Message correlation and web service protocol mining from inaccurate logs

Kreshnik Musaraj, Tetsuya Yoshida, Florian Daniel, Mohand Said Hacid, Fabio Casati, Boualem Benatallah

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Citations (Scopus)

Abstract

Business process management, service-oriented architectures and software back-engineering heavily rely on the fundamental processes of mining of processes and web service business protocols from log files. Model extraction and mining aim at the (re)discovery of the behavior of a running model implementation using solely its interaction and activity traces, and no a priori information on the target model. This paper presents an approach for correlating messages and extracting the business protocol of a web service in the realistic scenario in which correlation information is entirely absent from interaction and activity logs. Correlation is achieved through deterministic computations that result in an extremely efficient method whose extensive experiments have shown its solid reliability, robustness when dealing with complex structures, and very high performance and scalability. This approach and the underlying algorithms extend what is actually possible to achieve in the web service business protocol mining domain using incomplete and noisy data logs, and opens new horizons in back-engineering of web services. The theoretical and experimental results clearly show the leap forward achieved herein.

Original languageEnglish
Title of host publicationICWS 2010 - 2010 IEEE 8th International Conference on Web Services
Pages259-266
Number of pages8
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event2010 IEEE 8th International Conference on Web Services, ICWS 2010 - Miami, FL, United States
Duration: 5 Jul 201010 Jul 2010

Conference

Conference2010 IEEE 8th International Conference on Web Services, ICWS 2010
CountryUnited States
CityMiami, FL
Period5.7.1010.7.10

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software

Fingerprint Dive into the research topics of 'Message correlation and web service protocol mining from inaccurate logs'. Together they form a unique fingerprint.

Cite this