Mining Periodic Patterns from Nested Event Logs

被引:2
|
作者
Getta, Janusz R. [1 ]
Zimniak, Marcin [2 ]
Benn, Wolfgang [2 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW, Australia
[2] TU Chemnitz, Fac Comp Sci, Chemnitz, Germany
关键词
DISCOVERY;
D O I
10.1109/CIT.2014.27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information about periodic computations of processes, events, and software components can be used to improve performance of software systems. This work investigates mining periodic patterns of events from historical information related to processes, events, and software components. We introduce a concept of a nested event log that generalizes historical information stored in the application traces, event logs and dynamic profiles. We show how a nested event log can be compressed into a reduced event table and later on converted into a workload histogram suitable for mining periodic patterns of events. The paper defines a concept of periodic pattern and its validation in a workload histogram. We propose two algorithms for mining periodic patterns and we define the quality indicators for the patterns found. We show, that a system of operations on periodic patterns introduced in this work can be used to derive new periodic patterns with some of the quality indicators better from the original ones. The paper is concluded with an algorithm for deriving periodic patterns with the given quality constraints.
引用
收藏
页码:160 / 167
页数:8
相关论文
共 50 条
  • [1] A data clustering algorithm for mining patterns from event logs
    Vaarandi, R
    [J]. PROCEEDINGS OF THE 3RD IEEE WORKSHOP ON IP OPERATIONS & MANAGEMENT (IPOM2003), 2003, : 119 - 126
  • [2] Internet Usage Patterns Mining from Firewall Event Logs
    Polpinij, Jantima
    Namee, Khanista
    [J]. 2019 INTERNATIONAL CONFERENCE ON BIG DATA AND EDUCATION (ICBDE 2019), 2019, : 93 - 97
  • [3] On Systematic Approach to Discovering Periodic Patterns in Event Logs
    Zimniak, Marcin
    Getta, Janusz R.
    [J]. COMPUTATIONAL COLLECTIVE INTELLIGENCE, ICCCI 2016, PT I, 2016, 9875 : 249 - 259
  • [4] Mining cost-effective patterns in event logs
    Fournier-Viger, Philippe
    Li, Jiaxuan
    Lin, Jerry Chun-Wei
    Tin Truong Chi
    Kiran, R. Uday
    [J]. KNOWLEDGE-BASED SYSTEMS, 2020, 191
  • [5] A breadth-first algorithm for mining frequent patterns from event logs
    Vaarandi, R
    [J]. INTELLIGENCE IN COMMUNICATION SYSTEMS, 2004, 3283 : 293 - 308
  • [6] Mining invisible tasks from event logs
    Wen, Lijie
    Wang, Jianmin
    Sun, Jiaguang
    [J]. ADVANCES IN DATA AND WEB MANAGEMENT, PROCEEDINGS, 2007, 4505 : 358 - +
  • [7] Mining Process Performance from Event Logs
    Adriansyah, Arya
    Buijs, Joos C. A. M.
    [J]. BUSINESS PROCESS MANAGEMENT WORKSHOPS (BPM), 2013, 132 : 217 - 218
  • [8] Discovering Signature Patterns from Event Logs
    Bose, R. P. Jagadeesh Chandra
    van der Aalst, Wil M. P.
    [J]. 2013 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING (CIDM), 2013, : 111 - 118
  • [9] Mining workflow recovery from event based logs
    Gaaloul, W
    Godart, C
    [J]. BUSINESS PROCESS MANAGEMENT, PROCEEDINGS, 2005, 3649 : 169 - 185
  • [10] Mining variable fragments from process event logs
    Asef Pourmasoumi
    Mohsen Kahani
    Ebrahim Bagheri
    [J]. Information Systems Frontiers, 2017, 19 : 1423 - 1443