Journal on Communications ›› 2016, Vol. 37 ›› Issue (9): 111-120.doi: 10.11959/j.issn.1000-436x.2016183
• Papers • Previous Articles Next Articles
Shao-feng GENG1,2,Yong-heng WANG1,Ren-fa LI1,Jia ZHANG2
Online:
2016-09-25
Published:
2016-09-28
Supported by:
Shao-feng GENG,Yong-heng WANG,Ren-fa LI,Jia ZHANG. Research of proactive complex event processing method[J]. Journal on Communications, 2016, 37(9): 111-120.
[1] | LUCKHAM D C . The power of events:an introduction to complex event processing in distributed enterprise systems[M]. Boston,Addison Wesley, 2002. |
[2] | ENGEL Y , ETZION O . Towards proactive event-driven computing[C]// The Fifth ACM International Conference on Distributed Event-Based Systems. 2011: 125-136. |
[3] | ETZION O , NIBLETT P . Event processing in action[M]. Manning Publications, 2010. |
[4] | WU E , DIAO Y , RIZVI S . High-performance complex event processing over streams[C]// 2006 ACM SIGMOD International Conference on Management of Data. 2006: 27-29. |
[5] | AGRAWAL J , DIAO Y , GYLLSTROM D . Efficient pattern matching over event streams[C]// SIGMOD Conference. 2008: 147-160. |
[6] | ZHANG H , DIAO Y , IMMERMAN N . Recognizing patterns in streams with imprecise timestamps[J]. PVLDB, 2010,3(1): 244-255. |
[7] | XU C , LIN S , LEI W . Complex event detection in probabilistic stream[C]// The 12th International Asia-Pacific Web Conference. 2010: 361-363. |
[8] | KAWASHIMA H , KITAGAWA H , LI X . Complex event processing over uncertain data streams[C]// The Fifth International Conference on P2P,Parallel,Grid,Cloud and Internet Computing. 2010: 521-526. |
[9] | KAWASHIMA H , KITAGAWA H , LI X . Complex event processing over uncertain data streams[C]// 3PGCIC. 2010: 521-526. |
[10] | WELBOURNE E,KHOUSSAINOVA N , LETCHNER J , et a1 . Cascadia:a system for specifying,detecting,and managing RFID events[C]// The 6th International Conference on Mobile Systems,Applications,and Services. 2008: 281-294. |
[11] | DOLEV S , KOPEETSKY M , SHAMIR A . RFID authentication efficient proactive information security within computational security[J]. Theory of Computing Systems, 2011,48(1): 132-149. |
[12] | KUNZ T , ALHALIMI R . Energy-efficient proactive routing in MANET:energy metrics accuracy[J]. Ad Hoc Networks, 2010,8(7): 755-766. |
[13] | ENGEL Y , ETZION O , FELDMAN Z . A basic model for proactive event-driven computing[C]// The 6th ACM International Conference on Distributed Event-Based Systems (DEBS'12). 2012: 107-118. |
[14] | ENGEL Y , ETZION O . Towards proactive event-driven computing[C]// The Fifth ACM International Conference on Distributed Event-Based Systems,DEBS. 2011: 125-136. |
[15] | JIA Q S . On state aggregation to approximate complex value functions in large-scale Markov decision processes[J]. IEEE Transactions on Automatic Control, 2011,56(2): 333-344. |
[16] | SUN T , ZHAO Q C , LUH P B . Incremental value iteration for timeaggregated Markov decision processes[J]. IEEE Transactions on Automatic Control, 2007,52(11): 2177-2182. |
[17] | POWELL W B . Approximate dynamic programming:solving the curse of dimensionality[M]. New York,Wiley-Inter Science, 2007. |
[18] | JIA Q S , ZHAO Q C . Strategy optimization for controlled Markov process with descriptive complexity constraint[J]. Science in China, 2009,52(11): 1993-2005. |
[19] | WANG Y H , CAO K N , ZHANG X M . Complex event processing over distributed probabilistic event streams computers and mathematics with applications[J]. Computers & Mathematics with Applications, 2012,66(10): 1808-1821. |
[20] | PASCALE A , NICOLI M . Adaptive Bayesian network for traffic flow prediction[C]// Statistical Signal Processing Workshop (SSP). IEEE, 2011: 177-180. |
