In event processing systems, detected event patterns can reveal privacy-sensitive information. In this paper, we propose and discuss how to integrate pattern-level privacy protection in event-basedsystems. Compared t...
详细信息
Current XML-based publish/subscribe systems only support coarse-grained message filtering: a message is either forwarded to a subscriber in its entirety or not at all. Fine-grained filtering of message elements is not...
详细信息
the proceedings contain 6 papers. the topics discussed include: mercury: a reflective middleware for automatic parallelization of bags-of-tasks;a component-based approach for (Re)-configurable routing in VANETs;a refl...
ISBN:
(纸本)9781605588506
the proceedings contain 6 papers. the topics discussed include: mercury: a reflective middleware for automatic parallelization of bags-of-tasks;a component-based approach for (Re)-configurable routing in VANETs;a reflective middleware architecture for simulation integration;using machine learning to maintain QoS for publish/subscribe systems in dynamic environments;raced: an adaptive middleware for complex event detection;and a semantic composition model to preserve (Re)configuration consistency in aspect oriented middleware.
distributedevent-basedsystems (DEBS) provide a versatile solution for asynchronously exchanging data in a distributed system, loosely-coupled in space and time. In this work, the software architecture of a DEBS is c...
详细信息
ISBN:
(纸本)9781450332866
distributedevent-basedsystems (DEBS) provide a versatile solution for asynchronously exchanging data in a distributed system, loosely-coupled in space and time. In this work, the software architecture of a DEBS is composed of an overlay network of brokers that are responsible for routing data from producers to consumers. Important issues are the cost (in terms of exchanged messages) of the installation of routing filters (for advertisements and subscriptions) on the brokers, and the cost of routing notifications. In this work, we extend the usage of the concept of scope to propose the concept of multiscoping: the overlay of brokers is logically structured according to several dimensions (geographic location, network characteristics, client membership, etc.) with visibility filters installed at scope boundaries;these overlays are superposed;clients connect to brokers and express their scoping requirements on these dimensions;and distribution of notifications is controlled both by visibility and routing filters. Copyright 2015 acm.
Existing approaches to dynamic scaling of streaming applications often fail to incorporate uncertainty arising from performance variability of shared computing infrastructures, and rapid changes in offered load. We ex...
详细信息
We present the first version of PEPL, a declarative Process-oriented event-based Programming Language based on the recently introduced Dynamic Condition Response (DCR) Graphs model. DCR Graphs allow for specification,...
详细信息
Software-defined networking (SDN) is a recent development in the area of communication networks with tremendous support by key players building the next generation of com puter hardware and software. this development ...
详细信息
Recently, the notion of context aware computing has attracted attention in various domains, and was mentioned as emerging direction in Gartner's 2009 hype cycle for enterprise architecture. the paper provides a br...
详细信息
this paper considers the formation control problem of mobile robots over a network with limited communication bandwidth. To deal withthis problem, we proposed an event-triggered and quantized distributed controller b...
详细信息
ISBN:
(纸本)9781665454520
this paper considers the formation control problem of mobile robots over a network with limited communication bandwidth. To deal withthis problem, we proposed an event-triggered and quantized distributed controller based on an encoder-decoder mechanism. In this scheme, each agent can only send finite-bit symbolic data to its neighbors. the proposed event function is novel and modified for the formation problem. the feasibility of the presented scheme is shown by numerical simulation.
the Internet of things (IoT) envisions a huge number of networked sensors connected to the internet. these sensors collect large streams of data which serve as input to wide range of IoT applications and services such...
详细信息
ISBN:
(纸本)9781450357821
the Internet of things (IoT) envisions a huge number of networked sensors connected to the internet. these sensors collect large streams of data which serve as input to wide range of IoT applications and services such as e-health, e-commerce, and automotive services. Complex event Processing (CEP) is a powerful tool that transforms streams of raw sensor data into meaningful information required by these IoT services. Often these streams of data collected by sensors carry privacy-sensitive information about the user. thus, protecting privacy is of paramount importance in IoT services based on CEP. In this paper we present a novel pattern-level access control mechanism for CEP based services that conceals private information while minimizing the impact on useful non-sensitive information required by the services to provide a certain quality of service (QoS). the idea is to reorder events from the event stream to conceal privacy-sensitive event patterns while preserving non-privacy sensitive event patterns to maximize QoS. We propose two approaches, namely an ILP-based approach and a graph-based approach, calculating an optimal reordering of events. Our evaluation results show that these approaches are effective in concealing private patterns without significant loss of QoS.
暂无评论