SlideShare a Scribd company logo
Exploiting Knowledge on Past Process
 Execution to Improve SBA Analysis

   Mining Lifecycle Event Logs for
          Enhancing SBAs


       ISTI-CNR (CNR), TU Wien (TUW)


 Franco Maria Nardini, Gabriele Tolomei, CNR
Learning Package Categorization


                          S-Cube	




              Monitoring and Analysis of SBA	





                      Process Mining	




           Exploiting Knowledge on Past Process	

            Execution to Improve SBA Analysis
Connections to the S-Cube IRF


     Conceptual Research Framework:
      –  Service Composition and Coordination
      –  Service Infrastructure
      –  Adaptation and Monitoring

     Logical Run-Time Architecture:
      –  Monitoring Engine
      –  Adaptation Engine
      –  Negotiation Engine
      –  Runtime QA Engine
      –  Resource Broker



                                     3
Overview



  Introduction
  Goal
  Methodology
  Experiments
  Conclusions
SBA Event Logs


   Most complex software systems collect their lifecycle
    usage data in event log files
   SBA event logs contain several information about service
    components exchanging messages
   –  e.g., service invocation, service failure, registry querying, etc.

   Event logs represent a huge source of “hidden” information
    (i.e., knowledge)




                                     5
Mining SBA Event Logs


     Data Mining algorithms and techniques allow extracting
      valuable knowledge from event logs
     Extracted knowledge may refer to several aspects:
     –  e.g., service usage patterns, service failure patterns, etc.

     If properly exploited, such knowledge might help
      improving the overall quality of the system:
     –  recommending frequent invoked services;
     –  avoiding/handling anomalous situations, etc.




                                     6
Process Mining (PM)


     Process Mining (PM) is an application of data mining
      techniques to SBA event logs
     PM aims at discovering structured process models
      derived from patterns that are present in actual traces
      of service executions
     Each process is usually represented by a digraph and
      the problem of PM has been modeled as:
     –  finite state machine [CW96]
     –  sequential pattern mining (SPM) [AGL98]
     –  Petri-net [vdAWM04]



                                  7
Another Example: Web Search Engines

     Web Search Engines (WSEs) are another example of
      systems that benefit from mining their event log data (i.e.,
      Query Logs)
     Query Log Mining (QLM) has proven to be effective for
      enhancing the overall performances of WSEs
     We propose a QLM technique for identifying search
      patterns (tasks) from the stream of queries recorded in
      query logs [LOPST11]




                                 8
Overview



  Introduction
    Goal
  Methodology
  Experiments
  Conclusions
Goal


    Treat PM as an instance of the SPM problem
    Detect frequent sequential patterns of service
     invocation, i.e., services that are frequently co-invoked
     within the same sequence
       –  e.g., service Y is usually invoked afterwards service X

    Find which/how services are actually used
       –  service recommendation
       –  avoiding/handling anomalous situations




                                     10
Overview



  Introduction
  Goal
    Methodology
  Experiments
  Conclusions
Sequential Pattern Mining


   Event log might be viewed as sequences of events that
    change with time (time-series)
   We are interested in finding sequences of services that are
    frequently invoked in a specific order, i.e., sequential patterns
   Sequential Pattern Mining (SPM) is the process of extracting
    sequential patterns whose support exceeds a predefined
    minimal support threshold min_supp




                                 12
PrefixSpan


   One of the most efficient algorithm for finding sequential
    patterns [PHMP01]
   Mines the complete set of patterns but greatly reduces the
    efforts of candidate subsequence generation
   Takes only into account the chronological order between
    events
      -  i.e., it only cares if X comes before Y without worrying about the
         actual time interval




                                     13
MiSTA


     Hint: observing that two services are invoked really
      close rather than far away to each other in a sequence
      could lead to distinct conclusions
     MiSTA [GNPP06] is able to deal with the actual time
      interval between any two consecutive service
      invocations
     It needs a time threshold tau for specifying the
      maximum time interval of events in a frequent
      sequence




                              14
Overview



  Introduction
  Goal
  Methodology
    Experiments
  Conclusions
Data Set: VRESCo


    VRESCo is the runtime environment for Service-oriented
     Computing developed by VITALab@TUW
    It collects usage data (i.e., events) in the form of XML log
     file
    VRESCo event log file contains information about: invoked
     services, service rebinding, service failure, etc.
    We only focus on service invocation events




                                 16
PrefixSpan: min_supp=25%




                           17
PrefixSpan: min_supp=50%




                           18
PrefixSpan: min_supp=66%




                           19
MiSTA: min_supp=32%, tau=5sec.




                        20
MiSTA: min_supp=32%, tau=60sec.




                        21
MiSTA: min_supp=32%, tau=300sec.




                        22
Results


    The service logs coming from the VRESCo runtime
     environment contain frequent patterns of services;
    Those patters contains information about: invoked services,
     service rebinding, service failure, etc;
    Those patterns could be collected by considering co-
     occurring sequences and also by considering the time;
    Such inferred knowledge can be used to enhance SBAs:
     e.g., by means of novel design tools like service
     recommendation.




