Message correlation and web service protocol mining from inaccurate logs

Kreshnik Musaraj, Tetsuya Yoshida, Florian Daniel, Mohand Said Hacid, Fabio Casati, Boualem Benatallah

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)

Abstract

Business process management, service-oriented architectures and software back-engineering heavily rely on the fundamental processes of mining of processes and web service business protocols from log files. Model extraction and mining aim at the (re)discovery of the behavior of a running model implementation using solely its interaction and activity traces, and no a priori information on the target model. This paper presents an approach for correlating messages and extracting the business protocol of a web service in the realistic scenario in which correlation information is entirely absent from interaction and activity logs. Correlation is achieved through deterministic computations that result in an extremely efficient method whose extensive experiments have shown its solid reliability, robustness when dealing with complex structures, and very high performance and scalability. This approach and the underlying algorithms extend what is actually possible to achieve in the web service business protocol mining domain using incomplete and noisy data logs, and opens new horizons in back-engineering of web services. The theoretical and experimental results clearly show the leap forward achieved herein.

Original languageEnglish
Title of host publicationICWS 2010 - 2010 IEEE 8th International Conference on Web Services
Pages259-266
Number of pages8
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event2010 IEEE 8th International Conference on Web Services, ICWS 2010 - Miami, FL, United States
Duration: 5 Jul 201010 Jul 2010

Conference

Conference2010 IEEE 8th International Conference on Web Services, ICWS 2010
CountryUnited States
CityMiami, FL
Period5.7.1010.7.10

Fingerprint

Web services
Network protocols
Industry
Service oriented architecture (SOA)
Scalability
Experiments

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software

Cite this

Musaraj, K., Yoshida, T., Daniel, F., Hacid, M. S., Casati, F., & Benatallah, B. (2010). Message correlation and web service protocol mining from inaccurate logs. In ICWS 2010 - 2010 IEEE 8th International Conference on Web Services (pp. 259-266). [5552821] https://doi.org/10.1109/ICWS.2010.104

Message correlation and web service protocol mining from inaccurate logs. / Musaraj, Kreshnik; Yoshida, Tetsuya; Daniel, Florian; Hacid, Mohand Said; Casati, Fabio; Benatallah, Boualem.

ICWS 2010 - 2010 IEEE 8th International Conference on Web Services. 2010. p. 259-266 5552821.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Musaraj, K, Yoshida, T, Daniel, F, Hacid, MS, Casati, F & Benatallah, B 2010, Message correlation and web service protocol mining from inaccurate logs. in ICWS 2010 - 2010 IEEE 8th International Conference on Web Services., 5552821, pp. 259-266, 2010 IEEE 8th International Conference on Web Services, ICWS 2010, Miami, FL, United States, 5.7.10. https://doi.org/10.1109/ICWS.2010.104
Musaraj K, Yoshida T, Daniel F, Hacid MS, Casati F, Benatallah B. Message correlation and web service protocol mining from inaccurate logs. In ICWS 2010 - 2010 IEEE 8th International Conference on Web Services. 2010. p. 259-266. 5552821 https://doi.org/10.1109/ICWS.2010.104
Musaraj, Kreshnik ; Yoshida, Tetsuya ; Daniel, Florian ; Hacid, Mohand Said ; Casati, Fabio ; Benatallah, Boualem. / Message correlation and web service protocol mining from inaccurate logs. ICWS 2010 - 2010 IEEE 8th International Conference on Web Services. 2010. pp. 259-266
@inproceedings{1d08b18885ea4c89bbdfd7229beed274,
title = "Message correlation and web service protocol mining from inaccurate logs",
abstract = "Business process management, service-oriented architectures and software back-engineering heavily rely on the fundamental processes of mining of processes and web service business protocols from log files. Model extraction and mining aim at the (re)discovery of the behavior of a running model implementation using solely its interaction and activity traces, and no a priori information on the target model. This paper presents an approach for correlating messages and extracting the business protocol of a web service in the realistic scenario in which correlation information is entirely absent from interaction and activity logs. Correlation is achieved through deterministic computations that result in an extremely efficient method whose extensive experiments have shown its solid reliability, robustness when dealing with complex structures, and very high performance and scalability. This approach and the underlying algorithms extend what is actually possible to achieve in the web service business protocol mining domain using incomplete and noisy data logs, and opens new horizons in back-engineering of web services. The theoretical and experimental results clearly show the leap forward achieved herein.",
author = "Kreshnik Musaraj and Tetsuya Yoshida and Florian Daniel and Hacid, {Mohand Said} and Fabio Casati and Boualem Benatallah",
year = "2010",
doi = "10.1109/ICWS.2010.104",
language = "English",
isbn = "9780769541280",
pages = "259--266",
booktitle = "ICWS 2010 - 2010 IEEE 8th International Conference on Web Services",

}

TY - GEN

T1 - Message correlation and web service protocol mining from inaccurate logs

AU - Musaraj, Kreshnik

AU - Yoshida, Tetsuya

AU - Daniel, Florian

AU - Hacid, Mohand Said

AU - Casati, Fabio

AU - Benatallah, Boualem

PY - 2010

Y1 - 2010

N2 - Business process management, service-oriented architectures and software back-engineering heavily rely on the fundamental processes of mining of processes and web service business protocols from log files. Model extraction and mining aim at the (re)discovery of the behavior of a running model implementation using solely its interaction and activity traces, and no a priori information on the target model. This paper presents an approach for correlating messages and extracting the business protocol of a web service in the realistic scenario in which correlation information is entirely absent from interaction and activity logs. Correlation is achieved through deterministic computations that result in an extremely efficient method whose extensive experiments have shown its solid reliability, robustness when dealing with complex structures, and very high performance and scalability. This approach and the underlying algorithms extend what is actually possible to achieve in the web service business protocol mining domain using incomplete and noisy data logs, and opens new horizons in back-engineering of web services. The theoretical and experimental results clearly show the leap forward achieved herein.

AB - Business process management, service-oriented architectures and software back-engineering heavily rely on the fundamental processes of mining of processes and web service business protocols from log files. Model extraction and mining aim at the (re)discovery of the behavior of a running model implementation using solely its interaction and activity traces, and no a priori information on the target model. This paper presents an approach for correlating messages and extracting the business protocol of a web service in the realistic scenario in which correlation information is entirely absent from interaction and activity logs. Correlation is achieved through deterministic computations that result in an extremely efficient method whose extensive experiments have shown its solid reliability, robustness when dealing with complex structures, and very high performance and scalability. This approach and the underlying algorithms extend what is actually possible to achieve in the web service business protocol mining domain using incomplete and noisy data logs, and opens new horizons in back-engineering of web services. The theoretical and experimental results clearly show the leap forward achieved herein.

UR - http://www.scopus.com/inward/record.url?scp=77957267188&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77957267188&partnerID=8YFLogxK

U2 - 10.1109/ICWS.2010.104

DO - 10.1109/ICWS.2010.104

M3 - Conference contribution

AN - SCOPUS:77957267188

SN - 9780769541280

SP - 259

EP - 266

BT - ICWS 2010 - 2010 IEEE 8th International Conference on Web Services

ER -