The Statechart Workbench: Enabling Scalable Software Event Log Analysis using Process Mining

被引:0
|
作者
Leemans, Maikel [1 ]
van der Aalst, Wil M. P. [1 ]
van den Brand, Mark G. J. [1 ]
机构
[1] Eindhoven Univ Technol, Eindhoven, Netherlands
关键词
Reverse Engineering; Process Mining; Behavior Exploration; Performance Analysis; Usage Analysis; Deviation Analysis; Program Analysis; Model-driven Analysis;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
To understand and maintain the behavior of a (legacy) software system, one can observe and study the system's behavior by analyzing event data. For model-driven reverse engineering and analysis of system behavior, operation and usage based on software event data, we need a combination of advanced algorithms and techniques. In this paper, we present the Statechart Workbench: a novel software behavior exploration tool. Our tool provides a rich and mature integration of advanced (academic) techniques for the analysis of behavior, performance (timings), frequency (usage), conformance and reliability in the context of various formal models. The accompanied Eclipse plugin allows the user to interactively link all the results from the Statechart Workbench back to the source code of the system and enables users to get started right away with their own software. The work can be positioned in-between reverse engineering and process mining. Implementations, documentation, and a screen-cast (https://youtu.be/xR4XfU3E5mk) of the proposed approach are available, and a user study demonstrates the novelty and usefulness of the tool.
引用
收藏
页码:502 / 506
页数:5
相关论文
共 50 条
  • [41] Process Mining Using BPMN: Relating Event Logs and Process Models
    Kalenkova, Anna A.
    van der Aalst, Wil M. P.
    Lomazova, Irina A.
    Rubin, Vladimir A.
    19TH ACM/IEEE INTERNATIONAL CONFERENCE ON MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS (MODELS'16), 2016, : 123 - 123
  • [42] Process mining using BPMN: relating event logs and process models
    Anna A. Kalenkova
    Wil M. P. van der Aalst
    Irina A. Lomazova
    Vladimir A. Rubin
    Software & Systems Modeling, 2017, 16 : 1019 - 1048
  • [43] Timed Genetic Process Mining for Robust Tracking of Processes under Incomplete Event Log Conditions
    Effendi, Yutika Amelia
    Kim, Minsoo
    ELECTRONICS, 2024, 13 (18)
  • [44] A Comparative Analysis Methodology for Process Mining Software Tools
    Drakoulogkonas, Panagiotis
    Apostolou, Dimitrios
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, KSEM 2019, PT I, 2019, 11775 : 751 - 762
  • [45] Using Event Log Timing Information to Assist Process Scenario Discoveries
    Zhang, Zhenyu
    Guo, Chunhui
    Peng, Wenyu
    Ren, Shangping
    2020 IEEE THIRD INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND KNOWLEDGE ENGINEERING (AIKE 2020), 2020, : 58 - 64
  • [46] Log Delta Analysis: Interpretable Differencing of Business Process Event Logs
    van Beest, Nick R. T. P.
    Dumas, Marlon
    Garcia-Banuelos, Luciano
    La Rosa, Marcello
    BUSINESS PROCESS MANAGEMENT, BPM 2015, 2015, 9253 : 386 - 405
  • [47] Anvaya: An Algorithm and Case-Study on Improving the Goodness of Software Process Models generated by Mining Event-Log Data in Issue Tracking Systems
    Juneja, Prerna
    Kundra, Divya
    Sureka, Ashish
    PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS, VOL 1, 2016, : 53 - 62
  • [48] Using Process Mining in Software Development Process Management: A Case Study
    Lemos, Artini M.
    Sabino, Caio C.
    Lima, Ricardo M. F.
    Oliveira, Cesar A. L.
    2011 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2011, : 1181 - 1186
  • [49] The Discovery of the Implemented Software Engineering Process Using Process Mining Techniques
    Zayed, Mostafa Adel
    Farid, Ahmed Bahaa
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (02) : 279 - 286
  • [50] Insider threat Detection using Log analysis and Event Correlation
    Ambre, Amruta
    Shekokar, Narendra
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA), 2015, 45 : 436 - 445