TY - GEN
T1 - A temporal data-mining approach for discovering end-to-end transaction flows
AU - Perng, Chang Shing
AU - Tao, Tao
AU - Tang, Chungqiang
AU - So, Edward
AU - Zhang, Chun
AU - Chang, Rong
AU - Wang, Ting
AU - Liu, Ling
PY - 2008
Y1 - 2008
N2 - Effective management of Web Services systems relies on accurate understanding of end-to-end transaction flows, which may change over time as the service composition evolves. This work takes a data mining approach to automatically recovering end-to-end transaction flows from (potentially obscure) monitoring events produced by monitoring tools. We classify the caller-callee relationships among monitoring events into three categories (identity, direct-invoke, and cascaded-invoke), and propose unsupervised learning algorithms to generate rules for each type of relationship. The key idea is to leverage the temporal information available in the monitoring data and extract patterns that have statistical significance. By piecing together the caller-callee relationships at each step along the invocation path, we can recover the end-to-end flow for every executed transaction. Experiments demonstrate that our algorithms outperform human experts in terms of solution quality, scale well with the data size, and are robust against noises in monitoring data.
AB - Effective management of Web Services systems relies on accurate understanding of end-to-end transaction flows, which may change over time as the service composition evolves. This work takes a data mining approach to automatically recovering end-to-end transaction flows from (potentially obscure) monitoring events produced by monitoring tools. We classify the caller-callee relationships among monitoring events into three categories (identity, direct-invoke, and cascaded-invoke), and propose unsupervised learning algorithms to generate rules for each type of relationship. The key idea is to leverage the temporal information available in the monitoring data and extract patterns that have statistical significance. By piecing together the caller-callee relationships at each step along the invocation path, we can recover the end-to-end flow for every executed transaction. Experiments demonstrate that our algorithms outperform human experts in terms of solution quality, scale well with the data size, and are robust against noises in monitoring data.
UR - http://www.scopus.com/inward/record.url?scp=57749182665&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=57749182665&partnerID=8YFLogxK
U2 - 10.1109/ICWS.2008.59
DO - 10.1109/ICWS.2008.59
M3 - Conference contribution
AN - SCOPUS:57749182665
SN - 9780769533100
T3 - Proceedings of the IEEE International Conference on Web Services, ICWS 2008
SP - 37
EP - 44
BT - Proceedings of the IEEE International Conference on Web Services, ICWS 2008
T2 - IEEE International Conference on Web Services, ICWS 2008
Y2 - 23 September 2008 through 26 September 2008
ER -