6 DISCUSSION AND FUTURE
WORK
We used the Data Follow Graph model to illustrate the
abstracted models due to ease of understanding for the
domain experts. We received various qualitative feed-
back, such as: “[. . . ] I can now understand the user
interactions and assess the user behaviors without be-
ing overwhelmed by many activities that do represent
the actual processes, [. . . ] I am wondering why we
have such a bad performance on restoring files, I need
to investigate this.”, referring to a violation of a KPI
for restoring files that was previously unknown. Thus,
the proposed method could successfully identify non-
functional requirements and draw developers’ atten-
tion to the right software components for further tech-
nical investigations.
Despite our effort to propose a generalizable event
log abstraction technique, the suggested method is
only applicable to client-server applications. We have
to acknowledge that one of the most time-consuming
and manual efforts in this technique is to evaluate
the input log for noise, outliers, and anomalies in the
event log. Unfortunately, despite our attempt, our
case studies’ report lacks the exploration of the pre-
cision and the generalization as other quality indica-
tors due to extensive computing power required for
calculating these factors via ProM implementation.
Thus these calculations never terminated. Moreover,
we use the concatenation of activity names for rela-
beling task; yet, this may cause readability issues for
some domain experts if the number of original activ-
ities increases drastically. Lastly, we are also relying
on event logs being generated by the OAuth2 work-
flow (authorization service). Consequently, there may
be server-side activities that are not recorded. So, fur-
ther study is required to validate our approach while
including all executing software components.
7 CONCLUSIONS
This paper describes a novel approach for event log
abstraction in client-server applications. In Section
2, we discussed the state of the art and elaborated on
the benefits and shortcomings of each work, and ex-
plained how our suggested method could overcome
existing limitations for the system under study. Our
suggested approach enabled us to gradually abstract
the fine-grained event logs to higher levels without
losing essential information, enabling the domain ex-
perts to use the appropriate discovered model for fur-
ther analysis. Besides answering our research ques-
tions, we evaluated the proposed approach with the
help of two real-life experiments. Overall, this work’s
contributions are adaptability of the approach to any
client-server application and enabling automatic rela-
beling of abstracted activity names at a desired level
of granularity. Additionally, it empowers discovering
the exact software execution life-cycle, facilitating the
discovery of user behavior on client-server applica-
tions with high accuracy.
REFERENCES
Begicheva, A. K. and Lomazova, I. A. (2017). Discovering
high-level process models from event logs. Modeling
and Analysis of Information Systems, 24(2):125–140.
Benesty, J., Chen, J., Huang, Y., and Cohen, I. (2009).
Pearson correlation coefficient. In Noise reduction in
speech processing, pages 1–4. Springer.
Buijs, J. C., Van Dongen, B. F., and van Der Aalst, W. M.
(2012). On the role of fitness, precision, gener-
alization and simplicity in process discovery. In
OTM Confederated International Conferences" On
the Move to Meaningful Internet Systems", pages 305–
322. Springer.
de Leoni, M. and Dündar, S. (2020). Event-log abstraction
using batch session identification and clustering. In
Proceedings of the 35th Annual ACM Symposium on
Applied Computing, pages 36–44.
Dean, A., Voss, D., Dragulji
´
c, D., et al. (1999). Design and
analysis of experiments, volume 1. Springer.
Günther, C. W. and Rozinat, A. (2012). Disco: Discover
your processes. BPM (Demos), 940:40–44.
Jouck, T., Bolt, A., Depaire, B., de Leoni, M., and van der
Aalst, W. M. (2018). An integrated framework for pro-
cess discovery algorithm evaluation. arXiv preprint
arXiv:1806.07222.
Leemans, S. J., Fahland, D., and Van Der Aalst, W. M.
(2014). Process and deviation exploration with induc-
tive visual miner. BPM (Demos), 1295(46):8.
Liu, C., Wang, S., Gao, S., Zhang, F., and Cheng, J. (2018).
User behavior discovery from low-level software exe-
cution log. IEEJ Transactions on Electrical and Elec-
tronic Engineering, 13(11):1624–1632.
Mannhardt, F., De Leoni, M., Reijers, H. A., Van Der Aalst,
W. M., and Toussaint, P. J. (2016). From low-level
events to activities-a pattern-based approach. In Inter-
national conference on business process management,
pages 125–141. Springer.
Mannhardt, F. and Tax, N. (2017). Unsupervised event ab-
straction using pattern abstraction and local process
models. arXiv preprint arXiv:1704.03520.
Mans, R., van der Aalst, W. M., and Verbeek, H. (2014).
Supporting process mining workflows with rapid-
prom. BPM (Demos), 56.
Politze, M., Claus, F., Brenger, B., Yazdi, M. A., Heinrichs,
B., and Schwarz, A. (2020). How to manage it re-
sources in research projects? towards a collaborative
Event Log Abstraction in Client-Server Applications
35