preferences. The algorithm either provides a first cor-
relation key set that meets quality or returns a sorted
list along with the respective conversations sets.
Our evaluation showed that despite using invari-
ants and quality attributes, Algorithm 1 may still re-
turn several correlation key sets. In this case, the user
has to choose one set with which conversations are
finally extracted. We intend to reduce the need for
supervision and increase precision by improving our
approach with a decision-making algorithm. The lat-
ter will compute correlation key set scores, choose the
most appropriate set, and finally, will automatically
return one conversation set.
ACKNOWLEDGEMENT
Research supported by the French Project VASOC
(Auvergne-Rh
ˆ
one-Alpes Region) https://vasoc.limos.
fr/.
REFERENCES
Barros, A., Decker, G., Dumas, M., and Weber, F. (2007).
Correlation patterns in service-oriented architectures.
In Dwyer, M. B. and Lopes, A., editors, Fundamental
Approaches to Software Engineering, pages 245–259,
Berlin, Heidelberg. Springer Berlin Heidelberg.
Conforti, R., Dumas, M., Garc
´
ıa-Ba
˜
nuelos, L., and La Rosa,
M. (2016). Bpmn miner: Automated discovery of
bpmn process models with hierarchical structure. In-
formation Systems, 56:284–303.
Dustdar, S. and Gombotz, R. (2006). Discovering web ser-
vice workflows using web services interaction mining.
Int. J. Bus. Process. Integr. Manag., 1:256–266.
Fu, X., Ren, R., Zhan, J., Zhou, W., Jia, Z., and Lu, G.
(2012). Logmaster: Mining event correlations in logs
of large-scale cluster systems. In 2012 IEEE 31st Sym-
posium on Reliable Distributed Systems, pages 71–80.
Gaaloul, W., Ba
¨
ına, K., and Godart, C. (2008). Log-based
Mining Techniques Applied to Web Service Composi-
tion Reengineering. Service Oriented Computing and
Applications, 2(2-3):93–110.
Kliger, S., Yemini, S., Yemini, Y., Ohsie, D., and Stolfo,
S. (1995). A Coding Approach to Event Correlation,
pages 266–277. Springer US, Boston, MA.
Liu, L. and Liu, J. (2010). Mining web log sequential pat-
terns with layer coded breadth-first linked wap-tree.
In 2010 International Conference of Information Sci-
ence and Management Engineering, volume 1, pages
28–31.
Messaoudi, S., Panichella, A., Bianculli, D., Briand, L.,
and Sasnauskas, R. (2018). A search-based approach
for accurate identification of log message formats. In
Proceedings of the 26th Conference, ICPC ’18, pages
167–177, New York, NY, USA. ACM.
Motahari Nezhad, H. R., Saint-Paul, R., Casati, F., and Be-
natallah, B. (2011). Event correlation for process dis-
covery from web service interaction logs. VLDB J.,
20:417–444.
Musaraj, K., Yoshida, T., Daniel, F., Hacid, M.-S., Casati,
F., and Benatallah, B. (2010). Message Correlation
and Web Service Protocol Mining from Inaccurate
Logs. In IEEE International Conference on Web Ser-
vices, pages 259–266, Miami, Florida, United States.
IEEE Computer Society.
OASIS Consortium (2007). Ws-bpel version 2.0.
http://docs.oasis-open.org/wsbpel/2.0/OS/wsbpel-
v2.0-OS.pdf.
Salva, S. and Blot, E. (2020a). Cktail: Model learning of
communicating systems. In Ali, R., Kaindl, H., and
Maciaszek, L. A., editors, Proceedings of the 15th
International Conference ENASE, Prague, Czech Re-
public, May 5-6, 2020, pages 27–38. SCITEPRESS.
Salva, S. and Blot, E. (2020b). Verifying the application of
security measures in iot software systems with model
learning. In van Sinderen, M., Fill, H., and Maciaszek,
L. A., editors, Proceedings of the 15th International
Conference ICSOFT, Lieusaint, Paris, France, July 7-
9, 2020, pages 350–360. ScitePress.
Serrour, B., Gasparotto, D. P., Kheddouci, H., and Bena-
tallah, B. (2008). Message correlation and business
protocol discovery in service interaction logs. In Bel-
lahs
`
ene, Z. and L
´
eonard, M., editors, Advanced Infor-
mation Systems Engineering, pages 405–419, Berlin,
Heidelberg. Springer Berlin Heidelberg.
Vaarandi, R. and Pihelgas, M. (2015). Logcluster - a data
clustering and pattern mining algorithm for event logs.
In 2015 11th International Conference on Network
and Service Management (CNSM), pages 1–7.
Yoon, K. P. and Hwang, C.-L. (1995). Multiple attribute
decision making: An introduction (quantitative appli-
cations in the social sciences).
Zhang, X., Xu, Y., Lin, Q., Qiao, B., Zhang, H., Dang, Y.,
Xie, C., Yang, X., Cheng, Q., Li, Z., Chen, J., He, X.,
Yao, R., Lou, J.-G., Chintalapati, M., Shen, F., and
Zhang, D. (2019). Robust log-based anomaly detec-
tion on unstable log data. In Proceedings of the 2019
27th ESEC/FSE, page 807–817, New York, NY, USA.
Association for Computing Machinery.
Conversation Extraction from Event Logs
163