-
1
-
-
84874321208
-
Complex event processing
-
A. Buchmann and B. Koldehofe, "Complex event processing, " it - Information Technology, vol. 51:5, pp. 241-242, 2009.
-
(2009)
It - Information Technology
, vol.51
, Issue.5
, pp. 241-242
-
-
Buchmann, A.1
Koldehofe, B.2
-
2
-
-
79953812228
-
Event-based applications and enabling technologies
-
ser. DEBS '09, New York, NY, USA: ACM, 1:1-1:15
-
A. Hinze, K. Sachs, and A. Buchmann, "Event-based applications and enabling technologies, " in Proceedings of the Third ACM International Conference on Distributed Event-Based Systems, ser. DEBS '09. New York, NY, USA: ACM, 2009, pp. 1:1-1:15.
-
(2009)
Proceedings of the Third ACM International Conference on Distributed Event-Based Systems
-
-
Hinze, A.1
Sachs, K.2
Buchmann, A.3
-
4
-
-
33646818670
-
Composite subscriptions in content-based publish/subscribe systems
-
G. Li and H.-A. Jacobsen, "Composite subscriptions in content-based publish/subscribe systems, " in Proc of the 6th Int. Middleware Conf., 2005, pp. 249-269.
-
(2005)
Proc of the 6th Int. Middleware Conf.
, pp. 249-269
-
-
Li, G.1
Jacobsen, H.-A.2
-
5
-
-
77955803281
-
Cordies: Expressive event correlation in distributed systems
-
G. G. Koch, B. Koldehofe, and K. Rothermel, "Cordies: expressive event correlation in distributed systems, " in Proc. of the 4th ACM International Conference on Distributed Event-Based Systems (DEBS), 2010, pp. 26-37.
-
(2010)
Proc. of the 4th ACM International Conference on Distributed Event-Based Systems (DEBS)
, pp. 26-37
-
-
Koch, G.G.1
Koldehofe, B.2
Rothermel, K.3
-
6
-
-
84865037902
-
Moving range queries in distributed complex event processing
-
B. Koldehofe, B. Ottenwalder, K. Rothermel, and U. Ramachandran, "Moving range queries in distributed complex event processing, " in Proc. of the 6th ACM International Conference on Distributed Event-Based Systems (DEBS), 2012, pp. 201-212.
-
(2012)
Proc. of the 6th ACM International Conference on Distributed Event-Based Systems (DEBS)
, pp. 201-212
-
-
Koldehofe, B.1
Ottenwalder, B.2
Rothermel, K.3
RamacHandran, U.4
-
7
-
-
77955807458
-
Distributed heterogeneous event processing: Enhancing scalability and interoperability of cep in an industrial context
-
B. Schilling, B. Koldehofe, U. Pletat, and K. Rothermel, "Distributed heterogeneous event processing: Enhancing scalability and interoperability of CEP in an industrial context, " in Proc. of the 4th ACM International Conference on Distributed Event-Based Systems (DEBS), 2010, pp. 150-159.
-
(2010)
Proc. of the 4th ACM International Conference on Distributed Event-Based Systems (DEBS)
, pp. 150-159
-
-
Schilling, B.1
Koldehofe, B.2
Pletat, U.3
Rothermel, K.4
-
8
-
-
81555227845
-
Efficient and distributed rule placement in heavy constraint-driven event systems
-
B. Schilling, B. Koldehofe, and K. Rothermel, "Efficient and distributed rule placement in heavy constraint-driven event systems, " in Proc. of the 10th IEEE International Conference on High Performance Computing and Communications (HPCC), 2011, pp. 355-364.
-
(2011)
Proc. of the 10th IEEE International Conference on High Performance Computing and Communications (HPCC)
, pp. 355-364
-
-
Schilling, B.1
Koldehofe, B.2
Rothermel, K.3
-
9
-
-
77955821729
-
Providing basic security mechanisms in broker-less publish/subscribe systems
-
M. A. Tariq, B. Koldehofe, A. Altaweel, and K. Rothermel, "Providing basic security mechanisms in broker-less publish/subscribe systems, " in Proceedings of the 4th ACM Int. Conf. on Distributed Event-Based Systems (DEBS), 2010, pp. 38-49.
-
(2010)
Proceedings of the 4th ACM Int. Conf. on Distributed Event-Based Systems (DEBS)
, pp. 38-49
-
-
Tariq, M.A.1
Koldehofe, B.2
Altaweel, A.3
Rothermel, K.4
-
10
-
-
34548024416
-
Encryption-enforced access control in dynamic multidomain publish/subscribe networks
-
L. I. W. Pesonen, D. M. Eyers, and J. Bacon, "Encryption-enforced access control in dynamic multidomain publish/subscribe networks, " in Proc. of the 2007 ACM International Conference on Distributed Event-Based Systems (DEBS), 2007, pp. 104-115.
-
(2007)
Proc. of the 2007 ACM International Conference on Distributed Event-Based Systems (DEBS)
, pp. 104-115
-
-
Pesonen, L.I.W.1
Eyers, D.M.2
Bacon, J.3
-
11
-
-
57549093852
-
Access control in publish/subscribe systems
-
J. Bacon, D. M. Eyers, J. Singh, and P. R. Pietzuch, "Access control in publish/subscribe systems, " in Proc. of the 2nd ACM International Conference on Distributed Event-Based Systems (DEBS), 2008, pp. 23-34.
