Abstract
Process model guidance is an important feature by which the software process is orchestrated. Without complying with this guidance, the production lifecycle deviates from producing a reliable software with high-quality standards. Usually, teams break the process deliberately or impulsively. Application Lifecycle Management (ALM) tools log what teams do even if they break the process. The log file could be a key to discover the behavior of the undertaken process against the targeted process model. Since the date of its introduction, Process Mining techniques have been used in business process domains with no focus on the software engineering processes. This research brings the Process Mining techniques to the software engineering domain. The research shows a conclusive effort that used a Scrum adapted process model as an example of Agile adoption. This research has applied Process Mining discovery techniques to capture the actually implemented process by the Scrum team. This application clarifies the gap between the standard process guidance and the actually implemented one. The research’s results showed that Process Mining techniques have the ability to discover and verify the deviation on both levels; the process itself as well as the work items state-machine workflows.
Highlights
Software engineering process has become an integral part of any software production lifecycle definition
Without a model that governs the state-machine of the process phases, software engineering process will not be clearly defined
A good start was in the nineties, where processes' representation, monitoring, and visualization drew computer scientists’ attention as an essential block for extending the capabilities of information systems to enforce business processes
Summary
Software engineering process has become an integral part of any software production lifecycle definition. A good start was in the nineties, where processes' representation, monitoring, and visualization drew computer scientists’ attention as an essential block for extending the capabilities of information systems to enforce business processes. Since information system records all that happened, an event log can be prepared –if it was not originally prepared, and use it to identify the actual process that the event log depicts [6] This identification phase is denoted by Discovery. In order to check process conformance and analyze it, a discovery phase has to be applied to the recorded event log. Using both discovery and conformance checking the current process can be enhanced, considering the deviations are exceptions or unknown cases that are not handled by the process model.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advanced Computer Science and Applications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.