Filters








2,113 Hits in 4.5 sec

Database-Less Extraction of Event Logs from Redo Logs

Dorina Bano, Tom Lichtenstein, Finn Klessascheck, Mathias Weske
2021 Business Information Systems  
This paper proposes a semi-automatic approach to extract an event log from redo logs alone. It does not require access to the database or knowledge of the databaseschema.  ...  These techniques are applied on event logs, which need to be extracted from the organization's databases beforehand.  ...  Therefore, this paper proposes database-less extraction of event logs from redo logs.  ... 
doi:10.52825/bis.v1i.66 fatcat:354y2e6vkrbndffdsdt5gz45ey

Connecting databases with process mining: a meta model and toolset

Eduardo González López de Murillas, Hajo A. Reijers, Wil M. P. van der Aalst
2018 Journal of Software and Systems Modeling  
In addition, an extracted event log provides only a single view on the database.  ...  Process mining techniques require event logs which, in many cases, are obtained from databases. Obtaining these event logs is not a trivial task and requires substantial domain knowledge.  ...  -Events: this sector collects a set of events, obtained from any available source (database tables, redo logs, change records, system logs, etc.).  ... 
doi:10.1007/s10270-018-0664-7 fatcat:mo5gfylomzb6hdx3u4kiu5zp2m

Connecting Databases with Process Mining: A Meta Model and Toolset [chapter]

E. González López de Murillas, Hajo A. Reijers, Wil M. P. van der Aalst
2016 Lecture Notes in Business Information Processing  
-Events: this sector collects a set of events, obtained from any available source (database tables, redo logs, change records, system logs, etc.).  ...  The paper describes how to automatically obtain events from database systems that generate redo logs as a way to recover from failure.  ...  His research interests include process mining, data extraction and transformation, data querying, automated event log building, and business process management. Hajo A.  ... 
doi:10.1007/978-3-319-39429-9_15 fatcat:74udkxf6kbeolallogxndrpjhi

Digital Evidence for Database Tamper Detection

Shweta Tripathi, Bandu Baburao Meshram
2012 Journal of Information Security  
Some of these storage structures, such as the datafiles, redo log files, and archived redo log files, hold actual user data; other structures, such as control files, maintain the state of the database  ...  objects, and text-based alert and trace files contain logging information for both routine events and error conditions in the database.  ...  Databases are excellent reporting mechanisms and LogMiner allows the analyst to use a database SQL interface to the redo logs of Oracle which are separate from the database itself.  ... 
doi:10.4236/jis.2012.32014 fatcat:yuj5aduldnbh3onrhjc3jyuv7u

An Optimized Method for Access of LOBs in Database Management Systems

Jun Jie Liang, Wei Zhan
2012 Advanced Engineering Forum  
For changes in slave table data, it effectively prevents the redo log from being written into the LOB database, while diminishing the amount of changes being recording within the undo journal.  ...  It attempts to use LOB slave table methods to optimize and advance the storage structures of large objects as well as optimize the redo and undo log mechanisms to increase LOB access efficiency.  ...  Using this method ensures that data can be restored through the redo log in the event of a crash, and also ensures the integrity and consistency of system data.  ... 
doi:10.4028/www.scientific.net/aef.6-7.58 fatcat:qrqk5xn7wzfhbcdttc7tmbwplu

Extracting Event Data from Databases to Unleash Process Mining [chapter]

Wil M. P. van der Aalst
2015 Management for Professionals  
Starting from a class model and corresponding object models it is shown that events correspond to the creation, deletion, or modification of objects and relations.  ...  Dozens (if not hundreds) of process-mining techniques are available and their value has been proven in many case studies. However, process mining stands or falls with the availability of event logs.  ...  Acknowledgements This work was supported by the Basic Research Program of the National Research University Higher School of Economics (HSE) in Moscow.  ... 
doi:10.1007/978-3-319-14430-6_8 fatcat:3wg6qjjhfrg7zieuq677hl3iv4

Process discovery using in-database minimum self distance abstractions

Alifah Syamsiyah, Sander J. J. Leemans
2020 Proceedings of the 35th Annual ACM Symposium on Applied Computing  
Furthermore, a work proposed in [6] utilized a database redo log as a means to extract events.  ...  All of these work, however, only focus on event data extraction from databases, which we want to avoid.  ... 
doi:10.1145/3341105.3373846 dblp:conf/sac/SyamsiyahL20 fatcat:5ibvoda63na3tmzil7zj5vcn74

A Framework for Database Forensic Analysis

Harmeet Kaur Khanuja
2012 Computer Science & Engineering An International Journal  
In this research paper a framework is proposed for analyzing and reconstructing the activity of any unsuspicious behaviour within database.  ...  Relational database uses auditing capabilities, which involves examination of information and operations for accuracy, legality and propriety to report risks and to make recommendations to promote sound-operating  ...  It contains the collection of facts from the extracted log data/ system data. 5.  ... 
doi:10.5121/cseij.2012.2303 fatcat:yejl3naiqrb3hcp3tkthn2aq6y

A survey of graph-based algorithms for discovering business processes

Riyanarto Sarno, Kelly Rossa Sungkono
2019 IJAIN (International Journal of Advances in Intelligent Informatics)  
Those algorithms claimed that those have less time complexity because of the graph-database ability to store relationships.  ...  Algorithms of process discovery help analysts to understand business processes and problems in a system by creating a process model based on a log of the system.  ...  A pseudocode of constructing a graph-database based on the event log.  ... 
doi:10.26555/ijain.v5i2.296 fatcat:oe32uxdf7bhwhlwi7d6fczwahi

Fast-Start

Tirthankar Lahiri, Amit Ganesh, Ron Weiss, Ashok Joshi
2001 Proceedings of the 2001 ACM SIGMOD international conference on Management of data - SIGMOD '01  
Availability requirements for database systems are more stringent than ever before with the widespread use of databases as the foundation for ebusiness.  ...  This paper highlights Fast-Start TM Fault Recovery, an important availability feature in Oracle, designed to expedite recovery from unplanned outages.  ...  Z and the tail of the log is equal to or less than LOG_CHECKPOINT_INTERVAL.  ... 
doi:10.1145/375663.375751 dblp:conf/sigmod/LahiriG01 fatcat:he7zmpmd7zgebclkgbb4tmyxpu

Fast-Start

Tirthankar Lahiri, Amit Ganesh, Ron Weiss, Ashok Joshi
2001 SIGMOD record  
Availability requirements for database systems are more stringent than ever before with the widespread use of databases as the foundation for ebusiness.  ...  This paper highlights Fast-Start TM Fault Recovery, an important availability feature in Oracle, designed to expedite recovery from unplanned outages.  ...  Z and the tail of the log is equal to or less than LOG_CHECKPOINT_INTERVAL.  ... 
doi:10.1145/376284.375751 fatcat:ylhpgcvcpbggzdpbleotkjvdma

StarStar Models: Process Analysis on top of Databases [article]

Alessandro Berti, Wil van der Aalst
2018 arXiv   pre-print
The representation may be the entry point to apply advanced process mining techniques that work on classic event logs, as the model provides a simple way to retrieve a classic event log from a specified  ...  This technique is able to show a multigraph representing activities inferred from database events, connected with edges that are annotated with frequency and performance information.  ...  Some ways to retrieve events from databases are: -Using redo logs (see [11] ).  ... 
arXiv:1811.08143v1 fatcat:c2iyugtwmnexxdtaliejpzgkhi

Extracting Multiple Viewpoint Models from Relational Databases [article]

Alessandro Berti, Wil van der Aalst
2020 arXiv   pre-print
MVP models provide a holistic view on the process, but also allow for the extraction of classical event logs using different viewpoints.  ...  We provide a toolchain allowing for the discovery of MVP models (annotated with performance and frequency information) from relational databases.  ...  Some ways to retrieve events from databases are: -Using redo logs (see [29] ).  ... 
arXiv:2001.02562v1 fatcat:vw6lvflng5ezrjdvu45hbtzcgm

Hybrid Data Protection Framework to Enhance A2O Functionality in Production Database Virtualization

2020 International journal of recent technology and engineering  
and accidental RS2F events.  ...  The reliability of aDG Redo is flexible across not only standby databases but also primary sites running different operating system over diverse hardware platforms.  ...  Redo logs are created for standby as per recommendation of Oracle. It is de facto standard redo log file are one less than the standby redo logs.  ... 
doi:10.35940/ijrte.f1203.038620 fatcat:5yl55irk2ff5pkjxo26vxztr2u

Improving efficiency for discovering business processes containing invisible tasks in non-free choice

Riyanarto Sarno, Kelly Rossa Sungkono, Muhammad Taufiqulsa'di, Hendra Darmawan, Achmad Fahmi, Kuwat Triyana
2021 Journal of Big Data  
Graph database gains highest storing computing time of batch event logs; however, this database obtains low storing computing time of streaming event logs.  ...  The event log records sequences of activities, so the rules of $$\alpha ^{\$ }$$ α $ check the combination of invisible task within non-free choice.  ...  The event log needs to be extracted from the database in the form of .csv.  ... 
doi:10.1186/s40537-021-00487-x fatcat:z46gs5jxwrdwnlyyuwaypjdekm
« Previous Showing results 1 — 15 out of 2,113 results