SlideShare a Scribd company logo
1 of 60
Download to read offline
University of Stuttgart
Universitätsstr. 38
70569 Stuttgart
Germany
Phone +49-711-685 88477
Fax +49-711-685 88472
Research
Marigianna Skouradaki, Katharina Görlach,
Michael Hahn, Frank Leymann
Institute of Architecture of Application Systems
{firstname.lastname}@iaas.uni-stuttgart.de
Applying Subgraph Isomorphism
to Extract Reoccurring Structures
from BPMN 2.0 Process Models
22
Research
© Marigianna Skouradaki
BPMN 2.0
Process Models
Collection
Fragments
Repository
Workload
Mix
Graph
Matching
Selection
Criteria
Composition
Criteria
80%
20%
Motivation: Generation of Realistic Workload
33
Research
© Marigianna Skouradaki
Agenda
 Process Model Matching
 Basic Concepts
 Algorithm
 Evaluation & Validation
 Conclusions & Outlook
4
Process Matching
55
Research
© Marigianna Skouradaki
BPMN 2.0 Collection Characteristics
 Detect the reoccurring structures on BPMN 2.0 process
models which:
 Might be anonymized (no text information available)
 Might be mock-up models (non-executable)
66
Research
© Marigianna Skouradaki
Text Matching
 Cannot be applied to anonymized models
88
Research
© Marigianna Skouradaki
Matching Executional Information
log
 Comparing produced execution logs
Cannot be applied on mock-up models
log
2
99
Research
© Marigianna Skouradaki
Structural Matching
1010
Research
© Marigianna Skouradaki
The Challenge of Graph Isomorphism
NonDeterministic Polynomial
Time
(NP – Complete)
The time required to solve the
problem using any currently
known algorithm increases very
quickly as the size of the
problem grows.
1111
Research
© Marigianna Skouradaki
Subgraph Isomorphism on BPMN 2.0 Process Models
BPMN 2.0 Process Models are special types of graphs
Subgraph isomorphism can be applied in lower complexity1
1 R. M Verma.; and S. W. Reyner; “An analysis of a good algorithm for the subtree problem, correlated,” SIAM J. Comput., vol. 18, no. 5,
pp. 906–908, Oct. 1989.
12
Basic Concepts
1313
Research
© Marigianna Skouradaki
Exiting Attributes: Nested
1414
Research
© Marigianna Skouradaki
Exiting Attributes: Different Positions
1515
Research
© Marigianna Skouradaki
Exiting Attributes: Partially Similar
1616
Research
© Marigianna Skouradaki
Process Fragment
A Process Fragment is a piece of process model with loose
completeness and consistency. The existence of process
graph elements (start, end, activities, context etc.) is
possible but not imperative in a process fragment.
However, a process fragment must have at least one
activity and there must be a way to convert it to an
executable process graph.2
1. It is not necessarily related with a complete process model
2. A starting point is not defined
3. Existence of split or merge node is optional
2D. Schumm, F. Leymann, Z. Ma, T. Scheibler, and S. Strauch, “Integrating Compliance into Business Processes: Process Fragments as
Reusable Compliance Controls” in MKWI’10, Göttingen, Germany, February 23-25, 2010, Ed., Conference Paper, pp. 2125–2137.
1717
Research
© Marigianna Skouradaki
Checkpoints & Relevant Process Fragments (RPFs)
 Checkpoint (the starting points)
 A pre-configured type of node that is used as start point of
the “extended” process fragments
 Relevant Process Fragment
 Exists in at least K business processes
 Starts with a checkpoint
 Has at least N nodes including the checkpoint
 Contains at least one activity
1818
Research
© Marigianna Skouradaki
Checkpoints & Relevant Process Fragments
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
1919
Research
© Marigianna Skouradaki
Checkpoints & Relevant Process Fragments
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
2020
Research
© Marigianna Skouradaki
Checkpoints & Relevant Process Fragments
