Process mining through dynamic analysis for modernising legacy systems

被引:16
作者
Perez-Castillo, R. [1 ]
Weber, B. [2 ]
de Guzman, I. G. -R. [1 ]
Piattini, M. [1 ]
机构
[1] Univ Castilla La Mancha, Alarcos Res Grp, Paseo Univ, Ciudad Real 413071, Spain
[2] Univ Innsbruck, A-6020 Innsbruck, Austria
关键词
D O I
10.1049/iet-sen.2010.0103
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Information systems age over time and become legacy information systems which often embed business knowledge that is not present in any other artefact. The embedded knowledge must be preserved to align the modernised versions of the legacy systems with the current business processes of an organisation. Modernisation efforts to preserve business knowledge typically consider different software artefacts as knowledge sources (e. g. code, databases, documentation etc.). Usually, the business knowledge needed to modernise a respective legacy system is statically recovered by reverse engineering techniques. Unfortunately, there is much knowledge that is only known during system execution. This study provides a semi-automatic technique based on dynamic analysis, combined with static analysis to instrument the source code for obtaining event log models. The event log represents a mapping between the pieces of source code executed and the business activities that they support. The obtained event log can then be used to mine the business processes embedded in legacy systems. In addition, the feasibility of the technique is validated by means of a formal case study, using a real-life legacy information system. The case study reports that the technique makes it possible to obtain event logs to effectively and efficiently discover business processes.
引用
收藏
页码:304 / 319
页数:16
相关论文
共 41 条
[1]   Recovering Views of Inter-System Interaction Behaviors [J].
Ackermann, Christopher ;
Lindvall, Mikael ;
Cleaveland, Rance .
16TH WORKING CONFERENCE ON REVERSE ENGINEERING (WCRE 2009), 2009, :53-61
[2]  
AMMANN P, 2008, INTRO SOFTWARE TESTI, P322
[3]  
[Anonymous], 2006, 147642006 ISOIEC
[4]  
[Anonymous], 2006, 23 INT C MACH LEARN, DOI [DOI 10.1145/1143844.1143874, 10.1145/1143844.1143874]
[5]  
BRERETON P, 2008, EV ASS SOFTW ENG EAS
[6]  
Brodie M., 1995, MIGRATING LEGACY SYS
[7]   Business Process Recovery for System Maintenance - An Empirical Approach [J].
Cai, Zhengong ;
Yang, Xiaohu ;
Wang, Xinyu .
2009 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, CONFERENCE PROCEEDINGS, 2009, :399-402
[8]  
CASTELLANOS M, 2009, HDB RES BUSINESS PRO, P456, DOI DOI 10.4018/978-1-60566-288-6.CH021
[9]   A Systematic Survey of Program Comprehension through Dynamic Analysis [J].
Cornelissen, Bas ;
Zaidman, Andy ;
van Deursen, Arie ;
Moonen, Leon ;
Koschke, Rainer .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2009, 35 (05) :684-702
[10]   Genetic process mining: an experimental evaluation [J].
de Medeiros, A. K. A. ;
Weijters, A. J. M. M. ;
van der Aalst, W. M. P. .
DATA MINING AND KNOWLEDGE DISCOVERY, 2007, 14 (02) :245-304