A two-layered framework for the discovery of software behavior: A case study

Cong Liu, Jianpeng Zhang, Guangming Li, Shangce Gao, Qingtian Zeng

Research output: Contribution to journalArticlepeer-review

17 Scopus citations

Abstract

During the execution of software, tremendous amounts of data can be recorded. By exploiting the execution data, one can discover behavioral models to describe the actual software execution. As a well-known open-source process mining toolkit, ProM integrates quantities of process mining techniques and enjoys a variety of applications in a broad range of areas. How to develop a better ProM software, both from user experience and software performance perspective, are of vital importance. To achieve this goal, we need to investigate the real execution behavior of ProM which can provide useful insights on its usage and how it responds to user operations. This paper aims to propose an effective approach to solve this problem. To this end, we first instrument existing ProM framework to capture execution logs without changing its architecture. Then a two-layered framework is introduced to support accurate ProM behavior discovery by characterizing both user interaction behavior and plug-in calling behavior separately. Next, detailed discovery techniques to obtain user interaction behavior model and plug-in calling behavior model are proposed. All proposed approaches have been implemented.

Original languageEnglish
Pages (from-to)2005-2014
Number of pages10
JournalIEICE Transactions on Information and Systems
VolumeE101D
Issue number8
DOIs
StatePublished - 2018/08

Keywords

  • Plug-in calling behavior
  • Process mining
  • Software behavior discovery
  • User behavior

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Vision and Pattern Recognition
  • Electrical and Electronic Engineering
  • Artificial Intelligence

Fingerprint

Dive into the research topics of 'A two-layered framework for the discovery of software behavior: A case study'. Together they form a unique fingerprint.

Cite this