The Community for Technology Leaders
RSS Icon
Issue No.12 - December (2008 vol.20)
pp: 1683-1698
Hamid R. Motahari-Nezhad , University of New South Wales, Sydney
Régis Saint-Paul , University of New South Wales, Sydney
Boualem Benatallah , University of New South Wales, Sydney
Fabio Casati , University of Trento, Trento
Understanding the business (interaction) protocol supported by a service is very important for both clients and service providers: it allows developers to know how to write clients that interact with a service, and it allows development tools and runtime middleware to deliver functionality that simplifies the service development lifecycle. It also greatly facilitates the monitoring, visualization, and aggregation of interaction data. This paper presents an approach for discovering protocol definitions from real-world service interaction logs. It first describes the challenges in protocol discovery in such a context. Then, it presents a novel discovery algorithm, which is widely applicable, robust to different kinds of imperfections often present in realworld service logs, and able to derive protocols of small sizes, also thanks to heuristics. As finding the most precise and the smallest model is algorithmically not feasible from imperfect service logs, finally, the paper presents an approach to refine the discovered protocol via user interaction, to compensate for possible imprecision introduced in the discovered model. The approach has been implemented and experimental results show its viability on both synthetic and real-world datasets.
Workflow management, Mining methods and algorithms, Systems and Software, Web-based services
Hamid R. Motahari-Nezhad, Régis Saint-Paul, Boualem Benatallah, Fabio Casati, "Deriving Protocol Models from Imperfect Service Conversation Logs", IEEE Transactions on Knowledge & Data Engineering, vol.20, no. 12, pp. 1683-1698, December 2008, doi:10.1109/TKDE.2008.87
[1] G. Alonso, F. Casati, H. Kuno, and V. Machiraju, Web Services— Concepts, Architectures, and Application. Springer, 2004.
[2] B. Benatallah, F. Casati, and F. Toumani, “Representing, Analysing and Managing Web Service Protocols,” Data and Knowledge Eng. J., vol. 58, no. 3, pp. 327-357, 2006.
[3] H. Motahari-Nezhad, R. Saint-Paul, B. Benatallah, and F. Casati, “Protocol Discovery from Web Service Interaction Logs,” Proc. IEEE Int'l Conf. Data Eng. (ICDE), 2007.
[4] H. Motahari-Nezhad, R. Saint-Paul, B. Benatallah, F. Casati, F. Toumani, and J. Ponge, “Servicemosaic: Interactive Analysis and Manipulations of Service Conversations,” Proc. IEEE Int'l Conf. Data Eng. (ICDE), 2007.
[5] E.M. Gold, “Complexity of Automaton Identification from Given Data,” Information and Control, vol. 37, no. 3, 1978.
[6] R. Parekh and V. Honavar, “Grammar Inference, Automata Induction, and Language Acquisition,” A Handbook of Natural Language Processing, chapter 29, 2000.
[7] L. Maruster, A.J. Weijters, W.M. Aalst, and A. Bosch, “A Rule-Based Approach for Process Discovery: Dealing with Noise and Imbalance in Process Logs,” Data Mining and Knowledge Discovery, vol. 13, no. 1, 2006.
[8] W. Pauw et al., “Web Services Navigator: Visualizing the Execution of Web Services,” IBM System J., vol. 44, no. 4, 2005.
[9] R. Silva, J. Zhang, and J. Shanahan, “Probabilistic Workflow Mining,” Proc. Int'l Conf. Knowledge Discovery and Data Mining (KDD), 2005.
[10] J. Yang et al., “Perracotta: Mining Temporal API Rules from Imperfect Traces,” Proc. Int'l Conf. Software Eng. (ICSE), 2006.
[11] J.E. Cook and A.L. Wolf, “Discovering Models of Software Processes from Event-Based Data,” ACM Trans. Software Eng. and Methodology, vol. 7, no. 3, 1998.
[12] R. Agrawal, D. Gunopulos, and F. Leymann, “Mining Process Models from Workflow Logs,” Proc. Int'l Conf. Extending Database Technology (EDBT), 1998.
[13] W. van der Aalst et al., “Workflow Mining: A Survey of Issues and Approaches,” Data and Knowledge Eng. J., vol. 47, no. 2, 2003.
[14] S. Dustdar and R. Gombotz, “Discovering Web Service Workflows Using Web Services Interaction Mining,” Int'l J. Business Process Integration and Management, vol. 1, no. 4, 2006.
[15] D.E. Knuth,The Art of Computer Programming, volume 2: Seminumerical Algorithms. Addison-Wesley, 1997.
[16] F. Thollard, P. Dupont, and C. Higuera, “Probabilistic DFA Inference Using Kullback-Leibler Divergence and Minimality,” Proc. Int'l Conf. Machine Learning (ICML), 2000.
[17] J. Herbst and D. Karagiannis, “Integrating Machine Learning and Workflow Management to Support Acquisition and Adaptation of Workflow Models,” Int'l J. Intelligent Systems Accounting, Finance and Management, vol. 9, no. 2, 2000.
[18] J. Cook, Z. Du, C. Liu, and A. Wolf, “Discovering Models of Behavior for Concurrent Workflows,” Computers in Industry, vol. 53, no. 3, 2004.
[19] J.E. Hopcroft and J.D. Ullman, Introduction to Automata Theory, Languages, and Computation. Addison Wesley, 1990.
[20] R.A. Wagner and M.J. Fischer, “The String-to-String Correction Problem,” J. ACM, vol. 21, no. 1, 1974.
[21] E. Alpaydin, Introduction to Machine Learning. MIT Press, 2004.
[22] G. Greco, A. Guzzo, and L. Pontieri, “Discovering Expressive Process Models by Clustering Log Traces,” IEEE Trans. Knowledge and Data Eng., vol. 18, 2006.
[23] V. Hodge and J. Austin, “A Survey of Outlier Detection Methodologies,” Artificial Intelligence Rev., vol. 22, no. 2, pp. 85-126, 2004.
[24] E. Vidal, F. Thollard, C. Higuera, F. Casacuberta, and R. Carrasco, “Probabilistic Finite State Machines—Part II,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 27, no. 7, July 2005.
[25] G. Ammons, R. Bodik, and J.R. Larus, “Mining Specifications,” SIGPLAN Notices, vol. 37, no. 1, 2002.
[26] G. Greco, A. Guzzo, and G. Manco, “Mining and Reasoning on Workflows,” IEEE Trans. Knowledge and Data Eng., vol. 17, no. 4, Apr. 2005.
[27] J.E. Cook and A.L. Wolf, “Event-Based Detection of Concurrency,” Proc. SIGSOFT Foundations of Software Eng. (FSE), 1998.
[28] Process-Mining-Group, “ProM Workflow Mining Prototype,” tools.htm, 2006.
[29] M. Hammori, J. Herbst, and N. Kleiner, “Interactive Workflow Mining: Requirements, Concepts and Implementation,” Data Knowledge and Eng., vol. 56, no. 1, pp. 41-63, 2006.
[30] G. Ammons, D. Mandelin, R. Bodik, and J. Larus, “Debugging Temporal Specifications with Concept Analysis,” Proc. Conf. Programming Language Design and Implementation (PLDI), 2003.
[31] T.W. Malone et al., “Tools for Inventing Organizations: Toward a Handbook of Organizational Processes,” Management Science, vol. 45, no. 3, 1999.
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool