
Managing Process Instances in
Exception Resolution
 We describe two methods for dealing with unexpected
exceptions: ad-hoc changes, and dynamic changes.
 Ad-hoc changes:
 In certain cases, a unexpected exception can only be resolved by
modifying the process instance that triggered that exception
 Dynamic changes:
 They are changes in the process schema
 There are two usage scenarios:
 Create a new version of process schema: all process instances further
created will constraint to the new version of the model
 Update all process instances: for example, and exception caused by a
groupware tool no longer available will cause the failure of all process
instances that make use of that tool. In consequence, the exception
resolution entails to update all process instances
Conclusions
 Exceptions are not being adequately handled on
current approaches to scripted collaborative courses
 The main contribution of our approach to execution
semantics is to get rid of the dynamic change bug.
 In our approach, a process instance is characterized just
by its process variables, and it has no explicit state,
being possible to recalculate it after a run-time change.
Thank you for your attention!

More Related Content

What's hot

COM1407: Structured Program Development
COM1407: Structured Program Development COM1407: Structured Program Development
COM1407: Structured Program Development
Hemantha Kulathilake
 
CS8592 Object Oriented Analysis & Design - UNIT V
CS8592 Object Oriented Analysis & Design - UNIT V CS8592 Object Oriented Analysis & Design - UNIT V
CS8592 Object Oriented Analysis & Design - UNIT V
pkaviya
 
Introduction to problem solving in C
Introduction to problem solving in CIntroduction to problem solving in C
Introduction to problem solving in C
Diwakar Pratap Singh 'Deva'
 
Software Development
Software DevelopmentSoftware Development
Software Development
Nicole Ynne Estabillo
 
SE2_Lec 18_ Coding
SE2_Lec 18_ CodingSE2_Lec 18_ Coding
SE2_Lec 18_ Coding
Amr E. Mohamed
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
Aiman Hud
 
Software develop....
Software develop.... Software develop....
Software develop....
GCWUS
 
What is algorithm
What is algorithmWhat is algorithm
What is algorithm
mshoaib15
 
Program design and problem solving techniques
Program design and problem solving techniquesProgram design and problem solving techniques
Program design and problem solving techniques
Dokka Srinivasu
 
Summarization Techniques for Code, Changes, and Testing
Summarization Techniques for Code, Changes, and TestingSummarization Techniques for Code, Changes, and Testing
Summarization Techniques for Code, Changes, and Testing
Sebastiano Panichella
 
DISE - Programming Concepts
DISE - Programming ConceptsDISE - Programming Concepts
DISE - Programming Concepts
Rasan Samarasinghe
 
[IJCT-V3I2P28] Authors: KulbirKaur, AnureetKaur
[IJCT-V3I2P28] Authors: KulbirKaur, AnureetKaur[IJCT-V3I2P28] Authors: KulbirKaur, AnureetKaur
[IJCT-V3I2P28] Authors: KulbirKaur, AnureetKaur
IJET - International Journal of Engineering and Techniques
 
Software maintenance
Software maintenanceSoftware maintenance
Software maintenance
Ansh Kapoor
 
Principles of Compiler Design
Principles of Compiler DesignPrinciples of Compiler Design
Principles of Compiler Design
Marimuthu M
 
Steps for Developing a 'C' program
 Steps for Developing a 'C' program Steps for Developing a 'C' program
Steps for Developing a 'C' programSahithi Naraparaju
 
Software archiecture lecture06
Software archiecture   lecture06Software archiecture   lecture06
Software archiecture lecture06Luktalja
 

What's hot (19)

COM1407: Structured Program Development
COM1407: Structured Program Development COM1407: Structured Program Development
COM1407: Structured Program Development
 
CS8592 Object Oriented Analysis & Design - UNIT V
CS8592 Object Oriented Analysis & Design - UNIT V CS8592 Object Oriented Analysis & Design - UNIT V
CS8592 Object Oriented Analysis & Design - UNIT V
 
Introduction to problem solving in C
Introduction to problem solving in CIntroduction to problem solving in C
Introduction to problem solving in C
 
Software Development
Software DevelopmentSoftware Development
Software Development
 
Ch10
Ch10Ch10
Ch10
 
SE2_Lec 18_ Coding
SE2_Lec 18_ CodingSE2_Lec 18_ Coding
SE2_Lec 18_ Coding
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Software develop....
Software develop.... Software develop....
Software develop....
 
