Skip to main content

Toward Obtaining Event Logs from Legacy Code

  • Conference paper
Business Process Management Workshops (BPM 2010)

Abstract

Information systems are ageing over time and become legacy information systems which often embed business knowledge that is not present in any other artifact. This embedded knowledge must be preserved to align the modernized versions of the legacy systems with the current business processes of an organization. Process mining is a powerful tool to discover and preserve business knowledge. Most process mining techniques and tools use event logs, registered during execution of process-aware information systems, as the key source of knowledge. Unfortunately, the majority of traditional information systems is not process-aware and does not have any built-in logging mechanisms. Thus, this paper defines the main challenges to be addressed as well as a preliminary solution to obtain event logs from traditional systems. The solution consists of a technique that statically analyzes the source code and modifies it in a non-invasive way. Finally, the modified source code enables the event log registration at runtime based on dynamic source code analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cai, Z., Yang, X., Wang, W.: Business Process Recovery for System Maintenance - An Empirical Approach. In: ICSM 2009, pp. 399–402. IEEE Computer Society, Los Alamitos (2009)

    Google Scholar 

  2. Castellanos, M., de Medeiros, K.A., Mendling, J., Weber, B., Weitjers, A.J.M.M.: Business Process Intelligence. In: Handbook of Research on Business Process Modeling, pp. 456–480. Idea Group Inc., USA (2009)

    Chapter  Google Scholar 

  3. Dumas, M., van der Aalst, W., Ter Hofstede, A.: Process-aware Information Systems: Bridging People and Software Through Process Technology. John Wiley & Sons, Inc., Chichester (2005)

    Book  Google Scholar 

  4. Günther, C.W., van der Aalst, W.M.P.: A Generic Import Framework for Process Event Logs. In: Eder, J., Dustdar, S. (eds.) BPM Workshops 2006. LNCS, vol. 4103, pp. 81–92. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  5. van der Heuvel, W.-J.: Aligning Modern Business Processes and Legacy Systems: A Component-Based Perspective (Cooperative Information Systems). The MIT Press, Cambridge (2006)

    Google Scholar 

  6. Ingvaldsen, J.E., Gulla, J.A.: Preprocessing Support for Large Scale Process Mining of SAP Transactions. In: ter Hofstede, A.H.M., Benatallah, B., Paik, H.-Y. (eds.) BPM Workshops 2007. LNCS, vol. 4928, pp. 30–41. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  7. Mens, T.: Introduction and Roadmap: History and Challenges of Software Evolution. In: Software Evolution, vol. 1, pp. 1–11. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  8. Newcomb, P.: Architecture-Driven Modernization (ADM). In: WCRE 2005, p. 237 (2005)

    Google Scholar 

  9. Pérez-Castillo, R., García-Rodríguez de Guzmán, I., Ávila-García, O., Piattini, M.: MARBLE: A Modernization Approach for Recovering Business Processes from Legacy Systems. In: REM 2009, pp. 17–20 (2009)

    Google Scholar 

  10. Ratiu, D.: Reverse Engineering Domain Models from Source Code. In: REM 2009, pp. 13–16 (2009)

    Google Scholar 

  11. Ulrich, W.M.: Legacy Systems: Transformation Strategies, vol. 448. Prentice Hall, Englewood Cliffs (2002)

    Google Scholar 

  12. van der Aalst, W., Weijters, A.J.M.M.: Process Mining. In: Process-aware Information Systems: Bridging People and Software Through Process Technology, pp. 235–255. John Wiley & Sons, Inc., Chichester (2005)

    Chapter  Google Scholar 

  13. van der Aalst, W.M.P., van Dongenm, B.F., Günther, C., Rozinat, A., Verbeek, H.M.W., Weijters, A.J.M.M.: ProM: the process mining toolkit. In: BPM 2009, pp. 1–4 (2009)

    Google Scholar 

  14. Weske, M.: Business Process Management: Concepts, Languages, Architectures, Leipzig, Alemania, vol. 368. Springer, Heidelberg (2007)

    Google Scholar 

  15. Zou, Y., Hung, M.: An Approach for Extracting Workflows from E-Commerce Applications. In: ICPC 2006, pp. 127–136. IEEE Computer Society, Los Alamitos (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pérez-Castillo, R., Weber, B., García-Rodríguez de Guzmán, I., Piattini, M. (2011). Toward Obtaining Event Logs from Legacy Code. In: zur Muehlen, M., Su, J. (eds) Business Process Management Workshops. BPM 2010. Lecture Notes in Business Information Processing, vol 66. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20511-8_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20511-8_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20510-1

  • Online ISBN: 978-3-642-20511-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics