Filters








22,277 Hits in 6.3 sec

Abstracting log lines to log event types for mining software system logs

Meiyappan Nagappan, Mladen A. Vouk
2010 2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010)  
Each log line is abstracted to a unique ID or event type and the dynamic parameter value is extracted to give an insight on the current state of the system.  ...  This disentangling of the message and parameter fields to find the event types is called abstraction of log lines.  ...  ACKNOWLEDGMENT The authors would like to thank Aaron Peeler and Andy Kurth from the VCL team for providing the log files.  ... 
doi:10.1109/msr.2010.5463281 dblp:conf/msr/NagappanV10 fatcat:ayvvf3a2cfejblhvypdjwjor7u

Synoptic

Ivan Beschastnikh, Jenny Abrahamson, Yuriy Brun, Michael D. Ernst
2011 Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering - SIGSOFT/FSE '11  
Logging is a powerful method for capturing program activity and state during an execution.  ...  Then, it describes the Synoptic tool, which is designed to support a rich log exploration workflow.  ...  Acknowledgments This work is supported by the National Science Foundation under grants CNS-0963754, CCF-1016701, and under grant #0937060 to the Computing Research Association for the CIFellows Project  ... 
doi:10.1145/2025113.2025188 dblp:conf/sigsoft/BeschastnikhABE11 fatcat:w3asdgdufnh3vmkzgqg5cg3ybe

Visually reasoning about system and resource behavior

Tony Ohmann, Ryan Stanley, Ivan Beschastnikh, Yuriy Brun
2016 Proceedings of the 38th International Conference on Software Engineering Companion - ICSE '16  
Perfume is broadly applicable, as it is configurable to parse a wide variety of execution log formats and applies to all resource types that can be represented numerically.  ...  Perfume mines temporal properties that hold over the logged executions and represents system behavior in a resource finite state automaton that satisfies the mined properties.  ...  The regular expressions below the log in Figure 1 parse this log. The first expression matches the log lines and extracts the elapsed time, the event type, and the IP address from each line.  ... 
doi:10.1145/2889160.2889166 dblp:conf/icse/OhmannSBB16 fatcat:2edvmeevevdjndaunjx4yoq5m4

Abstracting Execution Logs to Execution Events for Enterprise Applications (Short Paper)

Zhen Ming Jiang, Ahmed E. Hassan, Parminder Flora, Gilbert Hamann
2008 2008 The Eighth International Conference on Quality Software  
We propose an approach which abstracts log lines to a set of execution events. Our approach can handle log lines without having strict requirements on the format of a log line.  ...  Each occurrence of an execution event results in a different log line, since a log line contains dynamic information which varies for each occurrence of the event.  ...  Acknowledgement We are grateful to Research In Motion (RIM) for providing access to the execution logs of the large telecom applications used in this study.  ... 
doi:10.1109/qsic.2008.50 dblp:conf/qsic/JiangHFH08 fatcat:p3mqibmamberdhgbcv2kakl5by

Process Mining Framework for Software Processes [chapter]

Vladimir Rubin, Christian W. Günther, Wil M. P. van der Aalst, Ekkart Kindler, Boudewijn F. van Dongen, Wilhelm Schäfer
2007 Lecture Notes in Computer Science  
In order to keep track of the involved documents and files, engineers use Software Configuration Management (SCM) systems.  ...  Thus, SCM information can be used for constructing explicit process models, which is called software process mining.  ...  When we analyse the document logs, we have to identify the cases (process instances), identify the document types, abstract from the details of the log, and ignore unnecessary information.  ... 
doi:10.1007/978-3-540-72426-1_15 fatcat:ckfbxdu73jb7nldiq2jbqhx4zm

Automated analysis of load testing results

Zhen Ming Jiang
2010 Proceedings of the 19th international symposium on Software testing and analysis - ISSTA '10  
Many software systems must be load tested to ensure that they can scale up while maintaining functional and performance requirements.  ...  Few research efforts are devoted to the automated analysis of load testing results, mainly due to the limited access to large scale systems for use as case studies.  ...  Bram Adams for their comments on the draft. The author appreciates the generosity of the Performance Engineering team at Research In Motion (RIM).  ... 
doi:10.1145/1831708.1831726 dblp:conf/issta/Jiang10 fatcat:mgzhllrfujctnkszhtuqaqy4m4

Mining Hybrid UML Models from Event Logs of SOA Systems
Метод автоматического построения гибридных UML-моделей на основе журналов событий систем с сервис-ориентированной архитектурой

K.V. Davydova, S.A. Shershakov
2017 Proceedings of the Institute for System Programming of RAS  
In the paper we consider a method for mining so-called "hybrid" UML models, that refers to software process mining.  ...  Models are built from execution traces of information systems with service-oriented architecture (SOA), given in the form of event logs.  ...  Since there are also a lot of event logs which are not produced by SOA systems, we are going to expand our approach to mining hybrid UML diagrams from event logs of more broad types of software architecture  ... 
doi:10.15514/ispras-2017-29(4)-10 fatcat:gium6lghjvauxjhmnidxr2digq

Analysis of execution log files

Meiyappan Nagappan
2010 Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - ICSE '10  
The goal of my dissertation research is to investigate log management and analysis techniques suited for very large and very complex logs, such as those we might expect in a computational cloud system.  ...  Log analysis can be used to find problems, define operational profiles, and even pro-actively prevent issues.  ...  These techniques are used for abstracting the lines in the log file to an integer or a unique message type. Clustering algorithms are used to cluster very frequently occurring set of events.  ... 
doi:10.1145/1810295.1810405 dblp:conf/icse/Nagappan10 fatcat:f5idxyu5ebe7rgl4uhjoqvj4uq