                               23
Overview



  Introduction
  Goal
  Methodology
  Experiments
    Conclusions
Conclusions

   Event logs collected by complex software systems
    represent a huge source of information (knowledge)
   Find sequences of frequently co-invoked services from
    SBA event logs using Sequential Pattern Mining (SPM)
   2 SPM algorithms run on top of a real-world SBA event log
    (VRESCo): PrefixSpan, MiSTA
   Experimental results show that some services are often
    invoked together in a frequent sequence
   Exploit such inferred knowledge to enhance SBAs: e.g., by
    means of novel design tools like service recommendation
References

  –  [CW96] J. E. Cook and A. L. Wolf, “Discovering models of software processes
     from event-based data”. Research Report Technical Report CUCS-819-96,
     Computer Science Dept., Univ. of Colorado, 1996.
  –  [AGL98] R. Agrawal, D. Gunopulos, and F. Leymann, “Mining Process Models
     from Workflow Logs”. In Sixth International Conference on Extending Database
     Technology, pp. 469–483, 1998
  –  [vdAWM04] W. van der Aalst, T. Weijters, and L. Maruster, “Workflow Mining:
     Discovering Process Models from Event Logs”. IEEE Transactions on
     Knowledge and Data Engineering, vol. 16, no. 9, pp. 1128–1142, Sep. 2004.
  –  [LOPST11] C. Lucchese, S. Orlando, R. Perego, F. Silvestri, and G. Tolomei,
     “Identifying task-based sessions in search engine query logs”, in WSDM ’11.
     ACM, 2011, pp. 277–286.
  –  [PHMP01] J. Pei, J. Han, B. Mortazavi-Asl, and H. Pinto, “Prefixspan: Mining
     sequential patterns efficiently by prefix-projected pattern growth,” in ICDE ’01.
     IEEE, 2001
  –  [GNPP06] F. Giannotti, M. Nanni, D. Pedreschi, and F. Pinelli, “Mining
     sequences with temporal annotations,” in SAC ’06. ACM, 2006, pp. 593–597.

More Related Content

Similar to S-CUBE LP: Mining Lifecycle Event Logs for Enhancing SBAs

S-CUBE LP: Indentify User Tasks from Past Usage Logs
S-CUBE LP: Indentify User Tasks from Past Usage LogsS-CUBE LP: Indentify User Tasks from Past Usage Logs
S-CUBE LP: Indentify User Tasks from Past Usage Logs
virtual-campus
 
Intelligent Monitoring
Intelligent MonitoringIntelligent Monitoring
Intelligent Monitoring
Intelie
 
iiwas2009
iiwas2009iiwas2009
iiwas2009
steccami
 
ML on Big Data: Real-Time Analysis on Time Series
ML on Big Data: Real-Time Analysis on Time SeriesML on Big Data: Real-Time Analysis on Time Series
ML on Big Data: Real-Time Analysis on Time Series
Sigmoid
 
Smart E-Logistics for SCM Spend Analysis
Smart E-Logistics for SCM Spend AnalysisSmart E-Logistics for SCM Spend Analysis
Smart E-Logistics for SCM Spend Analysis
IRJET Journal
 
Business Process Analytics: From Insights to Predictions
Business Process Analytics: From Insights to PredictionsBusiness Process Analytics: From Insights to Predictions
Business Process Analytics: From Insights to Predictions
Marlon Dumas
 
IRJET- Enhance Dynamic Heterogeneous Shortest Job first (DHSJF): A Task Schedu...
IRJET- Enhance Dynamic Heterogeneous Shortest Job first (DHSJF): A Task Schedu...IRJET- Enhance Dynamic Heterogeneous Shortest Job first (DHSJF): A Task Schedu...
IRJET- Enhance Dynamic Heterogeneous Shortest Job first (DHSJF): A Task Schedu...
IRJET Journal
 
