Extending Event-Driven Architecture for Proactive Systems
暂无分享,去创建一个
[1] Steve Vinoski,et al. Node.js: Using JavaScript to Build High-Performance Network Programs , 2010, IEEE Internet Comput..
[2] George Spanoudakis,et al. Proactive SLA Negotiation for Service Based Systems , 2010, 2010 6th World Congress on Services.
[3] Opher Etzion,et al. Towards proactive event-driven computing , 2011, DEBS '11.
[4] Opher Etzion,et al. A basic model for proactive event-driven computing , 2012, DEBS.
[5] Hiroyuki Kitagawa,et al. Probabilistic Event Stream Processing with Lineage , 2008 .
[6] Raymond J. Mooney,et al. Online Structure Learning for Markov Logic Networks , 2011, ECML/PKDD.
[7] Jignesh M. Patel,et al. Storm@twitter , 2014, SIGMOD Conference.
[8] John Lygeros,et al. Stochastic receding horizon control with output feedback and bounded controls , 2012, Autom..
[9] Gregor Hohpe,et al. Programming Without a Call Stack , 2007 .
[10] Andreas Metzger,et al. Proactive event processing in action: a case study on the proactive management of transport processes (industry article) , 2013, DEBS '13.
[11] Neil Immerman,et al. Recognizing patterns in streams with imprecise timestamps , 2010, Proc. VLDB Endow..
[12] Christopher Ré,et al. Event queries on correlated probabilistic streams , 2008, SIGMOD Conference.
[13] Andreas Metzger,et al. Predictive Monitoring of Heterogeneous Service-Oriented Business Networks: The Transport and Logistics Case , 2012, 2012 Annual SRII Global Conference.
[14] Avigdor Gal,et al. Efficient Processing of Uncertain Events in Rule-Based Systems , 2012, IEEE Transactions on Knowledge and Data Engineering.
[15] Mathias Kohler,et al. ProActive Caching - A Framework for Performance Optimized Access Control Evaluations , 2009, 2009 IEEE International Symposium on Policies for Distributed Systems and Networks.
[16] Thomas Kunz,et al. Energy-efficient proactive routing in MANET: Energy metrics accuracy , 2010, Ad Hoc Networks.
[17] Avigdor Gal,et al. Complex event processing over uncertain data , 2008, DEBS.
[18] Adi Shamir,et al. RFID Authentication Efficient Proactive Information Security within Computational Security , 2009, Theory of Computing Systems.
[19] Alexander Shapiro,et al. Stochastic programming approach to optimization under uncertainty , 2007, Math. Program..
[20] Cheng-Zhong Xu,et al. Exploring event correlation for failure prediction in coalitions of clusters , 2007, Proceedings of the 2007 ACM/IEEE Conference on Supercomputing (SC '07).
[21] Jay Kreps,et al. Kafka : a Distributed Messaging System for Log Processing , 2011 .
[22] Giordano Tamburrelli,et al. Introducing uncertainty in complex event processing: model, implementation, and validation , 2014, Computing.
[23] Opher Etzion,et al. Event Processing in Action , 2010 .
[24] Stephen P. Boyd,et al. Extending Scope of Robust Optimization: Comprehensive Robust Counterparts of Uncertain Problems , 2006, Math. Program..
[25] George A. Vouros,et al. Probabilistic Event Calculus for Event Recognition , 2012, ACM Trans. Comput. Log..
[26] Opher Etzion,et al. Event processing under uncertainty , 2012, DEBS.