期刊文献+

RFID Complex Event Processing: Applications in Real-Time Locating System 被引量:2

RFID Complex Event Processing: Applications in Real-Time Locating System
下载PDF
导出
摘要 Complex event processing (CEP) can extract meaningful events for real-time locating system (RTLS) applications. To identify complex event accurately in RTLS, we propose a new RFID complex event processing method GEEP, which is based on the timed automata (TA) theory. By devising RFID locating application into complex events, we model the timing diagram of RFID data streams based on the TA. We optimize the constraint of the event streams and propose a novel method to derive the constraint between objects, as well as the constraint between object and location. Experiments prove the proposed method reduces the cost of RFID complex event processing, and improves the efficiency of the RTLS. Complex event processing (CEP) can extract meaningful events for real-time locating system (RTLS) applications. To identify complex event accurately in RTLS, we propose a new RFID complex event processing method GEEP, which is based on the timed automata (TA) theory. By devising RFID locating application into complex events, we model the timing diagram of RFID data streams based on the TA. We optimize the constraint of the event streams and propose a novel method to derive the constraint between objects, as well as the constraint between object and location. Experiments prove the proposed method reduces the cost of RFID complex event processing, and improves the efficiency of the RTLS.
出处 《International Journal of Intelligence Science》 2012年第4期160-165,共6页 智能科学国际期刊(英文)
关键词 Complex Event Processing (CEP) REAL-TIME Locating System (RTLS) Radio Frequency Identification (RFID) TIMED AUTOMATA (TA) Event-Clock AUTOMATA (ECA) Complex Event Processing (CEP) Real-Time Locating System (RTLS) Radio Frequency Identification (RFID) Timed Automata (TA) Event-Clock Automata (ECA)
  • 相关文献

参考文献4

二级参考文献57

  • 1易平,蒋嶷川,张世永,钟亦平.移动ad hoc网络安全综述[J].电子学报,2005,33(5):893-899. 被引量:63
  • 2侯丽珊,金芝,吴步丹.需求驱动的Web服务建模及其验证:一个基于本体的方法[J].中国科学(E辑),2006,36(10):1189-1219. 被引量:11
  • 3Zhang Yong-guang and Lee Wenke. Intrusion detection in wireless Ad-hoc networks[C]. Proceedings of The Sixth International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, MA, August, 2000: 275-283. 被引量:1
  • 4Zhang Yong-guang and Lee Wenke. Intrusion Detection Techniques for Mobile Wireless Networks. Mobile Networks and Applications, 2003, 9(5): 545-556. 被引量:1
  • 5Kachirski O and Guha R. Intrusion detection using mobile agents in wireless ad hoc networks. IEEE Workshop on Knowledge Media Networking (KMN'02), Kyoto, Japan, 2002: 153-158. 被引量:1
  • 6Puttini R S, Percher J M, and Me L, et al.. A modular architecture for distributed IDS in MANET[C]. Proceedings of the 2003 International Conference on Computational Science and Its Applications (ICCSA 2003), Springer Verlag, LNCS 2668, San Diego, USA, 2003: 984-990. 被引量:1
  • 7Huang Yi-an and Lee Wenke. A cooperative intrusion detection system for ad hoc networks[C]. 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03), Fairfax, VA, USA, October 31, 2003: 135-147. 被引量:1
  • 8Sun B, Wu K, and Pooch U W. Routing anomaly detection in mobile ad hoc networks[C]. Proceedings of 12th International Conference on Computer Communications and Networks (ICCCN 03), Dallas, Texas, October 2003: 25-31. 被引量:1
  • 9Albers P, Camp O, Percher J M, and Jouga B, et al.. Security in ad hoc Networks: a general intrusion detection architecture enhancing trust based approaches. Proceedings of the First International Workshop on Wireless Information Systems (WIS-2002), Ciudad Real, Spain, Apr. 2002: 1-12. 被引量:1
  • 10Bhargava S and Agrawal D P. Security Enhancements in AODV Protocol for Wireless Ad Hoc Networks[C]. Vehicular Technology Conference, 2001: 2143-2147. 被引量:1

共引文献105

同被引文献17

  • 1Huang Yi, Zheng Li,Xiang Qing. RFID integrated real-time manu-facturing monitoring based on complex event processing [ J ]. Jour-nal of Tsinghua University(SciiKTech),2013,53(5) :721-728. 被引量:1
  • 2Roth M, Donath S. Applying complex event processing towards mo-nitoring of multi - party contracts and services for logistics - a discus -sion [C]. Business Process Management Workshops. Springer Ber-lin Heidelberg,2012:458463. 被引量:1
  • 3Gianpaolo C, Alessandro M. Complex event processing with T-REX[J]. Journal of Systems and Software,2012,85(8) : 1709-1728. 被引量:1
  • 4Wu E, Diao Y, Rizvi S. High-performance complex event process-ing over streams [ C]. ACM SIGMOD Conference on Managementof Data,2006:407-418. 被引量:1
  • 5Gyllstrom D,Wu E’Chae H,et al. SASE:complex event processingover streams [ C]. 3rd Biennial Conference on Innovative Data Sys-tems Research (CIDRW) ,2007:407411. 被引量:1
  • 6Demers A,Gehrke J,Panda B,et al. White W. Cayuga:a generalpurpose event monitoring system [ C]. 3rd Biennial Conference onInnovative Data Systems Research (CIDRW) ,2007 :412-422. 被引量:1
  • 7Mei Y,Madden S. ZStream:a cost-based query processor for adap-tively detecting composite events [ C ]. ACM SIGMOD Conferenceon Management of Data,2009 : 1 -14. 被引量:1
  • 8Gruber R E, Krishnamurthy B, Panagos E. The architecture of theREADY event notification service [C] ? Proc. of the 19th IEEE In-ternational Conference on Distributed Computing Systems Middle-ware Workshop, 1999 : 108-113. 被引量:1
  • 9Chakravarthy S,Mishra D. Snoop:an expressive event specificationlanguage for active databases[ J]. Data Knowledge Engineering,1994,14(1) :l-26. 被引量:1
  • 10Geppert A, Tombros D. Event-based distributed workflow executionwith EVE [ R]. Technical Report ifi-96. 05,University Zurich,Computer Science Department, 1996 : 1 -16. 被引量:1

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部