Discovering configuration workflows from existing logs using process mining

被引:6
|
作者
Ramos-Gutierrez, Belen [1 ]
Jesus Varela-Vaca, Angel [1 ]
Galindo, Jose A. [1 ]
Teresa Gomez-Lopez, Maria [1 ]
Benavides, David [1 ]
机构
[1] Univ Seville, Data Centr Comp Res Hub IDEA, Seville, Spain
关键词
Variability; Configuration workflow; Process mining; Process discovery; Clustering; ATTRIBUTE SELECTION; RECOMMENDER SYSTEMS; AUTOMATED-ANALYSIS; BUSINESS PROCESSES; PROCESS MODELS; MONTE-CARLO; FRAMEWORK; METHODOLOGY; CRITERION; BEHAVIOR;
D O I
10.1007/s10664-020-09911-x
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Variability models are used to build configurators, for guiding users through the configuration process to reach the desired setting that fulfils user requirements. The same variability model can be used to design different configurators employing different techniques. One of the design options that can change in a configurator is the configuration workflow, i.e., the order and sequence in which the different configuration elements are presented to the configuration stakeholders. When developing a configurator, a challenge is to decide the configuration workflow that better suits stakeholders according to previous configurations. For example, when configuring a Linux distribution the configuration process starts by choosing the network or the graphic card and then, other packages concerning a given sequence. In this paper, we present COnfiguration workfLOw proceSS mIning (COLOSSI), a framework that can automatically assist determining the configuration workflow that better fits the configuration logs generated by user activities given a set of logs of previous configurations and a variability model. COLOSSI is based on process discovery, commonly used in the process mining area, with an adaptation to configuration contexts. Derived from the possible complexity of both logs and the discovered processes, often, it is necessary to divide the traces into small ones. This provides an easier configuration workflow to be understood and followed by the user during the configuration process. In this paper, we apply and compare four different techniques for the traces clustering: greedy, backtracking, genetic and hierarchical algorithms. Our proposal is validated in three different scenarios, to show its feasibility, an ERP configuration, a Smart Farming, and a Computer Configuration. Furthermore, we open the door to new applications of process mining techniques in different areas of software product line engineering along with the necessity to apply clustering techniques for the trace preparation in the context of configuration workflows.
引用
收藏
页数:41
相关论文
共 50 条
  • [31] Efficient Discrete Particle Swarm Optimization Algorithm for Process Mining from Event Logs
    Li, Gong-Liang
    Jing, Si-Yuan
    Shen, Yan
    Guo, Bing
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2022, 15 (01)
  • [32] Discovering System Dynamics Simulation Models Using Process Mining
    Pourbafrani, Mahsa
    van der Aalst, Wil M. P.
    IEEE ACCESS, 2022, 10 : 78527 - 78547
  • [33] Discovering and Analyzing Contextual Behavioral Patterns From Event Logs
    Acheli, Mehdi
    Grigori, Daniela
    Weidlich, Matthias
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (12) : 5708 - 5721
  • [34] Mining Event Logs to Assist the Development of Executable Process Variants
    Nguyen Ngoc Chan
    Yongsiriwit, Karn
    Gaaloul, Walid
    Mendling, Jan
    ADVANCED INFORMATION SYSTEMS ENGINEERING (CAISE 2014), 2014, 8484 : 548 - 563
  • [35] OrgMiner: A Framework for Discovering User-Related Process Intelligence from Event Logs
    Deokar, Amit, V
    Tao, Jie
    INFORMATION SYSTEMS FRONTIERS, 2021, 23 (03) : 753 - 772
  • [36] A Method to Tackle Abnormal Event Logs Based on Process Mining
    Yang, Zhanmin
    Zhang, Liqun
    Hu, Yuan
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, KNOWLEDGE ENGINEERING AND INFORMATION ENGINEERING (SEKEIE 2014), 2014, 114 : 34 - 38
  • [37] A Multi-case Perspective Analytical Framework for Discovering Human Daily Behavior from Sensors using Process Mining
    Prathama, Frans
    Yahya, Bernardo Nugroho
    Lee, Seok-Lyong
    2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021), 2021, : 638 - 644
  • [38] Discovering Signature Patterns from Event Logs
    Bose, R. P. Jagadeesh Chandra
    van der Aalst, Wil M. P.
    2013 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING (CIDM), 2013, : 111 - 118
  • [39] System Problem Detection by Mining Process Model from Console Logs
    Li, Jian
    Cao, Jian
    NETWORK AND PARALLEL COMPUTING (NPC 2017), 2017, 10578 : 140 - 144
  • [40] Process Mining on Databases: Unearthing Historical Data from Redo Logs
    de Murillas, Eduardo Gonzalez Lopez
    van der Aalst, Wil M. P.
    Reijers, Hajo A.
    BUSINESS PROCESS MANAGEMENT, BPM 2015, 2015, 9253 : 367 - 385