-
(2008)
Proc. of the 2nd ACM International Conference on Distributed Event-Based Systems (DEBS)
, pp. 23-34
-
-
Bacon, J.1
Eyers, D.M.2
Singh, J.3
Pietzuch, P.R.4
-
12
-
-
80054892311
-
Meeting subscriber-defined qos constraints in publish/subscribe systems
-
M. A. Tariq, B. Koldehofe, G. G. Koch, I. Khan, and K. Rothermel, "Meeting subscriber-defined QoS constraints in publish/subscribe systems, " Concurrency and Computation: Practice and Experience, vol. 23, no. 17, pp. 2140-2153, 2011.
-
(2011)
Concurrency and Computation: Practice and Experience
, vol.23
, Issue.17
, pp. 2140-2153
-
-
Tariq, M.A.1
Koldehofe, B.2
Koch, G.G.3
Khan, I.4
Rothermel, K.5
-
13
-
-
78149294401
-
Providing qos guarantees in large-scale operator networks
-
2010 12th IEEE International Conference on
-
S. Rizou, F. Durr, and K. Rothermel, "Providing qos guarantees in large-scale operator networks, " in High Performance Computing and Communications (HPCC), 2010 12th IEEE International Conference on, 2010, pp. 337 -345.
-
(2010)
High Performance Computing and Communications (HPCC)
, pp. 337-345
-
-
Rizou, S.1
Durr, F.2
Rothermel, K.3
-
15
-
-
0021518209
-
Stochastic relaxation, gibbs distributions, and the bayesian restoration of images
-
IEEE Transactions on
-
S. Geman and D. Geman, "Stochastic relaxation, gibbs distributions, and the bayesian restoration of images, " Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 6, pp. 721 -741, 1984.
-
(1984)
Pattern Analysis and Machine Intelligence
, vol.6
, pp. 721-741
-
-
Geman, S.1
Geman, D.2
-
16
-
-
84950453304
-
Sampling-based approaches to calculating marginal densities
-
A. E. Gelfand and A. F. M. Smith, "Sampling-based approaches to calculating marginal densities, " Journal of the American Statistical Association, vol. 85, no. 410, pp. 398-409, 1990.
-
(1990)
Journal of the American Statistical Association
, vol.85
, Issue.410
, pp. 398-409
-
-
Gelfand, A.E.1
Smith, A.F.M.2
-
17
-
-
0000049635
-
Exploiting causal independence in bayesian network inference
-
N. L. Zhang and D. Poole, "Exploiting causal independence in bayesian network inference, " Journal of Artificial Intelligence Research, vol. 5, pp. 301-328, 1996.
-
(1996)
Journal of Artificial Intelligence Research
, vol.5
, pp. 301-328
-
-
Zhang, N.L.1
Poole, D.2
-
18
-
-
76749092270
-
The weka data mining software: An update
-
November
-
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten, "The WEKA data mining software: an update, " SIGKDD Explor. Newsl., vol. 11, pp. 10-18, November 2009.
-
(2009)
SIGKDD Explor. Newsl
, vol.11
, pp. 10-18
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.H.6
-
20
-
-
50049089599
-
Enabling confidentiality in content-based publish/subscribe infrastructures
-
C. Raiciu and D. S. Rosenblum, "Enabling confidentiality in content-based publish/subscribe infrastructures, " in Securecomm and Workshops, 2006, 28, pp. 1 -11.
-
(2006)
Securecomm and Workshops
, vol.28
, pp. 1-11
-
-
Raiciu, C.1
Rosenblum, D.S.2
-
22
-
-
85025424440
-
An algebra for composing access control policies
-
February
-
P. Bonatti, S. De Capitani di Vimercati, and P. Samarati, "An algebra for composing access control policies, " ACM Trans. Inf. Syst. Secur., vol. 5, pp. 1-35, February 2002.
-
(2002)
ACM Trans. Inf. Syst. Secur
, vol.5
, pp. 1-35
-
-
Bonatti, P.1
De Capitani Di Vimercati, S.2
Samarati, P.3
-
23
-
-
81455142679
-
Security policy composition for composite web services
-
F. Satoh and T. Tokuda, "Security policy composition for composite web services, " Services Computing, IEEE Transactions on, vol. 4, pp. 314 -327, 2011.
-
(2011)
Services Computing, IEEE Transactions on
, vol.4
, pp. 314-327
-
-
Satoh, F.1
Tokuda, T.2
-
24
-
-
34547271784
-
Defeasible security policy composition for web services
-
A. J. Lee, J. P. Boyer, L. E. Olson, and C. A. Gunter, "Defeasible security policy composition for web services, " in Proc. of the 4th ACM Workshop on Formal Methods in Security, 2006, pp. 45-54.
-
(2006)
Proc. of the 4th ACM Workshop on Formal Methods in Security
, pp. 45-54
-
-
Lee, A.J.1
Boyer, J.P.2
Olson, L.E.3
Gunter, C.A.4
|