What is algorithm
What is algorithmWhat is algorithm
What is algorithm
 
Program design and problem solving techniques
Program design and problem solving techniquesProgram design and problem solving techniques
Program design and problem solving techniques
 
Summarization Techniques for Code, Changes, and Testing
Summarization Techniques for Code, Changes, and TestingSummarization Techniques for Code, Changes, and Testing
Summarization Techniques for Code, Changes, and Testing
 
DISE - Programming Concepts
DISE - Programming ConceptsDISE - Programming Concepts
DISE - Programming Concepts
 
[IJCT-V3I2P28] Authors: KulbirKaur, AnureetKaur
[IJCT-V3I2P28] Authors: KulbirKaur, AnureetKaur[IJCT-V3I2P28] Authors: KulbirKaur, AnureetKaur
[IJCT-V3I2P28] Authors: KulbirKaur, AnureetKaur
 
Softwareproject planning
Softwareproject planningSoftwareproject planning
Softwareproject planning
 
Software maintenance
Software maintenanceSoftware maintenance
Software maintenance
 
Principles of Compiler Design
Principles of Compiler DesignPrinciples of Compiler Design
Principles of Compiler Design
 
Webcat
WebcatWebcat
Webcat
 
Steps for Developing a 'C' program
 Steps for Developing a 'C' program Steps for Developing a 'C' program
Steps for Developing a 'C' program
 
Software archiecture lecture06
Software archiecture   lecture06Software archiecture   lecture06
Software archiecture lecture06
 

Viewers also liked

Virtual Reality Smackdown
Virtual Reality SmackdownVirtual Reality Smackdown
Virtual Reality Smackdown
Ronnie Isherwood
 
Gaming: How much is too much?
Gaming: How much is too much?Gaming: How much is too much?
Gaming: How much is too much?
Ronnie Isherwood
 
EDUCON 2010: Adaptation in a PoEML-based E-learning Platform
EDUCON 2010: Adaptation in a PoEML-based E-learning PlatformEDUCON 2010: Adaptation in a PoEML-based E-learning Platform
EDUCON 2010: Adaptation in a PoEML-based E-learning Platform
Roberto Perez-Rodriguez
 
FIE2010: Orchestrating Groupware in Engineering Education
FIE2010: Orchestrating Groupware in Engineering EducationFIE2010: Orchestrating Groupware in Engineering Education
FIE2010: Orchestrating Groupware in Engineering Education
Roberto Perez-Rodriguez
 
Branching by abstraction
Branching by abstractionBranching by abstraction
Branching by abstraction
Roberto Perez-Rodriguez
 
Service Delivery & Automation Configure & Deploy
Service Delivery & Automation Configure & DeployService Delivery & Automation Configure & Deploy
Service Delivery & Automation Configure & Deploy
Ronnie Isherwood
 
Jersey Digital Momentum
Jersey Digital MomentumJersey Digital Momentum
Jersey Digital Momentum
Ronnie Isherwood
 
Private Cloud Benefits
Private Cloud BenefitsPrivate Cloud Benefits
Private Cloud Benefits
Ronnie Isherwood
 
Jersey Windows User Group
Jersey Windows User GroupJersey Windows User Group
Jersey Windows User Group
Ronnie Isherwood
 
Windows Parental controls
Windows Parental controlsWindows Parental controls
Windows Parental controls
Ronnie Isherwood
 
Integrating and Monitoring System Center Virtual Machine Manager with Operati...
Integrating and Monitoring System Center Virtual Machine Manager with Operati...Integrating and Monitoring System Center Virtual Machine Manager with Operati...
Integrating and Monitoring System Center Virtual Machine Manager with Operati...
Ronnie Isherwood
 