[21] | 王永恒, 杨圣洪 . 分布式 RFID 数据流的复合事件检测方法[J]. 计算机应用研究, 2011,28(11): 4177-4179. WANG Y H , YANG S H . Complex event detection method for distributed RFID systems[J]. Application Research of Computer, 2011,28(11): 4177-4179. |
[22] | BEHRISCH M , BIEKER L , ERDMANN J ,et al. Sumo -simulation of urban mobility:an overview[C]// The Third International Conference on Advances in System Simulation. Barcelona,Spain, 2011: 63-68. |
[23] | WANG F , LIU S , LIU P ,et al. Bridging physical and virtual worlds:complex event processing for RFID data streams[C]// The 10th International Conference on Extending Database Technology (EDBT'2006). 2006: 588-607. |
[1] | Wei JIN, Fenghua LI, Mingjie YU, Yunchuan GUO, Ziyan ZHOU, Liang FANG. HDFS-oriented cryptographic key resource control mechanism [J]. Journal on Communications, 2022, 43(9): 27-41. |
[2] | Yimin MAO, Qianhu DENG, Zhigang CHEN. Parallel association rules incremental mining algorithm based on information entropy and genetic algorithm [J]. Journal on Communications, 2021, 42(5): 122-136. |
[3] | Tong WANG, Shan GAO, Huiwen GONG, Bo SUN. Research on forecast and recommendation technology of taxi passengers based on time-varying Markov decision process [J]. Journal on Communications, 2021, 42(2): 37-51. |
[4] | Liang YUAN, Xiao YU, Enjie DING, Xiaohu ZHAO, Shimin FENG, Da ZHANG, Tongyu LIU, Weidong WANG, Yanqiu HUANG. Research on key technologies of human-machine-environment states perception in mine Internet of things [J]. Journal on Communications, 2020, 41(2): 1-12. |
[5] | . Dual-architecture Internet supporting intelligent governance of cyber content [J]. Journal on Communications, 2019, 40(9): 1-14. |
[6] | Qing LI,Jiang ZHONG,Lili LI,Qi LI. Self-correcting complex semantic analysis method based on pre-training mechanism [J]. Journal on Communications, 2019, 40(12): 41-50. |
[7] | Yonglin PU,Jiong YU,Liang LU,Ziyang LI,Chen BIAN,Bin LIAO. Energy-efficient strategy for data migration and merging in Storm [J]. Journal on Communications, 2019, 40(12): 68-85. |
[8] | Yu FU, Yihan YU, Xiaoping WU. Differential privacy protection technology and its application in big data environment [J]. Journal on Communications, 2019, 40(10): 157-168. |
[9] | Jiang ZHU,Tingting WANG,Yonghui SONG,Yali LIU. Transmission scheduling scheme based on deep Q learning in wireless network [J]. Journal on Communications, 2018, 39(4): 35-44. |
[10] | Yonglin PU,Jiong YU,Liang LU,Chen BIAN,Bin LIAO,Ziyang LI. Energy-efficient strategy for work node by DRAM voltage regulation in storm [J]. Journal on Communications, 2018, 39(10): 97-117. |
[11] | Kun-fang ZHANG,Ming-ming LU,Lin ZHENG. Big data based metro crowd delivery system [J]. Journal on Communications, 2017, 38(Z2): 99-112. |
[12] | Le-tian SHA,Fu XIAO,Wei CHEN,Jing SUN,Ru-chuan WANG. Sensitive information leakage awareness method for big data platform based on multi-attributes decision-making and taint tracking [J]. Journal on Communications, 2017, 38(7): 56-69. |
[13] | Jun-xin SHEN,Ying-qian CHEN. Research on network analysis method for development ability of big data industry in underdeveloped area [J]. Journal on Communications, 2017, 38(12): 153-159. |
[14] | Lin ZHANG,Yan LIU,Ru-chuan WANG. Location publishing technology based on differential privacy-preserving for big data services [J]. Journal on Communications, 2016, 37(9): 46-54. |
[15] | Fei ZHU,Zhi-peng XU,Quan LIU,Yu-chen FU,Hui WANG. Online hierarchical reinforcement learning based on interrupting Option [J]. Journal on Communications, 2016, 37(6): 65-74. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|