Discovering configuration workflows from existing logs using process mining

被引:6
|
作者
Ramos-Gutierrez, Belen [1 ]
Jesus Varela-Vaca, Angel [1 ]
Galindo, Jose A. [1 ]
Teresa Gomez-Lopez, Maria [1 ]
Benavides, David [1 ]
机构
[1] Univ Seville, Data Centr Comp Res Hub IDEA, Seville, Spain
关键词
Variability; Configuration workflow; Process mining; Process discovery; Clustering; ATTRIBUTE SELECTION; RECOMMENDER SYSTEMS; AUTOMATED-ANALYSIS; BUSINESS PROCESSES; PROCESS MODELS; MONTE-CARLO; FRAMEWORK; METHODOLOGY; CRITERION; BEHAVIOR;
D O I
10.1007/s10664-020-09911-x
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Variability models are used to build configurators, for guiding users through the configuration process to reach the desired setting that fulfils user requirements. The same variability model can be used to design different configurators employing different techniques. One of the design options that can change in a configurator is the configuration workflow, i.e., the order and sequence in which the different configuration elements are presented to the configuration stakeholders. When developing a configurator, a challenge is to decide the configuration workflow that better suits stakeholders according to previous configurations. For example, when configuring a Linux distribution the configuration process starts by choosing the network or the graphic card and then, other packages concerning a given sequence. In this paper, we present COnfiguration workfLOw proceSS mIning (COLOSSI), a framework that can automatically assist determining the configuration workflow that better fits the configuration logs generated by user activities given a set of logs of previous configurations and a variability model. COLOSSI is based on process discovery, commonly used in the process mining area, with an adaptation to configuration contexts. Derived from the possible complexity of both logs and the discovered processes, often, it is necessary to divide the traces into small ones. This provides an easier configuration workflow to be understood and followed by the user during the configuration process. In this paper, we apply and compare four different techniques for the traces clustering: greedy, backtracking, genetic and hierarchical algorithms. Our proposal is validated in three different scenarios, to show its feasibility, an ERP configuration, a Smart Farming, and a Computer Configuration. Furthermore, we open the door to new applications of process mining techniques in different areas of software product line engineering along with the necessity to apply clustering techniques for the trace preparation in the context of configuration workflows.
引用
收藏
页数:41
相关论文
共 50 条
  • [41] OrgMiner: A Framework for Discovering User-Related Process Intelligence from Event Logs
    Amit V. Deokar
    Jie Tao
    Information Systems Frontiers, 2021, 23 : 753 - 772
  • [42] From event logs to goals: a systematic literature review of goal-oriented process mining
    Ghasemi, Mahdi
    Amyot, Daniel
    REQUIREMENTS ENGINEERING, 2020, 25 (01) : 67 - 93
  • [43] Full Support for Efficiently Mining Multi-Perspective Declarative Constraints from Process Logs
    Sturm, Christian
    Fichtner, Myriel
    Schoenig, Stefan
    INFORMATION, 2019, 10 (01)
  • [44] Extracting Event Logs for Process Mining from Data Stored on the Blockchain
    Muehlberger, Roman
    Bachhofner, Stefan
    Di Ciccio, Claudio
    Garcia-Banuelos, Luciano
    Lopez-Pintado, Orlenys
    BUSINESS PROCESS MANAGEMENT WORKSHOPS (BPM 2019), 2019, 362 : 690 - 703
  • [45] Split Miner: Discovering Accurate and Simple Business Process Models from Event Logs
    Augusto, Adriano
    Conforti, Raffaele
    Dumas, Marlon
    La Rosa, Marcello
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2017, : 1 - 10
  • [46] Business Process Reporting Using Process Mining, Analytic Workflows and Process Cubes: A Case Study in Education
    Bolt, Alfredo
    de Leoni, Massimiliano
    van der Aalst, Wil M. P.
    Gorissen, Pierre
    DATA-DRIVEN PROCESS DISCOVERY AND ANALYSIS, SIMPDA 2015, 2017, 244 : 28 - 53
  • [47] Discovering Unseen Behaviour from Event Logs
    Cervantes, Abel Armas
    Taymouri, Farbod
    APPLICATION AND THEORY OF PETRI NETS AND CONCURRENCY (PETRI NETS 2022), 2022, 13288 : 23 - 42
  • [48] Discovering Data Models from Event Logs
    Bano, Dorina
    Weske, Mathias
    CONCEPTUAL MODELING, ER 2020, 2020, 12400 : 62 - 76
  • [49] Discovering social networks from event logs
    Van Der Aalst W.M.P.
    Reijers H.A.
    Song M.
    Computer Supported Cooperative Work (CSCW), 2005, 14 (6): : 549 - 593
  • [50] Discovering Conditional Business Rules in Web Applications Using Process Mining
    Alkofahi, Hamza
    Umphress, David
    Alawneh, Heba
    INFORMATION INTEGRATION AND WEB INTELLIGENCE, IIWAS 2022, 2022, 13635 : 90 - 97