Introduction to System Center Advisor and Virtual Machine Manager 2012
Introduction to System Center Advisor and Virtual Machine Manager 2012Introduction to System Center Advisor and Virtual Machine Manager 2012
Introduction to System Center Advisor and Virtual Machine Manager 2012
Ronnie Isherwood
 
Building solutions with microsoft virtualisation
Building solutions with microsoft virtualisationBuilding solutions with microsoft virtualisation
Building solutions with microsoft virtualisation
Ronnie Isherwood
 
Microsoft RDS, VDI, RemoteFX and what Service Pack 1 will bring us
Microsoft RDS, VDI, RemoteFX and what Service Pack 1 will bring usMicrosoft RDS, VDI, RemoteFX and what Service Pack 1 will bring us
Microsoft RDS, VDI, RemoteFX and what Service Pack 1 will bring us
Ronnie Isherwood
 
Protecting Microsoft Virtualization with DPM 2012 R2
Protecting Microsoft Virtualization with DPM 2012 R2Protecting Microsoft Virtualization with DPM 2012 R2
Protecting Microsoft Virtualization with DPM 2012 R2
Ronnie Isherwood
 
Managing hypervisors with System Center Virtual Machine Manager 2012
Managing hypervisors with System Center Virtual Machine Manager 2012Managing hypervisors with System Center Virtual Machine Manager 2012
Managing hypervisors with System Center Virtual Machine Manager 2012
Ronnie Isherwood
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor Authentication
Ronnie Isherwood
 
Microsoft Remote Desktop Services
Microsoft Remote Desktop ServicesMicrosoft Remote Desktop Services
Microsoft Remote Desktop Services
Ronnie Isherwood
 

Viewers also liked (18)

Virtual Reality Smackdown
Virtual Reality SmackdownVirtual Reality Smackdown
Virtual Reality Smackdown
 
Gaming: How much is too much?
Gaming: How much is too much?Gaming: How much is too much?
Gaming: How much is too much?
 
EDUCON 2010: Adaptation in a PoEML-based E-learning Platform
EDUCON 2010: Adaptation in a PoEML-based E-learning PlatformEDUCON 2010: Adaptation in a PoEML-based E-learning Platform
EDUCON 2010: Adaptation in a PoEML-based E-learning Platform
 
FIE2010: Orchestrating Groupware in Engineering Education
FIE2010: Orchestrating Groupware in Engineering EducationFIE2010: Orchestrating Groupware in Engineering Education
FIE2010: Orchestrating Groupware in Engineering Education
 
Branching by abstraction
Branching by abstractionBranching by abstraction
Branching by abstraction
 
Service Delivery & Automation Configure & Deploy
Service Delivery & Automation Configure & DeployService Delivery & Automation Configure & Deploy
Service Delivery & Automation Configure & Deploy
 
Jersey Digital Momentum
Jersey Digital MomentumJersey Digital Momentum
Jersey Digital Momentum
 
Private Cloud Benefits
Private Cloud BenefitsPrivate Cloud Benefits
Private Cloud Benefits
 
Jersey Windows User Group
Jersey Windows User GroupJersey Windows User Group
Jersey Windows User Group
 
Windows Parental controls
Windows Parental controlsWindows Parental controls
Windows Parental controls
 
Integrating and Monitoring System Center Virtual Machine Manager with Operati...
Integrating and Monitoring System Center Virtual Machine Manager with Operati...Integrating and Monitoring System Center Virtual Machine Manager with Operati...
Integrating and Monitoring System Center Virtual Machine Manager with Operati...
 
Introduction to System Center Advisor and Virtual Machine Manager 2012
Introduction to System Center Advisor and Virtual Machine Manager 2012Introduction to System Center Advisor and Virtual Machine Manager 2012
Introduction to System Center Advisor and Virtual Machine Manager 2012
 
Building solutions with microsoft virtualisation
Building solutions with microsoft virtualisationBuilding solutions with microsoft virtualisation
Building solutions with microsoft virtualisation
 
Microsoft RDS, VDI, RemoteFX and what Service Pack 1 will bring us
Microsoft RDS, VDI, RemoteFX and what Service Pack 1 will bring usMicrosoft RDS, VDI, RemoteFX and what Service Pack 1 will bring us
Microsoft RDS, VDI, RemoteFX and what Service Pack 1 will bring us
 
