Discovering configuration workflows from existing logs using process mining

被引:6
|
作者
Ramos-Gutierrez, Belen [1 ]
Jesus Varela-Vaca, Angel [1 ]
Galindo, Jose A. [1 ]
Teresa Gomez-Lopez, Maria [1 ]
Benavides, David [1 ]
机构
[1] Univ Seville, Data Centr Comp Res Hub IDEA, Seville, Spain
关键词
Variability; Configuration workflow; Process mining; Process discovery; Clustering; ATTRIBUTE SELECTION; RECOMMENDER SYSTEMS; AUTOMATED-ANALYSIS; BUSINESS PROCESSES; PROCESS MODELS; MONTE-CARLO; FRAMEWORK; METHODOLOGY; CRITERION; BEHAVIOR;
D O I
10.1007/s10664-020-09911-x
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Variability models are used to build configurators, for guiding users through the configuration process to reach the desired setting that fulfils user requirements. The same variability model can be used to design different configurators employing different techniques. One of the design options that can change in a configurator is the configuration workflow, i.e., the order and sequence in which the different configuration elements are presented to the configuration stakeholders. When developing a configurator, a challenge is to decide the configuration workflow that better suits stakeholders according to previous configurations. For example, when configuring a Linux distribution the configuration process starts by choosing the network or the graphic card and then, other packages concerning a given sequence. In this paper, we present COnfiguration workfLOw proceSS mIning (COLOSSI), a framework that can automatically assist determining the configuration workflow that better fits the configuration logs generated by user activities given a set of logs of previous configurations and a variability model. COLOSSI is based on process discovery, commonly used in the process mining area, with an adaptation to configuration contexts. Derived from the possible complexity of both logs and the discovered processes, often, it is necessary to divide the traces into small ones. This provides an easier configuration workflow to be understood and followed by the user during the configuration process. In this paper, we apply and compare four different techniques for the traces clustering: greedy, backtracking, genetic and hierarchical algorithms. Our proposal is validated in three different scenarios, to show its feasibility, an ERP configuration, a Smart Farming, and a Computer Configuration. Furthermore, we open the door to new applications of process mining techniques in different areas of software product line engineering along with the necessity to apply clustering techniques for the trace preparation in the context of configuration workflows.
引用
收藏
页数:41
相关论文
共 50 条
  • [31] Process mining using BPMN: relating event logs and process models
    Anna A. Kalenkova
    Wil M. P. van der Aalst
    Irina A. Lomazova
    Vladimir A. Rubin
    Software & Systems Modeling, 2017, 16 : 1019 - 1048
  • [32] Mining Business Process Stages from Event Logs
    Hoang Nguyen
    Dumas, Marlon
    ter Hofstede, Arthur H. M.
    La Rosa, Marcello
    Maggi, Fabrizio Maria
    ADVANCED INFORMATION SYSTEMS ENGINEERING (CAISE 2017), 2017, 10253 : 577 - 594
  • [33] Mining Business Process Activities from Email Logs
    Jlailaty, Diana
    Grigori, Daniela
    Belhajjame, Khalid
    2017 IEEE 1ST INTERNATIONAL CONFERENCE ON COGNITIVE COMPUTING (ICCC 2017), 2017, : 112 - 119
  • [34] Mining Configuration Items From System Logs through Distant Supervision
    Zhang, Qixun
    Jia, Tong
    Xia, Wensheng
    Li, Ying
    Wu, Zhonghai
    Han, Jing
    19TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2021), 2021, : 1135 - 1142
  • [35] Mining variable fragments from process event logs
    Pourmasoumi, Asef
    Kahani, Mohsen
    Bagheri, Ebrahim
    INFORMATION SYSTEMS FRONTIERS, 2017, 19 (06) : 1423 - 1443
  • [36] Discovering Process Model from Event Logs by Considering Overlapping Rules
    Effendi, Yutika Amelia
    Sarno, Riyanarto
    2017 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI), 2017, : 645 - 650
  • [37] An Experimental Analysis on Mining Proportional Process Models from Process Logs
    Bae, Joo-Eun
    Lee, Jin-Hyong
    Park, Young-In
    Park, So-Hyang
    Kim, Kyoung-Sook
    Kim, Kwanghoon Pio
    2022 IEEE/ACM INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING, APPLICATIONS AND TECHNOLOGIES, BDCAT, 2022, : 297 - 305
  • [38] Process Spaceship: Discovering and Exploring Process Views from Event Logs in Data Spaces
    Motahari, Hamid
    Benatallah, Boualem
    Saint -Paul, Regis
    Casati, Fabio
    Andritsos, Periklis
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2008, 1 (02): : 1412 - 1415
  • [39] Mining Timing Constraints from Event Logs for Process Model
    Zhang, Zhenyu
    Guo, Chunhui
    Ren, Shangping
    2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 1011 - 1016
  • [40] Data is Moody: Discovering Data Modification Rules from Process Event Logs
    Schuster, Marco Bjarne
    Wiegand, Boris
    Vreeken, Jilles
    MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES: RESEARCH TRACK, PT II, ECML PKDD 2024, 2024, 14942 : 285 - 302