Time Series Analysis… using an Event Streaming Platform
Time Series Analysis… using an Event Streaming PlatformTime Series Analysis… using an Event Streaming Platform
Time Series Analysis… using an Event Streaming Platform
confluent
 
Time Series Analysis Using an Event Streaming Platform
 Time Series Analysis Using an Event Streaming Platform Time Series Analysis Using an Event Streaming Platform
Time Series Analysis Using an Event Streaming Platform
Dr. Mirko Kämpf
 
Solving big data challenges for enterprise application
Solving big data challenges for enterprise applicationSolving big data challenges for enterprise application
Solving big data challenges for enterprise application
Trieu Dao Minh
 
Capacity and Demand Management
Capacity and Demand ManagementCapacity and Demand Management
Capacity and Demand Management
Vishwanath Ramdas
 
Two Different Approaches for NGOSS Process Modeling and Simulation
Two Different Approaches for NGOSS Process Modeling and SimulationTwo Different Approaches for NGOSS Process Modeling and Simulation
Two Different Approaches for NGOSS Process Modeling and Simulation
IDES Editor
 
Microsoft SQL Server - StreamInsight Overview Presentation
Microsoft SQL Server - StreamInsight Overview PresentationMicrosoft SQL Server - StreamInsight Overview Presentation
Microsoft SQL Server - StreamInsight Overview Presentation
Microsoft Private Cloud
 
Observability foundations in dynamically evolving architectures
Observability foundations in dynamically evolving architecturesObservability foundations in dynamically evolving architectures
Observability foundations in dynamically evolving architectures
Boyan Dimitrov
 
Scheduling of Heterogeneous Tasks in Cloud Computing using Multi Queue (MQ) A...
Scheduling of Heterogeneous Tasks in Cloud Computing using Multi Queue (MQ) A...Scheduling of Heterogeneous Tasks in Cloud Computing using Multi Queue (MQ) A...
Scheduling of Heterogeneous Tasks in Cloud Computing using Multi Queue (MQ) A...
IRJET Journal
 
Workload-Aware Data Management in Shared-Nothing Distributed OLTP Databases
Workload-Aware Data Management in Shared-Nothing Distributed OLTP DatabasesWorkload-Aware Data Management in Shared-Nothing Distributed OLTP Databases
Workload-Aware Data Management in Shared-Nothing Distributed OLTP Databases
Joarder Kamal
 
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and RSvm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
IRJET Journal
 
Mastering SAP Monitoring - Workload Monitoring
Mastering SAP Monitoring - Workload MonitoringMastering SAP Monitoring - Workload Monitoring
Mastering SAP Monitoring - Workload Monitoring
Linh Nguyen
 
A Novel Framework on Web Usage Mining
A Novel Framework on Web Usage MiningA Novel Framework on Web Usage Mining
A Novel Framework on Web Usage Mining
IRJET Journal
 
An Integrated Framework on Mining Logs Files for Computing System Management
An Integrated Framework on Mining Logs Files for Computing System ManagementAn Integrated Framework on Mining Logs Files for Computing System Management
An Integrated Framework on Mining Logs Files for Computing System Management
feiwin
 

Similar to S-CUBE LP: Mining Lifecycle Event Logs for Enhancing SBAs (20)

S-CUBE LP: Indentify User Tasks from Past Usage Logs
S-CUBE LP: Indentify User Tasks from Past Usage LogsS-CUBE LP: Indentify User Tasks from Past Usage Logs
S-CUBE LP: Indentify User Tasks from Past Usage Logs
 
Intelligent Monitoring
Intelligent MonitoringIntelligent Monitoring
Intelligent Monitoring
 
iiwas2009
iiwas2009iiwas2009
iiwas2009
 
ML on Big Data: Real-Time Analysis on Time Series
ML on Big Data: Real-Time Analysis on Time SeriesML on Big Data: Real-Time Analysis on Time Series
ML on Big Data: Real-Time Analysis on Time Series
 
Smart E-Logistics for SCM Spend Analysis
Smart E-Logistics for SCM Spend AnalysisSmart E-Logistics for SCM Spend Analysis
Smart E-Logistics for SCM Spend Analysis
 
Business Process Analytics: From Insights to Predictions
Business Process Analytics: From Insights to PredictionsBusiness Process Analytics: From Insights to Predictions
Business Process Analytics: From Insights to Predictions
 
IRJET- Enhance Dynamic Heterogeneous Shortest Job first (DHSJF): A Task Schedu...
IRJET- Enhance Dynamic Heterogeneous Shortest Job first (DHSJF): A Task Schedu...IRJET- Enhance Dynamic Heterogeneous Shortest Job first (DHSJF): A Task Schedu...
IRJET- Enhance Dynamic Heterogeneous Shortest Job first (DHSJF): A Task Schedu...
 