Protecting Microsoft Virtualization with DPM 2012 R2
Protecting Microsoft Virtualization with DPM 2012 R2Protecting Microsoft Virtualization with DPM 2012 R2
Protecting Microsoft Virtualization with DPM 2012 R2
 
Managing hypervisors with System Center Virtual Machine Manager 2012
Managing hypervisors with System Center Virtual Machine Manager 2012Managing hypervisors with System Center Virtual Machine Manager 2012
Managing hypervisors with System Center Virtual Machine Manager 2012
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor Authentication
 
Microsoft Remote Desktop Services
Microsoft Remote Desktop ServicesMicrosoft Remote Desktop Services
Microsoft Remote Desktop Services
 

Similar to ICALT 2010: Supporting Exception Handling in Scripted Collaborative Courses

Problem Solving Techniques
Problem Solving TechniquesProblem Solving Techniques
Problem Solving TechniquesAshesh R
 
Software development effort reduction with Co-op
Software development effort reduction with Co-opSoftware development effort reduction with Co-op
Software development effort reduction with Co-op
lbergmans
 
15 object orienteddesign
15 object orienteddesign15 object orienteddesign
15 object orienteddesignrandhirlpu
 
Software Engineering with Objects (M363) Final Revision By Kuwait10
Software Engineering with Objects (M363) Final Revision By Kuwait10Software Engineering with Objects (M363) Final Revision By Kuwait10
Software Engineering with Objects (M363) Final Revision By Kuwait10
Kuwait10
 
Overview of SDLC - Waterfall, Agile, and more
Overview of SDLC - Waterfall, Agile, and moreOverview of SDLC - Waterfall, Agile, and more
Overview of SDLC - Waterfall, Agile, and more
Steve Gladstone
 
Unit-1_Notes(OOAD).pdf
Unit-1_Notes(OOAD).pdfUnit-1_Notes(OOAD).pdf
Unit-1_Notes(OOAD).pdf
ganeshkarthy
 
agile methods.docx
agile methods.docxagile methods.docx
agile methods.docx
TanishaKochak
 
SMD Unit i
SMD Unit iSMD Unit i
SMD Unit i
madhavi patil
 
Software development life cycle
Software development life cycleSoftware development life cycle
Software development life cycle
Nishant Srivastava
 
Debs 2011 tutorial on non functional properties of event processing
Debs 2011 tutorial  on non functional properties of event processingDebs 2011 tutorial  on non functional properties of event processing
Debs 2011 tutorial on non functional properties of event processing
Opher Etzion
 
THE UNIFIED APPROACH FOR ORGANIZATIONAL NETWORK VULNERABILITY ASSESSMENT
THE UNIFIED APPROACH FOR ORGANIZATIONAL NETWORK VULNERABILITY ASSESSMENTTHE UNIFIED APPROACH FOR ORGANIZATIONAL NETWORK VULNERABILITY ASSESSMENT
THE UNIFIED APPROACH FOR ORGANIZATIONAL NETWORK VULNERABILITY ASSESSMENT
ijseajournal
 
01lifecycles
01lifecycles01lifecycles
01lifecycles
Abdihakim Dalmar
 
SDLC and Software Process Models
SDLC and Software Process ModelsSDLC and Software Process Models
SDLC and Software Process Models
Nana Sarpong
 
Slcm sharbani bhattacharya
Slcm sharbani bhattacharyaSlcm sharbani bhattacharya
Slcm sharbani bhattacharya
Sharbani Bhattacharya
 
Object Oriented Analysis
Object Oriented AnalysisObject Oriented Analysis
Object Oriented Analysis
AMITJain879
 
ALM (Application Lifecycle Management)
ALM (Application Lifecycle Management)ALM (Application Lifecycle Management)
ALM (Application Lifecycle Management)
Terry Cho
 
An overview of software development methodologies.
An overview of software development methodologies.An overview of software development methodologies.
An overview of software development methodologies.
Masoud Kalali
 
Software development slides
Software development slidesSoftware development slides
Software development slidesiarthur
 
