Middleware Adaptation through Process Mining

被引:4
|
作者
Rosa, Nelson [1 ]
机构
[1] Univ Fed Pernambuco, Ctr Informat, Recife, PE, Brazil
来源
2017 IEEE 31ST INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) | 2017年
关键词
adaptive middleware; process mining; software architecture;
D O I
10.1109/AINA.2017.25
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The development of adaptive middleware systems is a complex task due to the difficulty of dealing with adaptation issues, such as how to implement the adaptation mechanism, where to insert the adaptive code into the middleware, and when the adaptive code is composed with the middleware logic. Existing solutions to build adaptive middleware usually concentrate on the use of software technologies like aspect oriented programming and computational reflection to face with the how issue. In this paper, we propose a solution to build middleware that is adapted at runtime (when), whose adaptation decisions and actions are moved from the middleware to an external component (where) and whose adaptation makes use of process mining techniques and software architecture (how). The adaptation process is triggered based on the verification of the middleware event log. In order to evaluate the proposed approach, we carried an experimental evaluation to check the quality of the mined middleware model and the verification overhead.
引用
收藏
页码:244 / 251
页数:8
相关论文
共 50 条
  • [1] Performance analysis of GRID middleware using process mining
    Misev, Anastas
    Atanassov, Emanouil
    COMPUTATIONAL SCIENCE - ICCS 2008, PT 1, 2008, 5101 : 203 - +
  • [2] Case and Activity Identification for Mining Process Models from Middleware
    Bala, Saimir
    Mendling, Jan
    Schimak, Martin
    Queteschiner, Peter
    PRACTICE OF ENTERPRISE MODELING (POEM 2018), 2018, 335 : 86 - 102
  • [3] Tailoring the Engineering Design Process Through Data and Process Mining
    Maruster, Laura
    Alblas, Alex
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2022, 69 (04) : 1577 - 1591
  • [4] Detecting Learning Strategies Through Process Mining
    Saint, John
    Gasevic, Dragan
    Pardo, Abelardo
    LIFELONG TECHNOLOGY-ENHANCED LEARNING, EC-TEL 2018, 2018, 11082 : 385 - 398
  • [5] Improving Vulnerability Management Through Process Mining
    Meyer, Christina
    Heininger, Richard
    Stary, Christian
    APPLIED SCIENCES-BASEL, 2024, 14 (23):
  • [6] Insuring Sensitive Processes through Process Mining
    Munoz-Gama, Jorge
    Echizen, Isao
    2012 9TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INTELLIGENCE & COMPUTING AND 9TH INTERNATIONAL CONFERENCE ON AUTONOMIC & TRUSTED COMPUTING (UIC/ATC), 2012, : 447 - 454
  • [7] Triage of IoT Attacks Through Process Mining
    Coltellese, Simone
    Maggi, Fabrizio Maria
    Marrella, Andrea
    Massarelli, Luca
    Querzoni, Leonardo
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2019 CONFERENCES, 2019, 11877 : 326 - 344
  • [8] Enhancing Personalized Learning Through Process Mining
    Wambsganss, Thiemo
    Schmitt, Anuschka
    BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2024,
  • [9] Discovering Business Rules through Process Mining
    Crerie, Raphael
    Baiao, Fernanda Araujo
    Santoro, Flavia Maria
    ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, 2009, 29 : 136 - 148
  • [10] A Middleware Architecture for Dynamic Adaptation in Ubiquitous Computing
    Lopes, Joao
    Souza, Rodrigo
    Geyer, Claudio
    Costa, Cristiano
    Barbosa, Jorge
    Pernas, Ana
    Yamin, Adenauer
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2014, 20 (09) : 1327 - 1351