Deadline-aware complex event processing models over distributed monitoring streams
نویسندگان
چکیده
منابع مشابه
Complex Event Processing over Distributed Uncertain Event Streams
In the 21st century, as technologies of perceptual recognition develops, devices of information generation begin to accurately sense, measure and monitor the physical world in real time.Complex Event Processing(CEP), which can be used to extract user level information from raw data, becomes the key part of the IoT middleware. Most of the current study of complex event processing has not focus o...
متن کاملActive Complex Event Processing over Event Streams
State-of-the-art Complex Event Processing technology (CEP),while effective for pattern query execution, is limited in itscapability of reacting to opportunities and risks detected bypattern queries. Especially reactions that affect the queryresults in turn have not been addressed in the literature.We propose to tackle these unsolved problems by embed-ding active rule sup...
متن کاملSASE: Complex Event Processing over Streams
RFID technology is gaining adoption on an increasing scale for tracking and monitoring purposes. Wide deployments of RFID devices will soon generate an unprecedented volume of data. Emerging applications require the RFID data to be filtered and correlated for complex pattern detection and transformed to events that provide meaningful, actionable information to end applications. In this work, we...
متن کاملSASE: Complex Event Processing over Streams (Demo)
RFID technology is gaining adoption on an increasing scale for tracking and monitoring purposes. Wide deployments of RFID devices will soon generate an unprecedented volume of data. Emerging applications require the RFID data to be filtered and correlated for complex pattern detection and transformed to events that provide meaningful, actionable information to end applications. In this work, we...
متن کاملMonitoring frequent items over distributed data streams
MONITORING FREQUENT ITEMS OVER DISTRIBUTED DATA STREAMS Robert H. Fuller April 3, 2007 Many important applications require the discovery of items which have occurred frequently. Knowledge of these items is commonly used in anomaly detection and network monitoring tasks. Effective solutions for this problem focus mainly on reducing memory requirements in a centralized environment. These solution...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematical and Computer Modelling
سال: 2012
ISSN: 0895-7177
DOI: 10.1016/j.mcm.2011.09.017