Time Series Analysis… using an Event Streaming Platform
Time Series Analysis… using an Event Streaming PlatformTime Series Analysis… using an Event Streaming Platform
Time Series Analysis… using an Event Streaming Platform
 
Time Series Analysis Using an Event Streaming Platform
 Time Series Analysis Using an Event Streaming Platform Time Series Analysis Using an Event Streaming Platform
Time Series Analysis Using an Event Streaming Platform
 
Solving big data challenges for enterprise application
Solving big data challenges for enterprise applicationSolving big data challenges for enterprise application
Solving big data challenges for enterprise application
 
Capacity and Demand Management
Capacity and Demand ManagementCapacity and Demand Management
Capacity and Demand Management
 
Two Different Approaches for NGOSS Process Modeling and Simulation
Two Different Approaches for NGOSS Process Modeling and SimulationTwo Different Approaches for NGOSS Process Modeling and Simulation
Two Different Approaches for NGOSS Process Modeling and Simulation
 
Microsoft SQL Server - StreamInsight Overview Presentation
Microsoft SQL Server - StreamInsight Overview PresentationMicrosoft SQL Server - StreamInsight Overview Presentation
Microsoft SQL Server - StreamInsight Overview Presentation
 
Observability foundations in dynamically evolving architectures
Observability foundations in dynamically evolving architecturesObservability foundations in dynamically evolving architectures
Observability foundations in dynamically evolving architectures
 
Scheduling of Heterogeneous Tasks in Cloud Computing using Multi Queue (MQ) A...
Scheduling of Heterogeneous Tasks in Cloud Computing using Multi Queue (MQ) A...Scheduling of Heterogeneous Tasks in Cloud Computing using Multi Queue (MQ) A...
Scheduling of Heterogeneous Tasks in Cloud Computing using Multi Queue (MQ) A...
 
Workload-Aware Data Management in Shared-Nothing Distributed OLTP Databases
Workload-Aware Data Management in Shared-Nothing Distributed OLTP DatabasesWorkload-Aware Data Management in Shared-Nothing Distributed OLTP Databases
Workload-Aware Data Management in Shared-Nothing Distributed OLTP Databases
 
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and RSvm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
 
Mastering SAP Monitoring - Workload Monitoring
Mastering SAP Monitoring - Workload MonitoringMastering SAP Monitoring - Workload Monitoring
Mastering SAP Monitoring - Workload Monitoring
 
A Novel Framework on Web Usage Mining
A Novel Framework on Web Usage MiningA Novel Framework on Web Usage Mining
A Novel Framework on Web Usage Mining
 
An Integrated Framework on Mining Logs Files for Computing System Management
An Integrated Framework on Mining Logs Files for Computing System ManagementAn Integrated Framework on Mining Logs Files for Computing System Management
An Integrated Framework on Mining Logs Files for Computing System Management
 

More from virtual-campus

S-CUBE LP: Analysis Operations on SLAs: Detecting and Explaining Conflicting ...
S-CUBE LP: Analysis Operations on SLAs: Detecting and Explaining Conflicting ...S-CUBE LP: Analysis Operations on SLAs: Detecting and Explaining Conflicting ...
S-CUBE LP: Analysis Operations on SLAs: Detecting and Explaining Conflicting ...
virtual-campus
 
S-CUBE LP: Chemical Modeling: Workflow Enactment based on the Chemical Metaphor
S-CUBE LP: Chemical Modeling: Workflow Enactment based on the Chemical MetaphorS-CUBE LP: Chemical Modeling: Workflow Enactment based on the Chemical Metaphor
S-CUBE LP: Chemical Modeling: Workflow Enactment based on the Chemical Metaphor
virtual-campus
 
S-CUBE LP: Quality of Service-Aware Service Composition: QoS optimization in ...
S-CUBE LP: Quality of Service-Aware Service Composition: QoS optimization in ...S-CUBE LP: Quality of Service-Aware Service Composition: QoS optimization in ...
S-CUBE LP: Quality of Service-Aware Service Composition: QoS optimization in ...
virtual-campus
 
S-CUBE LP: The Chemical Computing model and HOCL Programming
S-CUBE LP: The Chemical Computing model and HOCL ProgrammingS-CUBE LP: The Chemical Computing model and HOCL Programming
S-CUBE LP: The Chemical Computing model and HOCL Programming
virtual-campus
 
S-CUBE LP: Executing the HOCL: Concept of a Chemical Interpreter
S-CUBE LP: Executing the HOCL: Concept of a Chemical InterpreterS-CUBE LP: Executing the HOCL: Concept of a Chemical Interpreter
S-CUBE LP: Executing the HOCL: Concept of a Chemical Interpreter
virtual-campus
 
S-CUBE LP: SLA-based Service Virtualization in distributed, heterogenious env...
S-CUBE LP: SLA-based Service Virtualization in distributed, heterogenious env...S-CUBE LP: SLA-based Service Virtualization in distributed, heterogenious env...
S-CUBE LP: SLA-based Service Virtualization in distributed, heterogenious env...
virtual-campus
 
S-CUBE LP: Impact of SBA design on Global Software Development
S-CUBE LP: Impact of SBA design on Global Software DevelopmentS-CUBE LP: Impact of SBA design on Global Software Development
S-CUBE LP: Impact of SBA design on Global Software Development
virtual-campus
 
S-CUBE LP: Self-healing in Mixed Service-oriented Systems
S-CUBE LP: Self-healing in Mixed Service-oriented SystemsS-CUBE LP: Self-healing in Mixed Service-oriented Systems
S-CUBE LP: Self-healing in Mixed Service-oriented Systems
virtual-campus
 
S-CUBE LP: Analyzing and Adapting Business Processes based on Ecologically-aw...
S-CUBE LP: Analyzing and Adapting Business Processes based on Ecologically-aw...S-CUBE LP: Analyzing and Adapting Business Processes based on Ecologically-aw...
S-CUBE LP: Analyzing and Adapting Business Processes based on Ecologically-aw...
virtual-campus
 
S-CUBE LP: Preventing SLA Violations in Service Compositions Using Aspect-Bas...
S-CUBE LP: Preventing SLA Violations in Service Compositions Using Aspect-Bas...S-CUBE LP: Preventing SLA Violations in Service Compositions Using Aspect-Bas...
S-CUBE LP: Preventing SLA Violations in Service Compositions Using Aspect-Bas...
virtual-campus
 
S-CUBE LP: Analyzing Business Process Performance Using KPI Dependency Analysis
S-CUBE LP: Analyzing Business Process Performance Using KPI Dependency AnalysisS-CUBE LP: Analyzing Business Process Performance Using KPI Dependency Analysis
S-CUBE LP: Analyzing Business Process Performance Using KPI Dependency Analysis
virtual-campus
 
S-CUBE LP: Process Performance Monitoring in Service Compositions
S-CUBE LP: Process Performance Monitoring in Service CompositionsS-CUBE LP: Process Performance Monitoring in Service Compositions
S-CUBE LP: Process Performance Monitoring in Service Compositions
virtual-campus
 
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
virtual-campus
 
S-CUBE LP: Runtime Prediction of SLA Violations Based on Service Event Logs
S-CUBE LP: Runtime Prediction of SLA Violations Based on Service Event LogsS-CUBE LP: Runtime Prediction of SLA Violations Based on Service Event Logs
S-CUBE LP: Runtime Prediction of SLA Violations Based on Service Event Logs
virtual-campus
 
S-CUBE LP: Proactive SLA Negotiation
S-CUBE LP: Proactive SLA NegotiationS-CUBE LP: Proactive SLA Negotiation
S-CUBE LP: Proactive SLA Negotiation
virtual-campus
 
S-CUBE LP: A Soft-Constraint Based Approach to QoS-Aware Service Selection
S-CUBE LP: A Soft-Constraint Based Approach to QoS-Aware Service SelectionS-CUBE LP: A Soft-Constraint Based Approach to QoS-Aware Service Selection
S-CUBE LP: A Soft-Constraint Based Approach to QoS-Aware Service Selection
virtual-campus
 
S-CUBE LP: Variability Modeling and QoS Analysis of Web Services Orchestrations
S-CUBE LP: Variability Modeling and QoS Analysis of Web Services OrchestrationsS-CUBE LP: Variability Modeling and QoS Analysis of Web Services Orchestrations
S-CUBE LP: Variability Modeling and QoS Analysis of Web Services Orchestrations
virtual-campus
 
