17 research outputs found

    Recursion Aware Modeling and Discovery For Hierarchical Software Event Log Analysis (Extended)

    Get PDF
    This extended paper presents 1) a novel hierarchy and recursion extension to the process tree model; and 2) the first, recursion aware process model discovery technique that leverages hierarchical information in event logs, typically available for software systems. This technique allows us to analyze the operational processes of software systems under real-life conditions at multiple levels of granularity. The work can be positioned in-between reverse engineering and process mining. An implementation of the proposed approach is available as a ProM plugin. Experimental results based on real-life (software) event logs demonstrate the feasibility and usefulness of the approach and show the huge potential to speed up discovery by exploiting the available hierarchy.Comment: Extended version (14 pages total) of the paper Recursion Aware Modeling and Discovery For Hierarchical Software Event Log Analysis. This Technical Report version includes the guarantee proofs for the proposed discovery algorithm

    Statechart Workbench and Alignments Software Event Log

    No full text
    Extensible Event Stream (XES) software event log obtained through instrumenting the Statechart Workbench ProM plugin using the tool available at {https://svn.win.tue.nl/repos/prom/XPort/}. This event log contains method-call level events describing a workbench run invoking the Alignments algorithm using the BPI Challenge 2012 event log available and documented at {https://doi.org/10.4121/uuid:3926db30-f712-4394-aebc-75976070e91f} . Note that the life-cycle information in this log corresponds to method call (start) and return (complete), and captures a method-call hierarchy

    Apache Commons Crypto 1.0.0 - Stream CbcNopad Unit Test Software Event Log

    No full text
    Extensible Event Stream (XES) software event log obtained through instrumenting the Apache Commons Crypto 1.0.0 using the tool available at new windowhttps://svn.win.tue.nl/repos/prom/XPort/. This event log contains method-call level events describing a single run of the Stream CbcNopad unit test suite for the Apache Commons Crypto 1.0.0 library available and documented at new windowhttp://commons.apache.org/proper/commons-crypto/. Note that the life-cycle information in this log corresponds to method call (start) and return (complete), and captures a method-call hierarchy. We attached a slightly preprocessed variant of this event log, where the execution of each unit test method is represented as a separate trace

    Hierarchical process mining for scalable software analysis

    Get PDF
    Analyzing Software Based on Real Execution Dat

    XES Software Event Extension

    Get PDF
    During the execution of software, execution data can be recorded. With the development of process mining techniques on the one hand, and the growing availability of software execution data on the other hand, a new form of software analytics comes into reach. That is, applying process mining techniques to analyze software execution data. To enable process mining for software, event logs should be capable of capturing software-specific data.\u3cbr/\u3eA software event log is typically recorded at the method call level during software execution. Events generated at this level reference a specific point in the software source code. The Software Event extension captures this event location information, together with some basic runtime information related to this location

    XES Software Telemetry Extension

    Get PDF
    During the execution of software, execution data can be recorded. With the development of process mining techniques on the one hand, and the growing availability of software execution data on the other hand, a new form of software analytics comes into reach. That is, applying process mining techniques to analyze software execution data. To enable process mining for software, event logs should be capable of capturing software-specific data.\u3cbr/\u3eWhen analyzing the performance of software applications, not only timing,\u3cbr/\u3ebut also resource utilization is of importance. The Software Telemetry\u3cbr/\u3eextension supports the recording of basic performance profile related resource utilizations commonly used in many software profiler tools. The resource utilizations covered in this extension are: CPU usage, thread usage and memory usage

    NASA Crew Exploration Vehicle (CEV) Software Event Log

    No full text
    Extensible Event Stream (XES) software event log obtained through instrumenting the NASA CEV class using the tool available at new windowhttps://svn.win.tue.nl/repos/prom/XPort/. This event log contains method-call level events describing a single run of an exhaustive unit test suite for the Crew Exploration Vehicle (CEV) example available and documented at new windowhttp://babelfish.arc.nasa.gov/trac/jpf/wiki/projects/jpf-statechart (trac) new windowhttp://babelfish.arc.nasa.gov/hg/jpf/jpf-statechart (mercurial repository). Note that the life-cycle information in this log corresponds to method call (start) and return (complete), and captures a method-call hierarchy. We attached a slightly preprocessed variant of this event log, where the execution of each unit test method is represented as a separate trace

    Process mining in software systems:discovering real-life business transactions and process models from distributed systems

    No full text
    \u3cp\u3eThis paper presents a novel reverse engineering technique for obtaining real-life event logs from distributed systems. This allows us to analyze the operational processes of software systems under real-life conditions, and use process mining techniques to obtain precise and formal models. Hence, the work can be positioned in-between reverse engineering and process mining. We present a formal definition, implementation and an instrumentation strategy based the joinpoint-pointcut model. Two case studies are used to evaluate our approach. These concrete examples demonstrate the feasibility and usefulness of our approach.\u3c/p\u3

    Modeling and discovering cancelation behavior

    No full text
    \u3cp\u3eThis paper presents a novel extension to the process tree model to support cancelation behavior, and proposes a novel process discovery technique to discover sound, fitting models with cancelation features. The proposed discovery technique relies on a generic error oracle function, and allows us to discover complex combinations of multiple, possibly nested cancelation regions based on observed behavior. An implementation of the proposed approach is available as a ProM plugin. Experimental results based on real-life event logs demonstrate the feasibility and usefulness of the approach.\u3c/p\u3

    Recursion aware modeling and discovery for hierarchical software event log analysis

    No full text
    This paper presents 1) a novel hierarchy and recursion extension to the process tree model; and 2) the first, recursion aware process model discovery technique that leverages hierarchical information in event logs, typically available for software systems. This technique allows us to analyze the operational processes of software systems under real-life conditions at multiple levels of granularity. The work can be positioned in-between reverse engineering and process mining. An implementation of the proposed approach is available as a ProM plugin. Experimental results based on real-life (software) event logs demonstrate the feasibility and usefulness of the approach and show the huge potential to speed up discovery by exploiting the available hierarchy
    corecore