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
RPF
RPF
2121
Research
© Marigianna Skouradaki
Checkpoints & Relevant Process Fragments
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
2222
Research
© Marigianna Skouradaki
Checkpoints & Relevant Process Fragments
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
RPF
RPF
2323
Research
© Marigianna Skouradaki
Checkpoints & Relevant Process Fragments
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
2424
Research
© Marigianna Skouradaki
Checkpoints & Relevant Process Fragments
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
RPF
25
Algorithm
2626
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
2727
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
2828
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
2929
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
3030
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
3131
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
3232
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
3333
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
3434
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
3535
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
3636
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
3737
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
3838
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
3939
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
4040
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
4141
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
4242
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
4343
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
4444
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
4545
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
4646
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
4747
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
4848
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
4949
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
5050
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
5151
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
5252
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
5353
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
5454
Research
© Marigianna Skouradaki
Algorithm: Discovery of RPFs
K = 2 Process ModelsCheckpoints: Events, Gateways N = 3 Nodes
…continue likewise..
 Will not work for cycles
55
Evaluation and Validation
5656
Research
© Marigianna Skouradaki
Validation & Evaluation
 46 artificial BPMN 2.0 Process Models
 BPMN 2.0 Standard Example Processes
 Models used in Pietsch and Wenzel, 2012
 2070 Comparisons
Scenario 1:
{events,
gateways}
Scenario 2:
{events,
gateways, tasks}
5757
Research
© Marigianna Skouradaki
Validation: Process Models Used as Input
5858
Research
© Marigianna Skouradaki
Validation: Discovered RPFs
5959
Research
© Marigianna Skouradaki
Comparison Complexity:
Number of totally
compared checkpoint flows
Execution Times vs. Comparison Complexities
6060
Research
© Marigianna Skouradaki
Average Execution Time vs. Average Comparison Complexity
0
5
10
15
20
25
30
35
40
45
0 200 400 600
AverageExecutionTimes(ms)
Average Comparison Complexities
Scenario 1
Scenario 2
O(n log n)
6161
Research
© Marigianna Skouradaki
Conclusions & Outlook
 Set the theoretical framework
 Sub-graph isomorphism on BPMN 2.0 process models
 The algorithm can run in logarithmic complexity (experimental)
 Definition of checkpoints is not important for timing, but for
filtering and clustering
 Theoretical proof of the algorithm’s complexity
 Apply filtering
 Assign frequency values
 Increase expressiveness of Comparison Complexity
Thank you!
Questions?


