Dorina Bano, Tom Lichtenstein, Finn Klessascheck, M. Weske
{"title":"从重做日志中提取事件日志","authors":"Dorina Bano, Tom Lichtenstein, Finn Klessascheck, M. Weske","doi":"10.52825/bis.v1i.66","DOIUrl":null,"url":null,"abstract":"Process mining is widely adopted in organizations to gain deep insights about running business processes. This can be achieved by applying different process mining techniques like discovery, conformance checking, and performance analysis. These techniques are applied on event logs, which need to be extracted from the organization’s databases beforehand. This not only implies access to databases, but also detailed knowledge about the database schema, which is often not available. In many real-world scenarios, however, process execution data is available as redo logs. Such logs are used to bring a database into a consistent state in case of a system failure. This paper proposes a semi-automatic approach to extract an event log from redo logs alone. It does not require access to the database or knowledge of the databaseschema. The feasibility of the proposed approach is evaluated on two synthetic redo logs.","PeriodicalId":56020,"journal":{"name":"Business & Information Systems Engineering","volume":"163 1","pages":"73-82"},"PeriodicalIF":7.4000,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Database-Less Extraction of Event Logs from Redo Logs\",\"authors\":\"Dorina Bano, Tom Lichtenstein, Finn Klessascheck, M. Weske\",\"doi\":\"10.52825/bis.v1i.66\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Process mining is widely adopted in organizations to gain deep insights about running business processes. This can be achieved by applying different process mining techniques like discovery, conformance checking, and performance analysis. These techniques are applied on event logs, which need to be extracted from the organization’s databases beforehand. This not only implies access to databases, but also detailed knowledge about the database schema, which is often not available. In many real-world scenarios, however, process execution data is available as redo logs. Such logs are used to bring a database into a consistent state in case of a system failure. This paper proposes a semi-automatic approach to extract an event log from redo logs alone. It does not require access to the database or knowledge of the databaseschema. The feasibility of the proposed approach is evaluated on two synthetic redo logs.\",\"PeriodicalId\":56020,\"journal\":{\"name\":\"Business & Information Systems Engineering\",\"volume\":\"163 1\",\"pages\":\"73-82\"},\"PeriodicalIF\":7.4000,\"publicationDate\":\"2021-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Business & Information Systems Engineering\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.52825/bis.v1i.66\",\"RegionNum\":3,\"RegionCategory\":\"管理学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Business & Information Systems Engineering","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.52825/bis.v1i.66","RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Database-Less Extraction of Event Logs from Redo Logs
Process mining is widely adopted in organizations to gain deep insights about running business processes. This can be achieved by applying different process mining techniques like discovery, conformance checking, and performance analysis. These techniques are applied on event logs, which need to be extracted from the organization’s databases beforehand. This not only implies access to databases, but also detailed knowledge about the database schema, which is often not available. In many real-world scenarios, however, process execution data is available as redo logs. Such logs are used to bring a database into a consistent state in case of a system failure. This paper proposes a semi-automatic approach to extract an event log from redo logs alone. It does not require access to the database or knowledge of the databaseschema. The feasibility of the proposed approach is evaluated on two synthetic redo logs.
期刊介绍:
Business & Information Systems Engineering (BISE) is a double-blind peer-reviewed journal with a primary focus on the design and utilization of information systems for social welfare. The journal aims to contribute to the understanding and advancement of information systems in ways that benefit societal well-being.