The Statechart Workbench: Enabling Scalable Software Event Log Analysis using Process Mining

被引:0
|
作者
Leemans, Maikel [1 ]
van der Aalst, Wil M. P. [1 ]
van den Brand, Mark G. J. [1 ]
机构
[1] Eindhoven Univ Technol, Eindhoven, Netherlands
关键词
Reverse Engineering; Process Mining; Behavior Exploration; Performance Analysis; Usage Analysis; Deviation Analysis; Program Analysis; Model-driven Analysis;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
To understand and maintain the behavior of a (legacy) software system, one can observe and study the system's behavior by analyzing event data. For model-driven reverse engineering and analysis of system behavior, operation and usage based on software event data, we need a combination of advanced algorithms and techniques. In this paper, we present the Statechart Workbench: a novel software behavior exploration tool. Our tool provides a rich and mature integration of advanced (academic) techniques for the analysis of behavior, performance (timings), frequency (usage), conformance and reliability in the context of various formal models. The accompanied Eclipse plugin allows the user to interactively link all the results from the Statechart Workbench back to the source code of the system and enables users to get started right away with their own software. The work can be positioned in-between reverse engineering and process mining. Implementations, documentation, and a screen-cast (https://youtu.be/xR4XfU3E5mk) of the proposed approach are available, and a user study demonstrates the novelty and usefulness of the tool.
引用
收藏
页码:502 / 506
页数:5
相关论文
共 50 条
  • [21] Bot Log Mining: Using Logs from Robotic Process Automation for Process Mining
    Egger, Andreas
    ter Hofstede, Arthur H. M.
    Kratsch, Wolfgang
    Leemans, Sander J. J.
    Roeglinger, Maximilian
    Wynn, Moe Thandar
    CONCEPTUAL MODELING, ER 2020, 2020, 12400 : 51 - 61
  • [22] Bot log mining: An approach to the integrated analysis of Robotic Process Automation and process mining
    Egger, Andreas
    ter Hofstede, Arthur H. M.
    Kratsch, Wolfgang
    Leemans, Sander J. J.
    Roeglinger, Maximilian
    Wynn, Moe T.
    INFORMATION SYSTEMS, 2024, 126
  • [23] Under the Workbench: An analysis of the use and preservation of MONK text mining research software
    Green, Harriett E.
    LITERARY AND LINGUISTIC COMPUTING, 2014, 29 (01): : 23 - 40
  • [24] NICE: The Native IoT-Centric Event Log Model for Process Mining
    Bertrand, Yannis
    Veneruso, Silvestro
    Leotta, Francesco
    Mecella, Massimo
    Serral, Estefania
    PROCESS MINING WORKSHOPS, ICPM 2023, 2024, 503 : 32 - 44
  • [25] A Novel Process of Parsing Event-Log Activities for Process Mining Based on Information Content
    Issahaku, Fadilul-lah Yassaanah
    Fang, Xianwen
    Bashiru Danwana, Sumaiya
    Bankas, Edem Kwedzo
    Lu, Ke
    ELECTRONICS, 2023, 12 (02)
  • [26] Software maintenance process analysis using discrete-event simulation
    Podnar, I
    Mikac, B
    FIFTH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING, PROCEEDINGS, 2001, : 192 - 195
  • [27] Discovering Process Model from Incomplete Log using Process Mining
    Zakarija, Ivona
    Skopljanac-Macina, Frano
    Blaskovic, Bruno
    PROCEEDINGS OF ELMAR-2015 57TH INTERNATIONAL SYMPOSIUM ELMAR-2015, 2015, : 117 - 120
  • [28] A cluster analysis method of software development activities based on event log
    Tang M.
    Li T.
    Zhu R.
    Ma Z.
    Recent Advances in Computer Science and Communications, 2021, 14 (06) : 1843 - 1851
  • [29] Recursion Aware Modeling and Discovery for Hierarchical Software Event Log Analysis
    Leemans, Maikel
    van der Aalst, Wil M. P.
    van den Brand, Mark G. J.
    2018 25TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING (SANER 2018), 2018, : 185 - 196
  • [30] Process-aware Event Log Datacubes for Workflow Process and Knowledge Mining, Predicting and Analyzing Frameworks
    Ham, Seong-Hun
    Pham, Dihn-Lam
    Kim, Kyoung-Sook
    Kim, Kwanghoon Pio
    2020 22ND INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): DIGITAL SECURITY GLOBAL AGENDA FOR SAFE SOCIETY!, 2020, : 651 - 657