Discovering Automatable Routines from User Interaction Logs

被引:25
作者
Bosco, Antonio [1 ,2 ]
Augusto, Adriano [1 ,3 ]
Dumas, Marlon [3 ]
La Rosa, Marcello [1 ]
Fortino, Giancarlo [2 ]
机构
[1] Univ Melbourne, Melbourne, Vic, Australia
[2] Univ Calabria, Arcavacata Di Rende, Italy
[3] Univ Tartu, Tartu, Estonia
来源
BUSINESS PROCESS MANAGEMENT FORUM, BPM FORUM 2019 | 2019年 / 360卷
基金
澳大利亚研究理事会; 欧洲研究理事会;
关键词
D O I
10.1007/978-3-030-26643-1_9
中图分类号
F [经济];
学科分类号
02 ;
摘要
The complexity and rigidity of legacy applications in large organizations engender situations where workers need to perform repetitive routines to transfer data from one application to another via their user interfaces, e.g. moving data from a spreadsheet to a Web application or vice-versa. Discovering and automating such routines can help to eliminate tedious work, reduce cycle times, and improve data quality. Advances in Robotic Process Automation (RPA) technology make it possible to automate such routines, but not to discover them in the first place. This paper presents a method to analyse user interactions in order to discover routines that are fully deterministic and thus amenable to automation. The proposed method identifies sequences of actions that are always triggered when a given activation condition holds and such that the parameters of each action can be deterministically derived from data produced by previous actions. To this end, the method combines a technique for compressing a set of sequences into an acyclic automaton, with techniques for rule mining and for discovering data transformations. An initial evaluation shows that the method can discover automatable routines from user interaction logs with acceptable execution times, particularly when there are one-to-one correspondences between parameters of an action and those of previous actions, which is the case of copypasting routines.
引用
收藏
页码:144 / 162
页数:19
相关论文
共 16 条
[1]  
AGRAWAL R, 1995, PROC INT CONF DATA, P3, DOI 10.1109/ICDE.1995.380415
[2]   Automated Discovery of Process Models from Event Logs: Review and Benchmark [J].
Augusto, Adriano ;
Conforti, Raffaele ;
Dumas, Marlon ;
La Rosa, Marcello ;
Maggi, Fabrizio Maria ;
Marrella, Andrea ;
Mecella, Massimo ;
Soo, Allar .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2019, 31 (04) :686-705
[3]  
Cohen W. W., 1995, Machine Learning. Proceedings of the Twelfth International Conference on Machine Learning, P115
[4]  
de Leoni M, 2013, LECT NOTES COMPUT SC, V7793, P114, DOI 10.1007/978-3-642-37057-1_9
[5]   Identifying Frequent User Tasks from Application Logs [J].
Dev, Himel ;
Liu, Zhicheng .
IUI'17: PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON INTELLIGENT USER INTERFACES, 2017, :263-273
[6]  
Dragunov A.N., 2005, IUI
[7]   Process Discovery from Low-Level Event Logs [J].
Fazzinga, Bettina ;
Flesca, Sergio ;
Furfaro, Filippo ;
Pontieri, Luigi .
ADVANCED INFORMATION SYSTEMS ENGINEERING, CAISE 2018, 2018, 10816 :257-273
[8]   Coloured Petri Nets and CPN Tools for modelling and validation of concurrent systems [J].
Jensen K. ;
Kristensen L.M. ;
Wells L. .
International Journal on Software Tools for Technology Transfer, 2007, 9 (3-4) :213-254
[9]   Foofah: Transforming Data By Example [J].
Jin, Zhongjun ;
Anderson, Michael R. ;
Cafarella, Michael ;
Jagadish, H., V .
SIGMOD'17: PROCEEDINGS OF THE 2017 ACM INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2017, :683-698
[10]  
Liu B, 2011, DATA CENTRIC SYST AP, P527, DOI 10.1007/978-3-642-19460-3_12