Deriving protocol models from imperfect service conversation logs

Hamid R. Motahari-Nezhad, Régis Saint-Paul, Boualem Benatallah, Fabio Casati

Research output: Contribution to journalArticle

32 Citations (Scopus)

Abstract

Understanding the business (interaction) protocol supported by a service is very important for both clients and service providers: It allows developers to know how to write clients that interact with a service, and it allows development tools and runtime middleware to deliver functionalities that simplifies the service development life cycle. It also greatly facilitates the monitoring, visualization, and aggregation of interaction data. This paper presents an approach for discovering protocol models from real-world service interaction logs. It presents a novel discovery algorithm, which is widely applicable, robust to different kinds of imperfections often present in real-world service logs, and able to derive protocols of small sizes targeted for human understanding. As inferring the most precise and concise model is not always possible from imperfect service logs using purely automated method, the paper presents a novel method for user-driven refinement of the discovered protocol models. The proposed approach has been implemented and experimental results show its viability on both synthetic and real-world data sets.

Original languageEnglish
Article number4515865
Pages (from-to)1683-1698
Number of pages16
JournalIEEE Transactions on Knowledge and Data Engineering
Volume20
Issue number12
DOIs
Publication statusPublished - Dec 2008
Externally publishedYes

Fingerprint

Network protocols
Middleware
Life cycle
Agglomeration
Visualization
Defects
Monitoring
Industry

Keywords

  • Business protocols
  • Noise handling in service logs
  • Protocol discovery
  • Protocol refinement
  • Web services

ASJC Scopus subject areas

  • Information Systems
  • Computer Science Applications
  • Computational Theory and Mathematics

Cite this

Deriving protocol models from imperfect service conversation logs. / Motahari-Nezhad, Hamid R.; Saint-Paul, Régis; Benatallah, Boualem; Casati, Fabio.

In: IEEE Transactions on Knowledge and Data Engineering, Vol. 20, No. 12, 4515865, 12.2008, p. 1683-1698.

Research output: Contribution to journalArticle

Motahari-Nezhad, Hamid R. ; Saint-Paul, Régis ; Benatallah, Boualem ; Casati, Fabio. / Deriving protocol models from imperfect service conversation logs. In: IEEE Transactions on Knowledge and Data Engineering. 2008 ; Vol. 20, No. 12. pp. 1683-1698.
@article{ffb74e42f4ca4741b8d69685780f9afb,
title = "Deriving protocol models from imperfect service conversation logs",
abstract = "Understanding the business (interaction) protocol supported by a service is very important for both clients and service providers: It allows developers to know how to write clients that interact with a service, and it allows development tools and runtime middleware to deliver functionalities that simplifies the service development life cycle. It also greatly facilitates the monitoring, visualization, and aggregation of interaction data. This paper presents an approach for discovering protocol models from real-world service interaction logs. It presents a novel discovery algorithm, which is widely applicable, robust to different kinds of imperfections often present in real-world service logs, and able to derive protocols of small sizes targeted for human understanding. As inferring the most precise and concise model is not always possible from imperfect service logs using purely automated method, the paper presents a novel method for user-driven refinement of the discovered protocol models. The proposed approach has been implemented and experimental results show its viability on both synthetic and real-world data sets.",
keywords = "Business protocols, Noise handling in service logs, Protocol discovery, Protocol refinement, Web services",
author = "Motahari-Nezhad, {Hamid R.} and R{\'e}gis Saint-Paul and Boualem Benatallah and Fabio Casati",
year = "2008",
month = "12",
doi = "10.1109/TKDE.2008.87",
language = "English",
volume = "20",
pages = "1683--1698",
journal = "IEEE Transactions on Knowledge and Data Engineering",
issn = "1041-4347",
publisher = "IEEE Computer Society",
number = "12",

}

TY - JOUR

T1 - Deriving protocol models from imperfect service conversation logs

AU - Motahari-Nezhad, Hamid R.

AU - Saint-Paul, Régis

AU - Benatallah, Boualem

AU - Casati, Fabio

PY - 2008/12

Y1 - 2008/12

N2 - Understanding the business (interaction) protocol supported by a service is very important for both clients and service providers: It allows developers to know how to write clients that interact with a service, and it allows development tools and runtime middleware to deliver functionalities that simplifies the service development life cycle. It also greatly facilitates the monitoring, visualization, and aggregation of interaction data. This paper presents an approach for discovering protocol models from real-world service interaction logs. It presents a novel discovery algorithm, which is widely applicable, robust to different kinds of imperfections often present in real-world service logs, and able to derive protocols of small sizes targeted for human understanding. As inferring the most precise and concise model is not always possible from imperfect service logs using purely automated method, the paper presents a novel method for user-driven refinement of the discovered protocol models. The proposed approach has been implemented and experimental results show its viability on both synthetic and real-world data sets.

AB - Understanding the business (interaction) protocol supported by a service is very important for both clients and service providers: It allows developers to know how to write clients that interact with a service, and it allows development tools and runtime middleware to deliver functionalities that simplifies the service development life cycle. It also greatly facilitates the monitoring, visualization, and aggregation of interaction data. This paper presents an approach for discovering protocol models from real-world service interaction logs. It presents a novel discovery algorithm, which is widely applicable, robust to different kinds of imperfections often present in real-world service logs, and able to derive protocols of small sizes targeted for human understanding. As inferring the most precise and concise model is not always possible from imperfect service logs using purely automated method, the paper presents a novel method for user-driven refinement of the discovered protocol models. The proposed approach has been implemented and experimental results show its viability on both synthetic and real-world data sets.

KW - Business protocols

KW - Noise handling in service logs

KW - Protocol discovery

KW - Protocol refinement

KW - Web services

UR - http://www.scopus.com/inward/record.url?scp=55949101707&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=55949101707&partnerID=8YFLogxK

U2 - 10.1109/TKDE.2008.87

DO - 10.1109/TKDE.2008.87

M3 - Article

VL - 20

SP - 1683

EP - 1698

JO - IEEE Transactions on Knowledge and Data Engineering

JF - IEEE Transactions on Knowledge and Data Engineering

SN - 1041-4347

IS - 12

M1 - 4515865

ER -