This paper presents a novel reverse engineering technique for obtaining real-life event logs from distributed systems. This allows us to analyze the operational processes of software systems under real-life conditions, and use process mining techniques to obtain precise and formal models. Hence, the work can be positioned in-between reverse engineering and process mining. We present a formal definition, implementation and an instrumentation strategy based the joinpoint-pointcut model. Two case studies are used to evaluate our approach. These concrete examples demonstrate the feasibility and usefulness of our approach.</p
Many software process methods and tools presuppose the existence of a formal model of a process. Unf...
Process mining techniques are able to extract knowledge from event logs commonly available in today’...
Nowadays, all kinds of information systems store detailed information in logs. Process mining has em...
This paper presents a novel reverse engineering technique for obtaining real-life event logs from di...
This paper presents a novel reverse engineering technique for obtaining real-life event logs from di...
Modern information systems produce tremendous amounts of event data. The area of process mining deal...
Modern information systems produce tremendous amounts of event data. The area of process mining deal...
Software development processes are often not explicitly modelled and sometimes even chaotic. In orde...
Many software process methods and tools presuppose the existence of a formal model of a process. Unf...
The basic idea of process mining is to extract knowledge from event logs recorded by an information ...
Process mining techniques are able to extract knowledge from event logs commonly available in today’...
The article discusses the approach to the analysis of business processes, called process mining, and...
Many software process methods and tools presuppose the existence of a formal model of a process. Unf...
Process mining techniques are able to extract knowledge from event logs commonly available in today’...
Nowadays, all kinds of information systems store detailed information in logs. Process mining has em...
This paper presents a novel reverse engineering technique for obtaining real-life event logs from di...
This paper presents a novel reverse engineering technique for obtaining real-life event logs from di...
Modern information systems produce tremendous amounts of event data. The area of process mining deal...
Modern information systems produce tremendous amounts of event data. The area of process mining deal...
Software development processes are often not explicitly modelled and sometimes even chaotic. In orde...
Many software process methods and tools presuppose the existence of a formal model of a process. Unf...
The basic idea of process mining is to extract knowledge from event logs recorded by an information ...
Process mining techniques are able to extract knowledge from event logs commonly available in today’...
The article discusses the approach to the analysis of business processes, called process mining, and...
Many software process methods and tools presuppose the existence of a formal model of a process. Unf...
Process mining techniques are able to extract knowledge from event logs commonly available in today’...
Nowadays, all kinds of information systems store detailed information in logs. Process mining has em...