More Related Content

Viewers also liked

Biologi (ekosistem)
Biologi (ekosistem)Biologi (ekosistem)
Biologi (ekosistem)tikha12
 
Composition Library Instruction
Composition Library InstructionComposition Library Instruction
Composition Library Instructionlmwallis
 
BULETIN SARIPUTRA Vol II No 2 Juni 2012
BULETIN SARIPUTRA Vol II No 2 Juni 2012BULETIN SARIPUTRA Vol II No 2 Juni 2012
BULETIN SARIPUTRA Vol II No 2 Juni 2012Dodi Azhari
 
Te keys for_dawah
Te keys for_dawahTe keys for_dawah
Te keys for_dawahTeacher
 
Codes and convection's of a web page
Codes and convection's of a web pageCodes and convection's of a web page
Codes and convection's of a web pageEllen Whight
 
Houston area landmarks
Houston area landmarksHouston area landmarks
Houston area landmarksCraddocs
 
When There Is no Magic Bullet: an Interlocking Approach of Managing Ebooks
When There Is no Magic Bullet: an Interlocking Approach of Managing EbooksWhen There Is no Magic Bullet: an Interlocking Approach of Managing Ebooks
When There Is no Magic Bullet: an Interlocking Approach of Managing EbooksNASIG
 
Boise is the Best Base Camp in America
Boise is the Best Base Camp in AmericaBoise is the Best Base Camp in America
Boise is the Best Base Camp in AmericaSteve Stuebner
 
Visual Basic ADO
Visual Basic ADOVisual Basic ADO
Visual Basic ADOSpy Seat
 
Pra rancangan pabrik metanol dari biomassa tandan kosong sawit
Pra rancangan pabrik metanol dari biomassa tandan kosong sawitPra rancangan pabrik metanol dari biomassa tandan kosong sawit
Pra rancangan pabrik metanol dari biomassa tandan kosong sawitnirmalaswan
 
Radar #4
Radar #4Radar #4
Radar #4Lintas
 
Creacion de organigramas
Creacion de organigramasCreacion de organigramas
Creacion de organigramasinelca
 

Viewers also liked (20)

20140116
20140116 20140116
20140116
 
Shikha ppt
Shikha pptShikha ppt
Shikha ppt
 
Panda therapy
Panda therapyPanda therapy
Panda therapy
 
Biologi (ekosistem)
Biologi (ekosistem)Biologi (ekosistem)
Biologi (ekosistem)
 
Class Action Lawsuits Explained
Class Action Lawsuits ExplainedClass Action Lawsuits Explained
Class Action Lawsuits Explained
 
Composition Library Instruction
Composition Library InstructionComposition Library Instruction
Composition Library Instruction
 
BULETIN SARIPUTRA Vol II No 2 Juni 2012
BULETIN SARIPUTRA Vol II No 2 Juni 2012BULETIN SARIPUTRA Vol II No 2 Juni 2012
BULETIN SARIPUTRA Vol II No 2 Juni 2012
 
Te keys for_dawah
Te keys for_dawahTe keys for_dawah
Te keys for_dawah
 
Codes and convection's of a web page
Codes and convection's of a web pageCodes and convection's of a web page
Codes and convection's of a web page
 
Houston area landmarks
Houston area landmarksHouston area landmarks
Houston area landmarks
 
When There Is no Magic Bullet: an Interlocking Approach of Managing Ebooks
When There Is no Magic Bullet: an Interlocking Approach of Managing EbooksWhen There Is no Magic Bullet: an Interlocking Approach of Managing Ebooks
When There Is no Magic Bullet: an Interlocking Approach of Managing Ebooks
 
Green it
Green itGreen it
Green it
 
Boise is the Best Base Camp in America
Boise is the Best Base Camp in AmericaBoise is the Best Base Camp in America
Boise is the Best Base Camp in America
 
Visual Basic ADO
Visual Basic ADOVisual Basic ADO
Visual Basic ADO
 
Spring sport coats 2013
Spring sport coats 2013Spring sport coats 2013
Spring sport coats 2013
 
Stunning photos 3
Stunning photos 3Stunning photos 3
Stunning photos 3
 
Daftar isi
Daftar isiDaftar isi
Daftar isi
 
Pra rancangan pabrik metanol dari biomassa tandan kosong sawit
Pra rancangan pabrik metanol dari biomassa tandan kosong sawitPra rancangan pabrik metanol dari biomassa tandan kosong sawit
Pra rancangan pabrik metanol dari biomassa tandan kosong sawit
 
Radar #4
Radar #4Radar #4
Radar #4
 
Creacion de organigramas
Creacion de organigramasCreacion de organigramas
Creacion de organigramas
 

Similar to Sose2015 presentation

Process Mining and Predictive Process Monitoring
Process Mining and Predictive Process MonitoringProcess Mining and Predictive Process Monitoring
Process Mining and Predictive Process MonitoringMarlon Dumas
 
R18B.Tech.CSESyllabus.pdf
R18B.Tech.CSESyllabus.pdfR18B.Tech.CSESyllabus.pdf
R18B.Tech.CSESyllabus.pdfKANDE ARCHANA
 
