Discovering configuration workflows from existing logs using process mining

被引:6
|
作者
Ramos-Gutierrez, Belen [1 ]
Jesus Varela-Vaca, Angel [1 ]
Galindo, Jose A. [1 ]
Teresa Gomez-Lopez, Maria [1 ]
Benavides, David [1 ]
机构
[1] Univ Seville, Data Centr Comp Res Hub IDEA, Seville, Spain
关键词
Variability; Configuration workflow; Process mining; Process discovery; Clustering; ATTRIBUTE SELECTION; RECOMMENDER SYSTEMS; AUTOMATED-ANALYSIS; BUSINESS PROCESSES; PROCESS MODELS; MONTE-CARLO; FRAMEWORK; METHODOLOGY; CRITERION; BEHAVIOR;
D O I
10.1007/s10664-020-09911-x
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Variability models are used to build configurators, for guiding users through the configuration process to reach the desired setting that fulfils user requirements. The same variability model can be used to design different configurators employing different techniques. One of the design options that can change in a configurator is the configuration workflow, i.e., the order and sequence in which the different configuration elements are presented to the configuration stakeholders. When developing a configurator, a challenge is to decide the configuration workflow that better suits stakeholders according to previous configurations. For example, when configuring a Linux distribution the configuration process starts by choosing the network or the graphic card and then, other packages concerning a given sequence. In this paper, we present COnfiguration workfLOw proceSS mIning (COLOSSI), a framework that can automatically assist determining the configuration workflow that better fits the configuration logs generated by user activities given a set of logs of previous configurations and a variability model. COLOSSI is based on process discovery, commonly used in the process mining area, with an adaptation to configuration contexts. Derived from the possible complexity of both logs and the discovered processes, often, it is necessary to divide the traces into small ones. This provides an easier configuration workflow to be understood and followed by the user during the configuration process. In this paper, we apply and compare four different techniques for the traces clustering: greedy, backtracking, genetic and hierarchical algorithms. Our proposal is validated in three different scenarios, to show its feasibility, an ERP configuration, a Smart Farming, and a Computer Configuration. Furthermore, we open the door to new applications of process mining techniques in different areas of software product line engineering along with the necessity to apply clustering techniques for the trace preparation in the context of configuration workflows.
引用
收藏
页数:41
相关论文
共 50 条
  • [21] WEAKLY COMPLETE EVENT LOGS IN PROCESS MINING
    Lekic, Julijana
    Milicev, Dragan
    COMPUTING AND INFORMATICS, 2021, 40 (02) : 341 - 367
  • [22] Deciphering event logs in SharePoint Server: A methodology based on Process Mining
    Arias Chaves, Michael
    Rojas Cordoba, Eric
    PROCEEDINGS OF THE 2014 XL LATIN AMERICAN COMPUTING CONFERENCE (CLEI), 2014,
  • [23] Process Mining of Event Logs from Horde Helpdesk
    Dolak, Radim
    Botlik, Josef
    SMART TECHNOLOGIES AND INNOVATION FOR A SUSTAINABLE FUTURE, 2019, : 303 - 309
  • [24] Mining Business Process Activities from Email Logs
    Jlailaty, Diana
    Grigori, Daniela
    Belhajjame, Khalid
    2017 IEEE 1ST INTERNATIONAL CONFERENCE ON COGNITIVE COMPUTING (ICCC 2017), 2017, : 112 - 119
  • [25] Anomaly Detection Using Process Mining
    Bezerra, Fabio
    Wainer, Jacques
    van der Aalst, W. M. P.
    ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, 2009, 29 : 149 - +
  • [26] Discovering Agent Models using Process Mining: Initial Approach and a Case Study
    Bemthuis, Rob H.
    Lazarova-Molnar, Sanja
    2022 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING, ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM, 2022, : 163 - 172
  • [27] Optimal Process Mining for Large and Complex Event Logs
    Prodel, Martin
    Augusto, Vincent
    Jouaneton, Baptiste
    Lamarsalle, Ludovic
    Xie, Xiaolan
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2018, 15 (03) : 1309 - 1325
  • [28] Pattern Mining in System Logs: Opportunities for Process Improvement
    Mezebovsky, Dolev
    Soffer, Pnina
    Shimshoni, Ilan
    ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, 2009, 29 : 162 - 173
  • [29] Process mining on noisy logs - Can log sanitization help to improve performance?
    Cheng, Hsin-Jung
    Kumar, Akhil
    DECISION SUPPORT SYSTEMS, 2015, 79 : 138 - 149
  • [30] Data is Moody: Discovering Data Modification Rules from Process Event Logs
    Schuster, Marco Bjarne
    Wiegand, Boris
    Vreeken, Jilles
    MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES: RESEARCH TRACK, PT II, ECML PKDD 2024, 2024, 14942 : 285 - 302