S-CUBE LP: Run-time Verification for Preventive Adaptation
S-CUBE LP: Run-time Verification for Preventive AdaptationS-CUBE LP: Run-time Verification for Preventive Adaptation
S-CUBE LP: Run-time Verification for Preventive Adaptation
virtual-campus
 
S-CUBE LP: Using Data Properties in Quality Prediction
S-CUBE LP: Using Data Properties in Quality PredictionS-CUBE LP: Using Data Properties in Quality Prediction
S-CUBE LP: Using Data Properties in Quality Prediction
virtual-campus
 
S-CUBE LP: Dynamic Privacy Model for Web Service
S-CUBE LP: Dynamic Privacy Model for Web ServiceS-CUBE LP: Dynamic Privacy Model for Web Service
S-CUBE LP: Dynamic Privacy Model for Web Service
virtual-campus
 

More from virtual-campus (20)

S-CUBE LP: Analysis Operations on SLAs: Detecting and Explaining Conflicting ...
S-CUBE LP: Analysis Operations on SLAs: Detecting and Explaining Conflicting ...S-CUBE LP: Analysis Operations on SLAs: Detecting and Explaining Conflicting ...
S-CUBE LP: Analysis Operations on SLAs: Detecting and Explaining Conflicting ...
 
S-CUBE LP: Chemical Modeling: Workflow Enactment based on the Chemical Metaphor
S-CUBE LP: Chemical Modeling: Workflow Enactment based on the Chemical MetaphorS-CUBE LP: Chemical Modeling: Workflow Enactment based on the Chemical Metaphor
S-CUBE LP: Chemical Modeling: Workflow Enactment based on the Chemical Metaphor
 
S-CUBE LP: Quality of Service-Aware Service Composition: QoS optimization in ...
S-CUBE LP: Quality of Service-Aware Service Composition: QoS optimization in ...S-CUBE LP: Quality of Service-Aware Service Composition: QoS optimization in ...
S-CUBE LP: Quality of Service-Aware Service Composition: QoS optimization in ...
 
S-CUBE LP: The Chemical Computing model and HOCL Programming
S-CUBE LP: The Chemical Computing model and HOCL ProgrammingS-CUBE LP: The Chemical Computing model and HOCL Programming
S-CUBE LP: The Chemical Computing model and HOCL Programming
 
S-CUBE LP: Executing the HOCL: Concept of a Chemical Interpreter
S-CUBE LP: Executing the HOCL: Concept of a Chemical InterpreterS-CUBE LP: Executing the HOCL: Concept of a Chemical Interpreter
S-CUBE LP: Executing the HOCL: Concept of a Chemical Interpreter
 
S-CUBE LP: SLA-based Service Virtualization in distributed, heterogenious env...
S-CUBE LP: SLA-based Service Virtualization in distributed, heterogenious env...S-CUBE LP: SLA-based Service Virtualization in distributed, heterogenious env...
S-CUBE LP: SLA-based Service Virtualization in distributed, heterogenious env...
 
S-CUBE LP: Impact of SBA design on Global Software Development
S-CUBE LP: Impact of SBA design on Global Software DevelopmentS-CUBE LP: Impact of SBA design on Global Software Development
S-CUBE LP: Impact of SBA design on Global Software Development
 
S-CUBE LP: Self-healing in Mixed Service-oriented Systems
S-CUBE LP: Self-healing in Mixed Service-oriented SystemsS-CUBE LP: Self-healing in Mixed Service-oriented Systems
S-CUBE LP: Self-healing in Mixed Service-oriented Systems
 
S-CUBE LP: Analyzing and Adapting Business Processes based on Ecologically-aw...
S-CUBE LP: Analyzing and Adapting Business Processes based on Ecologically-aw...S-CUBE LP: Analyzing and Adapting Business Processes based on Ecologically-aw...
S-CUBE LP: Analyzing and Adapting Business Processes based on Ecologically-aw...
 
S-CUBE LP: Preventing SLA Violations in Service Compositions Using Aspect-Bas...
S-CUBE LP: Preventing SLA Violations in Service Compositions Using Aspect-Bas...S-CUBE LP: Preventing SLA Violations in Service Compositions Using Aspect-Bas...
S-CUBE LP: Preventing SLA Violations in Service Compositions Using Aspect-Bas...
 
