Conversation Extraction from Event Logs

被引:2
|
作者
Salva, Sebastien [1 ]
Provot, Laurent [1 ]
Sue, Jarod [1 ]
机构
[1] Clermont Auvergne Univ, LIMOS UMR CNRS 6158, Aubiere, France
关键词
Event Log; Session; Conversation Extraction; Correlation; DISCOVERY;
D O I
10.5220/0010652300003064
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Event logs are more and more considered for helping IT personnel understand system behaviour or performance. One way to get knowledge from event logs is by extracting conversations (a.k.a. sessions) through the recovering of event correlations. This paper proposes a highly parallel algorithm to retrieve conversations from event logs, without having any knowledge about the used correlation mechanisms. To make the event log exploration effective and efficient, we devised an algorithm that covers an event log and builds the possible conversation sets w.r.t. the data found within the events. To limit the conversation set exploration and quicker recover good candidates, the algorithm is guided by an heuristic based upon the evaluation of invariants and conversation quality attributes. This heuristic also offers flexibility to users, as the quality and invariants can be adapted to the system context. We report experimental results obtained from 6 case studies and show that our algorithm has the capability of recovering the expected conversation sets in reasonable time delays.
引用
收藏
页码:155 / 163
页数:9
相关论文
共 50 条
  • [41] Mining Conditional Partial Order Graphs from Event Logs
    Mokhov, Andrey
    Carmona, Josep
    Beaumont, Jonathan
    TRANSACTIONS ON PETRI NETS AND OTHER MODELS OF CONCURRENCY XI, 2016, 9930 : 114 - 136
  • [42] WEAC: Word Embeddings for Anomaly Classification from Event Logs
    Pande, Amit
    Ahuja, Vishal
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 1095 - 1100
  • [43] Workflow mining: Discovering process models from event logs
    van der Aalst, W
    Weijters, T
    Maruster, L
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (09) : 1128 - 1142
  • [44] Detecting implicit dependencies between tasks from event logs
    Wen, LJ
    Wang, JM
    Sun, JG
    FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS, 2006, 3841 : 591 - 603
  • [45] Process Discovery from Dependence-Complete Event Logs
    Song, Wei
    Jacobsen, Hans-Arno
    Ye, Chunyang
    Ma, Xiaoxing
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2016, 9 (05) : 714 - 727
  • [46] Discovering and utilising expert knowledge from security event logs
    Khan, Saad
    Parkinson, Simon
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 48
  • [47] Configurable Batch-Processing Discovery from Event Logs
    Pika, Anastasiia
    Ouyang, Chun
    ter Hofstede, Arthur H. M.
    ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS, 2022, 13 (03)
  • [48] Process Discovery from Low-Level Event Logs
    Fazzinga, Bettina
    Flesca, Sergio
    Furfaro, Filippo
    Pontieri, Luigi
    ADVANCED INFORMATION SYSTEMS ENGINEERING, CAISE 2018, 2018, 10816 : 257 - 273
  • [49] Extraction of dynamic user behaviors from web logs
    Hafri, Y
    Bachimont, B
    Stachev, P
    INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING, 2003, 2690 : 584 - 595
  • [50] Unsupervised Extraction of Part Names from Service Logs
    Chandramouli, Aravind
    Subramanian, Gopi
    Bal, Debasis
    WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, WCECS 2013, VOL II, 2013, Ao, : 826 - 828