The event tunnel:: Interactive visualization of complex event streams for business process pattern analysis

被引:0
作者
Suntinger, Martin
Obweger, Hannes
Schiefer, Josef
Groeller, M. Eduard
机构
来源
IEEE PACIFIC VISUALISATION SYMPOSIUM 2008, PROCEEDINGS | 2008年
关键词
business process visualization; complex event processing; query-driven visualization;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Event-based systems are gaining increasing popularity for building loosely coupled and distributed systems. Since business processes are becoming more interconnected and event-driven, event-based systems fit well for supporting and monitoring business processes. In this paper, we present an event-based business intelligence tool, the Event Tunnel framework. It provides an interactive visualization of event streams to support business analysts in exploring business incidents. The visualization is based on the metaphor of considering the event stream as a cylindrical tunnel, which is presented to the user from multiple perspectives. The information of single events laid out in the Event Tunnel is encoded in event glyphs that allow for a selective mapping of event attributes to colors, size and position. Different policies for the placement of the events in the tunnel as well as a clustering mechanism generate various views on historical event data. The Event Tunnel is able to display the relationships between events. This facilitates users to discover root causes and causal dependencies of event patterns. Our framework couples the event-tunnel visualization with query tools that allow users to search for relevant events within a data repository. Using query, filter and highlighting operations the analyst can navigate through the Event Tunnel until the required information or event patterns become visible. We demonstrate our approach with use cases from the fraud management and logistics domain.
引用
收藏
页码:111 / 118
页数:8
相关论文
共 15 条
[1]  
[Anonymous], 2005, DOLAP 05
[2]  
Bederson B. B., 2000, UIST. Proceedings of the 13th Annual ACM Symposium on User Interface Software and Technology, P171, DOI 10.1145/354401.354754
[3]  
CARLIS JV, 1998, UIST 98, P29
[4]   Adaptive fraud detection [J].
Fawcett, T ;
Provost, F .
DATA MINING AND KNOWLEDGE DISCOVERY, 1997, 1 (03) :291-316
[5]  
Hao M. C., 2006, Information Visualization, V5, P15, DOI 10.1057/palgrave.ivs.9500115
[6]  
Kapoor S, 2004, Proceedings of the IASTED International Conference on Software Engineering, P136
[7]  
Luckham D. C., 2001, POWER EVENTS INTRO C
[8]  
MANIATIS AS, 2003, DOLAP 03, P9
[9]   Event cloud - Searching for correlated business events [J].
Rozsnyai, Szabolcs ;
Vecera, Roland ;
Schiefer, Josef ;
Schatten, Alexander .
9TH IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY/4TH IEEE INTERNATIONAL CONFERENCE ON ENTERPRISE COMPUTING, E-COMMERCE AND E-SERVICES, 2007, :409-416
[10]  
RUNDENSTEINER EA, 2002, SIGMOD 02, P631