Different Proposed Models to Mapping MDA to RUP
Different Proposed Models to Mapping MDA to RUPDifferent Proposed Models to Mapping MDA to RUP
Different Proposed Models to Mapping MDA to RUP
International Journal of Engineering Inventions www.ijeijournal.com
 
Software process life cycles
Software process life cyclesSoftware process life cycles
Software process life cycles
sathish sak
 

Similar to ICALT 2010: Supporting Exception Handling in Scripted Collaborative Courses (20)

Problem Solving Techniques
Problem Solving TechniquesProblem Solving Techniques
Problem Solving Techniques
 
Software development effort reduction with Co-op
Software development effort reduction with Co-opSoftware development effort reduction with Co-op
Software development effort reduction with Co-op
 
15 object orienteddesign
15 object orienteddesign15 object orienteddesign
15 object orienteddesign
 
Software Engineering with Objects (M363) Final Revision By Kuwait10
Software Engineering with Objects (M363) Final Revision By Kuwait10Software Engineering with Objects (M363) Final Revision By Kuwait10
Software Engineering with Objects (M363) Final Revision By Kuwait10
 
Overview of SDLC - Waterfall, Agile, and more
Overview of SDLC - Waterfall, Agile, and moreOverview of SDLC - Waterfall, Agile, and more
Overview of SDLC - Waterfall, Agile, and more
 
Unit-1_Notes(OOAD).pdf
Unit-1_Notes(OOAD).pdfUnit-1_Notes(OOAD).pdf
Unit-1_Notes(OOAD).pdf
 
agile methods.docx
agile methods.docxagile methods.docx
agile methods.docx
 
SMD Unit i
SMD Unit iSMD Unit i
SMD Unit i
 
Software development life cycle
Software development life cycleSoftware development life cycle
Software development life cycle
 
Debs 2011 tutorial on non functional properties of event processing
Debs 2011 tutorial  on non functional properties of event processingDebs 2011 tutorial  on non functional properties of event processing
Debs 2011 tutorial on non functional properties of event processing
 
THE UNIFIED APPROACH FOR ORGANIZATIONAL NETWORK VULNERABILITY ASSESSMENT
THE UNIFIED APPROACH FOR ORGANIZATIONAL NETWORK VULNERABILITY ASSESSMENTTHE UNIFIED APPROACH FOR ORGANIZATIONAL NETWORK VULNERABILITY ASSESSMENT
THE UNIFIED APPROACH FOR ORGANIZATIONAL NETWORK VULNERABILITY ASSESSMENT
 
01lifecycles
01lifecycles01lifecycles
01lifecycles
 
SDLC and Software Process Models
SDLC and Software Process ModelsSDLC and Software Process Models
SDLC and Software Process Models
 
Slcm sharbani bhattacharya
Slcm sharbani bhattacharyaSlcm sharbani bhattacharya
Slcm sharbani bhattacharya
 
Object Oriented Analysis
Object Oriented AnalysisObject Oriented Analysis
Object Oriented Analysis
 
ALM (Application Lifecycle Management)
ALM (Application Lifecycle Management)ALM (Application Lifecycle Management)
ALM (Application Lifecycle Management)
 
An overview of software development methodologies.
An overview of software development methodologies.An overview of software development methodologies.
An overview of software development methodologies.
 
Software development slides
Software development slidesSoftware development slides
Software development slides
 
Different Proposed Models to Mapping MDA to RUP
Different Proposed Models to Mapping MDA to RUPDifferent Proposed Models to Mapping MDA to RUP
Different Proposed Models to Mapping MDA to RUP
 
Software process life cycles
Software process life cyclesSoftware process life cycles
Software process life cycles
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