S-CUBE LP: Analyzing Business Process Performance Using KPI Dependency Analysis
S-CUBE LP: Analyzing Business Process Performance Using KPI Dependency AnalysisS-CUBE LP: Analyzing Business Process Performance Using KPI Dependency Analysis
S-CUBE LP: Analyzing Business Process Performance Using KPI Dependency Analysis
 
S-CUBE LP: Process Performance Monitoring in Service Compositions
S-CUBE LP: Process Performance Monitoring in Service CompositionsS-CUBE LP: Process Performance Monitoring in Service Compositions
S-CUBE LP: Process Performance Monitoring in Service Compositions
 
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
 
S-CUBE LP: Runtime Prediction of SLA Violations Based on Service Event Logs
S-CUBE LP: Runtime Prediction of SLA Violations Based on Service Event LogsS-CUBE LP: Runtime Prediction of SLA Violations Based on Service Event Logs
S-CUBE LP: Runtime Prediction of SLA Violations Based on Service Event Logs
 
S-CUBE LP: Proactive SLA Negotiation
S-CUBE LP: Proactive SLA NegotiationS-CUBE LP: Proactive SLA Negotiation
S-CUBE LP: Proactive SLA Negotiation
 
S-CUBE LP: A Soft-Constraint Based Approach to QoS-Aware Service Selection
S-CUBE LP: A Soft-Constraint Based Approach to QoS-Aware Service SelectionS-CUBE LP: A Soft-Constraint Based Approach to QoS-Aware Service Selection
S-CUBE LP: A Soft-Constraint Based Approach to QoS-Aware Service Selection
 
S-CUBE LP: Variability Modeling and QoS Analysis of Web Services Orchestrations
S-CUBE LP: Variability Modeling and QoS Analysis of Web Services OrchestrationsS-CUBE LP: Variability Modeling and QoS Analysis of Web Services Orchestrations
S-CUBE LP: Variability Modeling and QoS Analysis of Web Services Orchestrations
 
S-CUBE LP: Run-time Verification for Preventive Adaptation
S-CUBE LP: Run-time Verification for Preventive AdaptationS-CUBE LP: Run-time Verification for Preventive Adaptation
S-CUBE LP: Run-time Verification for Preventive Adaptation
 
S-CUBE LP: Using Data Properties in Quality Prediction
S-CUBE LP: Using Data Properties in Quality PredictionS-CUBE LP: Using Data Properties in Quality Prediction
S-CUBE LP: Using Data Properties in Quality Prediction
 
S-CUBE LP: Dynamic Privacy Model for Web Service
S-CUBE LP: Dynamic Privacy Model for Web ServiceS-CUBE LP: Dynamic Privacy Model for Web Service
S-CUBE LP: Dynamic Privacy Model for Web Service
 

Recently uploaded

Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 

Recently uploaded (20)

Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 

S-CUBE LP: Mining Lifecycle Event Logs for Enhancing SBAs

  • 1. Exploiting Knowledge on Past Process Execution to Improve SBA Analysis Mining Lifecycle Event Logs for Enhancing SBAs ISTI-CNR (CNR), TU Wien (TUW) Franco Maria Nardini, Gabriele Tolomei, CNR
  • 2. Learning Package Categorization S-Cube Monitoring and Analysis of SBA Process Mining Exploiting Knowledge on Past Process Execution to Improve SBA Analysis
  • 3. Connections to the S-Cube IRF   Conceptual Research Framework: –  Service Composition and Coordination –  Service Infrastructure –  Adaptation and Monitoring   Logical Run-Time Architecture: –  Monitoring Engine –  Adaptation Engine –  Negotiation Engine –  Runtime QA Engine –  Resource Broker 3
  • 4. Overview   Introduction   Goal   Methodology   Experiments   Conclusions
  • 5. SBA Event Logs   Most complex software systems collect their lifecycle usage data in event log files   SBA event logs contain several information about service components exchanging messages –  e.g., service invocation, service failure, registry querying, etc.   Event logs represent a huge source of “hidden” information (i.e., knowledge) 5
  • 6. Mining SBA Event Logs   Data Mining algorithms and techniques allow extracting valuable knowledge from event logs   Extracted knowledge may refer to several aspects: –  e.g., service usage patterns, service failure patterns, etc.   If properly exploited, such knowledge might help improving the overall quality of the system: –  recommending frequent invoked services; –  avoiding/handling anomalous situations, etc. 6
  • 7. Process Mining (PM)   Process Mining (PM) is an application of data mining techniques to SBA event logs   PM aims at discovering structured process models derived from patterns that are present in actual traces of service executions   Each process is usually represented by a digraph and the problem of PM has been modeled as: –  finite state machine [CW96] –  sequential pattern mining (SPM) [AGL98] –  Petri-net [vdAWM04] 7
  • 8. Another Example: Web Search Engines   Web Search Engines (WSEs) are another example of systems that benefit from mining their event log data (i.e., Query Logs)   Query Log Mining (QLM) has proven to be effective for enhancing the overall performances of WSEs   We propose a QLM technique for identifying search patterns (tasks) from the stream of queries recorded in query logs [LOPST11] 8
  • 9. Overview   Introduction   Goal   Methodology   Experiments   Conclusions
  • 10. Goal   Treat PM as an instance of the SPM problem   Detect frequent sequential patterns of service invocation, i.e., services that are frequently co-invoked within the same sequence –  e.g., service Y is usually invoked afterwards service X   Find which/how services are actually used –  service recommendation –  avoiding/handling anomalous situations 10
  • 11. Overview   Introduction   Goal   Methodology   Experiments   Conclusions
  • 12. Sequential Pattern Mining   Event log might be viewed as sequences of events that change with time (time-series)   We are interested in finding sequences of services that are frequently invoked in a specific order, i.e., sequential patterns   Sequential Pattern Mining (SPM) is the process of extracting sequential patterns whose support exceeds a predefined minimal support threshold min_supp 12
  • 13. PrefixSpan   One of the most efficient algorithm for finding sequential patterns [PHMP01]   Mines the complete set of patterns but greatly reduces the efforts of candidate subsequence generation   Takes only into account the chronological order between events -  i.e., it only cares if X comes before Y without worrying about the actual time interval 13
  • 14. MiSTA   Hint: observing that two services are invoked really close rather than far away to each other in a sequence could lead to distinct conclusions   MiSTA [GNPP06] is able to deal with the actual time interval between any two consecutive service invocations   It needs a time threshold tau for specifying the maximum time interval of events in a frequent sequence 14
  • 15. Overview   Introduction   Goal   Methodology   Experiments   Conclusions
  • 16. Data Set: VRESCo   VRESCo is the runtime environment for Service-oriented Computing developed by VITALab@TUW   It collects usage data (i.e., events) in the form of XML log file   VRESCo event log file contains information about: invoked services, service rebinding, service failure, etc.   We only focus on service invocation events 16
  • 23. Results   The service logs coming from the VRESCo runtime environment contain frequent patterns of services;   Those patters contains information about: invoked services, service rebinding, service failure, etc;   Those patterns could be collected by considering co- occurring sequences and also by considering the time;   Such inferred knowledge can be used to enhance SBAs: e.g., by means of novel design tools like service recommendation. 23
  • 24. Overview   Introduction   Goal   Methodology   Experiments   Conclusions
  • 25. Conclusions   Event logs collected by complex software systems represent a huge source of information (knowledge)   Find sequences of frequently co-invoked services from SBA event logs using Sequential Pattern Mining (SPM)   2 SPM algorithms run on top of a real-world SBA event log (VRESCo): PrefixSpan, MiSTA   Experimental results show that some services are often invoked together in a frequent sequence   Exploit such inferred knowledge to enhance SBAs: e.g., by means of novel design tools like service recommendation
  • 26. References –  [CW96] J. E. Cook and A. L. Wolf, “Discovering models of software processes from event-based data”. Research Report Technical Report CUCS-819-96, Computer Science Dept., Univ. of Colorado, 1996. –  [AGL98] R. Agrawal, D. Gunopulos, and F. Leymann, “Mining Process Models from Workflow Logs”. In Sixth International Conference on Extending Database Technology, pp. 469–483, 1998 –  [vdAWM04] W. van der Aalst, T. Weijters, and L. Maruster, “Workflow Mining: Discovering Process Models from Event Logs”. IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 9, pp. 1128–1142, Sep. 2004. –  [LOPST11] C. Lucchese, S. Orlando, R. Perego, F. Silvestri, and G. Tolomei, “Identifying task-based sessions in search engine query logs”, in WSDM ’11. ACM, 2011, pp. 277–286. –  [PHMP01] J. Pei, J. Han, B. Mortazavi-Asl, and H. Pinto, “Prefixspan: Mining sequential patterns efficiently by prefix-projected pattern growth,” in ICDE ’01. IEEE, 2001 –  [GNPP06] F. Giannotti, M. Nanni, D. Pedreschi, and F. Pinelli, “Mining sequences with temporal annotations,” in SAC ’06. ACM, 2006, pp. 593–597.