Integrating event logs into KDM repositories

Ricardo Pérez-Castillo, Ignacio García-Rodríguez de Guzmán, Mario Piattini, Barbara Weber
2012 Proceedings of the 27th Annual ACM Symposium on Applied Computing - SAC '12  
Event logs register the execution of business activities supported by existing information systems, thus they entail a key artifact to be used for recovering the actual business processes.  ...  This paper proposes an automatic technique to transform MXML event logs into event models to be integrated into KDM repositories.  ...  The proposal is used in the discovery type, since it aims to use event logs to discover business processes and carry out software modernization projects that preserve that business knowledge.  ... 
doi:10.1145/2245276.2231949 dblp:conf/sac/Perez-CastilloGPW12 fatcat:c43yvb6pkjadxir3zi6pqwfkda

Comparing Constraints Mined From Execution Logs to Understand Software Evolution

Thomas Krismayer, Michael Vierhauser, Rick Rabiser, Paul Grunbacher
2019 2019 IEEE International Conference on Software Maintenance and Evolution (ICSME)  
Specifically, automatically mined constraints define the expected timing and order of recurring events and the values of data elements attached to events.  ...  In this paper, we propose an approach for comparing run-time constraints, synthesized by a constraint mining algorithm, based on execution logs recorded before and after changes.  ...  ACKNOWLEDGEMENTS The financial support by the Austrian Federal Ministry for Digital and Economic Affairs, the National Foundation for Research, Technology and Development, Primetals Technologies, and the  ... 
doi:10.1109/icsme.2019.00082 dblp:conf/icsm/KrismayerVRG19 fatcat:jwat47nhfzh6xc373xv3z66w34

Landscape of Automated Log Analysis: a Systematic Literature Review and Mapping Study

Lukasz Korzeniowski, Krzysztof Goczyla
2022 IEEE Access  
Logging is a common practice in software engineering to provide insights into working systems. The main uses of log files have always been failure identification and root cause analysis.  ...  Although nearly every software system produces log files, the biggest challenge in log analysis is the lack of a common standard for both the content and format of log data.  ...  Access, Event, and Query logs are either well-defined log types (access log) or strongly embedded in a particular field or method (event log -process mining, query log -SQL analysis).  ... 
doi:10.1109/access.2022.3152549 fatcat:l2vf6x52qrharhvefonttrcn5e

Service Mining: Using Process Mining to Discover, Check, and Improve Service Behavior

Wil van der Aalst
2013 IEEE Transactions on Services Computing  
As shown in Fig. 2 , event logs can be used to conduct three types of process mining. The first type of process mining is discovery.  ...  Examples: tables in ERP systems, events logs of CRM systems, transaction logs of messaging systems, event logs of high-tech systems, etc.  ... 
doi:10.1109/tsc.2012.25 fatcat:rjwv6jo6eretfkwnpv3vpc3ehu

Behavioral resource-aware model inference

Tony Ohmann, Michael Herzberg, Sebastian Fiss, Armand Halbert, Marc Palyart, Ivan Beschastnikh, Yuriy Brun
2014 Proceedings of the 29th ACM/IEEE international conference on Automated software engineering - ASE '14  
We describe Perfume, an automated approach for inferring behavioral, resource-aware models of software systems from logs of their executions.  ...  A small user study demonstrates that using Perfume is more effective than using logs and another model inference tool for system comprehension.  ...  TYPE .+)" • \k ip The first expression matches the log lines and extracts the IP address, time, and event type from each line.  ... 
doi:10.1145/2642937.2642988 dblp:conf/kbse/OhmannHFHPBB14 fatcat:bqri5xwl2rcabopka3mfu5gd64

An exploratory study of the evolution of communicated information about the execution of large software systems

Weiyi Shang, Zhen Ming Jiang, Bram Adams, Ahmed E. Hassan, Michael W. Godfrey, Mohamed Nasser, Parminder Flora
2013 Journal of Software: Evolution and Process  
Examples of CI include execution logs and system events.  ...  In a case study on two large open source and one industrial software systems, we explore the evolution of CI by mining the execution logs of these systems and the logging statements in the source code.  ...  ACKNOWLEDGMENTS We would like to thank the WCRE 2011 reviewers for their valuable feedback. We are also grateful to Research In Motion (RIM) for providing access to the EA used in our case study.  ... 
doi:10.1002/smr.1579 fatcat:klrlvo7oh5gmjbcgdw7yiu5crq

An Exploratory Study of the Evolution of Communicated Information about the Execution of Large Software Systems

Weiyi Shang, Zhen Ming Jiang, Bram Adams, Ahmed E. Hassan, Michael W. Godfrey, Mohamed Nasser, Parminder Flora
2011 2011 18th Working Conference on Reverse Engineering  
Examples of CI include execution logs and system events.  ...  In a case study on two large open source and one industrial software systems, we explore the evolution of CI by mining the execution logs of these systems and the logging statements in the source code.  ...  ACKNOWLEDGMENTS We would like to thank the WCRE 2011 reviewers for their valuable feedback. We are also grateful to Research In Motion (RIM) for providing access to the EA used in our case study.  ... 
doi:10.1109/wcre.2011.48 dblp:conf/wcre/ShangJAHGNF11 fatcat:jqpzpdilbza4tiieqek5rhhsku
« Previous Showing results 1 — 15 out of 22,277 results