Personal Research Overview presented at the KU-NAIST Research Meeting
Personal Research Overview presented at the KU-NAIST Research MeetingPersonal Research Overview presented at the KU-NAIST Research Meeting
Personal Research Overview presented at the KU-NAIST Research MeetingChawanat Nakasan
 
Comparison between the Plitt model and an artificial neural network in predic...
Comparison between the Plitt model and an artificial neural network in predic...Comparison between the Plitt model and an artificial neural network in predic...
Comparison between the Plitt model and an artificial neural network in predic...Neil Zietsman
 
Business Process Analytics: From Insights to Predictions
Business Process Analytics: From Insights to PredictionsBusiness Process Analytics: From Insights to Predictions
Business Process Analytics: From Insights to PredictionsMarlon Dumas
 
Insights extraction through knowledge graph of medical booking data
Insights extraction through knowledge graph of medical booking dataInsights extraction through knowledge graph of medical booking data
Insights extraction through knowledge graph of medical booking dataVaticle
 
Lec 09 network scheduling_techniques
Lec 09 network scheduling_techniquesLec 09 network scheduling_techniques
Lec 09 network scheduling_techniquesSAJID ALI RUK
 
Compliance driven process development with DCR graphs
Compliance driven process development with DCR graphsCompliance driven process development with DCR graphs
Compliance driven process development with DCR graphsHugo Andrés López
 
A Model Transformation from the Palladio Component Model to Layered Queueing ...
A Model Transformation from the Palladio Component Model to Layered Queueing ...A Model Transformation from the Palladio Component Model to Layered Queueing ...
A Model Transformation from the Palladio Component Model to Layered Queueing ...Heiko Koziolek
 
Spm ap-network model-
Spm ap-network model-Spm ap-network model-
Spm ap-network model-Kanchana Devi
 
FACS2017-Presentation.pdf
FACS2017-Presentation.pdfFACS2017-Presentation.pdf
FACS2017-Presentation.pdfallberson
 
Porting an MPI application to hybrid MPI+OpenMP with Reveal tool on Shaheen II
Porting an MPI application to hybrid MPI+OpenMP with Reveal tool on Shaheen IIPorting an MPI application to hybrid MPI+OpenMP with Reveal tool on Shaheen II
Porting an MPI application to hybrid MPI+OpenMP with Reveal tool on Shaheen IIGeorge Markomanolis
 
2018,sem7,ala,pm,160993119017,160993119018,160993119019,160993119020,16099311...
2018,sem7,ala,pm,160993119017,160993119018,160993119019,160993119020,16099311...2018,sem7,ala,pm,160993119017,160993119018,160993119019,160993119020,16099311...
2018,sem7,ala,pm,160993119017,160993119018,160993119019,160993119020,16099311...Siddharth Modi
 
Anomaly Detection based on Control-flow Pattern of Parallel Business Processes
Anomaly Detection based on Control-flow Pattern of Parallel Business ProcessesAnomaly Detection based on Control-flow Pattern of Parallel Business Processes
Anomaly Detection based on Control-flow Pattern of Parallel Business ProcessesTELKOMNIKA JOURNAL
 
Operation research-Network analysis (Critical Path Method)
Operation research-Network analysis (Critical Path Method)Operation research-Network analysis (Critical Path Method)
Operation research-Network analysis (Critical Path Method)Kamel Attar
 
(R18) B.Tech. CSE Syllabus.pdf
(R18) B.Tech. CSE Syllabus.pdf(R18) B.Tech. CSE Syllabus.pdf
(R18) B.Tech. CSE Syllabus.pdffisdfg
 

Similar to Sose2015 presentation (20)

Process Mining and Predictive Process Monitoring
Process Mining and Predictive Process MonitoringProcess Mining and Predictive Process Monitoring
Process Mining and Predictive Process Monitoring
 
R18B.Tech.CSESyllabus.pdf
R18B.Tech.CSESyllabus.pdfR18B.Tech.CSESyllabus.pdf
R18B.Tech.CSESyllabus.pdf
 