ICALT 2010: Supporting Exception Handling in Scripted Collaborative Courses

  • 1. Roberto Perez-Rodriguez Manuel Caeiro-Rodriguez Luis Anido-Rifon University of Vigo, Spain
  • 2. Introduction  The most common approach to provide online education is based in courses as fundamental units to deliver contents and provide communication facilities.  Some Educational Modelling Languages (EMLs) such as IMS-LD and PoEML provide a means to design and run scripted courses  Learning sequences or rich structures in which participants are engaged
  • 3. Introduction (ii)  The life-cycle of an EML-based course is:  Authoring-time  Instantiation-time  Run-time  The problem with the above subdivision is that these stages are overlapped in real-world practice  During run-time a course may suffer deviations from the designed behaviour during design-time, in order to adapt itself to a new situation
  • 4. Introduction (iii)  In this paper:  We make a review of the state-of-the-art of exception management in scripted collaborative courses in terms of process metamodel and execution metamodel.  We propose an execution semantics to support run-time changes in course instances, enabling thus the resolution of unexpected exceptions.
  • 5. Related Work  IMS Learning Design  This issue has not been seriously addressed.  Coppercore provides neither mechanism for dynamic modification of learning design nor support for the resolution of abnormal situation.  Workflow-based collaborative learning  Approaches based on using a generic-purpose workflow engine to enact collaborative courses rely on the capabilities of the workflow engine of choice.  Previous work from the authors use jBPM to enact learning processes. Regrettably, jBPM does not provide mechanisms to change process definitions at run-time.
  • 6. Background: Analysis of Exceptions in Scripted Collaborative Courses  Exceptions are deviations from normal execution arising during a process.  Classification of exceptions:  Basic failures  They are triggered by the underlying system  Failure of the DBMS, failure of the operating system, network failure  Application failures  They are triggered by the groupware tools that are used at a task level  An internal error in the groupware tool  Expected exceptions  They are triggered by the execution engine. This kind of exceptions may occur frequently, therefore they need to be modelled and automated.  A task has reached its deadline, a participant leaves a course in which he/she was enrolled into, etc.  Unexpected exceptions  They are triggered by a human user when he/she detects that that the semantics of the process definition does not fulfil the requirements.  The course is over-dimensioned and the teacher wants to skip some tasks, the teacher wants to correct the process schema, etc.
  • 7. Background (ii)  The exception life-cycle:  Signalling: a software component or a human actor detect the exception and signal it.  Propagating: the exception signal propagates through a typical layered architecture.  Handling/resoluting: finally, the exception is handled by a software component or an authorized user. Three types of resolution are identified:  Manual resolution  Automatic resolution  Mixed resolution
  • 8. Our approach: Process Language  We present a process language that is a subset of PoEML (Perspective-oriented EML), and an execution semantics that allows for run-time changes on the control flow.  Process language:  The process language provides the definition and format of data involved in learning processes.  The process language takes into account the expected exceptions.  The most relevant elements in our process language are:  Data element: it is a generic container for process variables. A data element may store information such as a student’s grade, the age of a student, etc.  Data expression: it is a logic expression with a boolean output that takes data elements (process variables) as inputs.  Goal: it represents a functional objective. Its state can be directly inferred from the value of certain data expressions.  Scenario: it provides a context for the rest of elements.
  • 9. Our approach: Execution Semantics  A dynamic model is composed of the following parts  Definition part: the process language  Situation part: it captures information specific to a particular situation  Execution part: it defines the transition from one situation to another one  Change part: it defines how a process instance goes from one state to another one due to a run-time change on the process definition
  • 10.
  • 11. Managing Process Instances in Exception Resolution  We describe two methods for dealing with unexpected exceptions: ad-hoc changes, and dynamic changes.  Ad-hoc changes:  In certain cases, a unexpected exception can only be resolved by modifying the process instance that triggered that exception  Dynamic changes:  They are changes in the process schema  There are two usage scenarios:  Create a new version of process schema: all process instances further created will constraint to the new version of the model  Update all process instances: for example, and exception caused by a groupware tool no longer available will cause the failure of all process instances that make use of that tool. In consequence, the exception resolution entails to update all process instances
  • 12. Conclusions  Exceptions are not being adequately handled on current approaches to scripted collaborative courses  The main contribution of our approach to execution semantics is to get rid of the dynamic change bug.  In our approach, a process instance is characterized just by its process variables, and it has no explicit state, being possible to recalculate it after a run-time change.
  • 13. Thank you for your attention!