International audienceThe problem of discovering protocols and business processes based on the analysis of log files is a real challenge. The behavior of a Web service can be specified using a Business Protocol, hence the importance of this discovery. The construction of the Business Protocol begins by correlating the logged messages into their conversations (i.e. instances of the business protocol). The accomplishment of this task is easy if we assume that the logs contain the right identifiers, which would allow us to associate every message to a conversation. But in real-world situations, this kind of information rarely exists inside the log files. Our work consists in correlating the messages present in Web service logs into the convers...
While the problem of analyzing network traffic at the granularity of indi-vidual connections has see...
This paper describes our preliminary analysis on the induction of communication protocols. Our work ...
When more and more people use web-based information, information of how they use the information is ...
Business process management, service-oriented architectures and software back-engineering heavily re...
Process discovery algorithms aim to capture process models from event logs. These algorithms have be...
Abstract. When a service engages in multiple interactions concurrently, it is generally required to ...
When a service engages in multiple interactions concurrently, it is generally required to correlate ...
Business process management, service-oriented architectures and their reverse engineering heavily re...
Recently, business protocol discovery has taken more attention in the field of web services. This ac...
Process discovery algorithms aim to capture process orchestration models from event logs. These algo...
Masteroppgave i informasjons- og kommunikasjonsteknologi IKT590 2011 – Universitetet i Agder, Grims...
Process discovery algorithms aim to capture process models from event logs. These algorithms have be...
Software system behaviour analysis is a challenging research problem in software engineering. The ma...
While the problem of analyzing network traffic at the granularity of indi-vidual connections has see...
This paper describes our preliminary analysis on the induction of communication protocols. Our work ...
When more and more people use web-based information, information of how they use the information is ...
Business process management, service-oriented architectures and software back-engineering heavily re...
Process discovery algorithms aim to capture process models from event logs. These algorithms have be...
Abstract. When a service engages in multiple interactions concurrently, it is generally required to ...
When a service engages in multiple interactions concurrently, it is generally required to correlate ...
Business process management, service-oriented architectures and their reverse engineering heavily re...
Recently, business protocol discovery has taken more attention in the field of web services. This ac...
Process discovery algorithms aim to capture process orchestration models from event logs. These algo...
Masteroppgave i informasjons- og kommunikasjonsteknologi IKT590 2011 – Universitetet i Agder, Grims...
Process discovery algorithms aim to capture process models from event logs. These algorithms have be...
Software system behaviour analysis is a challenging research problem in software engineering. The ma...
While the problem of analyzing network traffic at the granularity of indi-vidual connections has see...
This paper describes our preliminary analysis on the induction of communication protocols. Our work ...
When more and more people use web-based information, information of how they use the information is ...