R18B.Tech.CSESyllabus.pdf
R18B.Tech.CSESyllabus.pdfR18B.Tech.CSESyllabus.pdf
R18B.Tech.CSESyllabus.pdf
 
Personal Research Overview presented at the KU-NAIST Research Meeting
Personal Research Overview presented at the KU-NAIST Research MeetingPersonal Research Overview presented at the KU-NAIST Research Meeting
Personal Research Overview presented at the KU-NAIST Research Meeting
 
Comparison between the Plitt model and an artificial neural network in predic...
Comparison between the Plitt model and an artificial neural network in predic...Comparison between the Plitt model and an artificial neural network in predic...
Comparison between the Plitt model and an artificial neural network in predic...
 
Business Process Analytics: From Insights to Predictions
Business Process Analytics: From Insights to PredictionsBusiness Process Analytics: From Insights to Predictions
Business Process Analytics: From Insights to Predictions
 
Insights extraction through knowledge graph of medical booking data
Insights extraction through knowledge graph of medical booking dataInsights extraction through knowledge graph of medical booking data
Insights extraction through knowledge graph of medical booking data
 
Lec 09 network scheduling_techniques
Lec 09 network scheduling_techniquesLec 09 network scheduling_techniques
Lec 09 network scheduling_techniques
 
Compliance driven process development with DCR graphs
Compliance driven process development with DCR graphsCompliance driven process development with DCR graphs
Compliance driven process development with DCR graphs
 
A Model Transformation from the Palladio Component Model to Layered Queueing ...
A Model Transformation from the Palladio Component Model to Layered Queueing ...A Model Transformation from the Palladio Component Model to Layered Queueing ...
A Model Transformation from the Palladio Component Model to Layered Queueing ...
 
1569973863_IC3
1569973863_IC31569973863_IC3
1569973863_IC3
 
Spm ap-network model-
Spm ap-network model-Spm ap-network model-
Spm ap-network model-
 
FACS2017-Presentation.pdf
FACS2017-Presentation.pdfFACS2017-Presentation.pdf
FACS2017-Presentation.pdf
 
Icsm05.ppt
Icsm05.pptIcsm05.ppt
Icsm05.ppt
 
Porting an MPI application to hybrid MPI+OpenMP with Reveal tool on Shaheen II
Porting an MPI application to hybrid MPI+OpenMP with Reveal tool on Shaheen IIPorting an MPI application to hybrid MPI+OpenMP with Reveal tool on Shaheen II
Porting an MPI application to hybrid MPI+OpenMP with Reveal tool on Shaheen II
 
2018,sem7,ala,pm,160993119017,160993119018,160993119019,160993119020,16099311...
2018,sem7,ala,pm,160993119017,160993119018,160993119019,160993119020,16099311...2018,sem7,ala,pm,160993119017,160993119018,160993119019,160993119020,16099311...
2018,sem7,ala,pm,160993119017,160993119018,160993119019,160993119020,16099311...
 
Cocomo models
Cocomo modelsCocomo models
Cocomo models
 
Anomaly Detection based on Control-flow Pattern of Parallel Business Processes
Anomaly Detection based on Control-flow Pattern of Parallel Business ProcessesAnomaly Detection based on Control-flow Pattern of Parallel Business Processes
Anomaly Detection based on Control-flow Pattern of Parallel Business Processes
 
Operation research-Network analysis (Critical Path Method)
Operation research-Network analysis (Critical Path Method)Operation research-Network analysis (Critical Path Method)
Operation research-Network analysis (Critical Path Method)
 
(R18) B.Tech. CSE Syllabus.pdf
(R18) B.Tech. CSE Syllabus.pdf(R18) B.Tech. CSE Syllabus.pdf
(R18) B.Tech. CSE Syllabus.pdf
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

Sose2015 presentation