Reference Hub5
Mining Users' Intents from Logs

Mining Users' Intents from Logs

Ghazaleh Khodabandelou, Charlotte Hug, Camille Salinesi
Copyright: © 2015 |Volume: 6 |Issue: 2 |Pages: 29
ISSN: 1947-8186|EISSN: 1947-8194|EISBN13: 9781466678583|DOI: 10.4018/IJISMD.2015040102
Cite Article Cite Article

MLA

Khodabandelou, Ghazaleh, et al. "Mining Users' Intents from Logs." IJISMD vol.6, no.2 2015: pp.43-71. http://doi.org/10.4018/IJISMD.2015040102

APA

Khodabandelou, G., Hug, C., & Salinesi, C. (2015). Mining Users' Intents from Logs. International Journal of Information System Modeling and Design (IJISMD), 6(2), 43-71. http://doi.org/10.4018/IJISMD.2015040102

Chicago

Khodabandelou, Ghazaleh, Charlotte Hug, and Camille Salinesi. "Mining Users' Intents from Logs," International Journal of Information System Modeling and Design (IJISMD) 6, no.2: 43-71. http://doi.org/10.4018/IJISMD.2015040102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Intentions play a key role in information systems engineering. Research on process modeling has highlighted that specifying intentions can expressly mitigate many problems encountered in process modeling as lack of flexibility or adaptation. Process mining approaches mine processes in terms of tasks and branching. To identify and formalize intentions from event logs, this work presents a novel approach of process mining, called Map Miner Method (MMM). This method automates the construction of intentional process models from event logs. First, MMM estimates users' strategies (i.e., the different ways to fulfill the intentions) in terms of their activities. These estimated strategies are then used to infer users' intentions at different levels of abstraction using two tailored algorithms. MMM constructs intentional process models with respect to the Map metamodel formalism. MMM is applied on a real-world dataset, i.e. event logs of developers of Eclipse UDC (Usage Data Collector). The resulting Map process model provides a precious understanding of the processes followed by the developers, and also provide feedback on the effectiveness and demonstrate scalability of MMM.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.