13 research outputs found

    complex event routing in pub/sub systems using traffic analysis model

    No full text
    Bringing in complex events in distributed Pub/Sub systems enables users to observe complicated event correlations over time and space. However, the routing of complex events in Pub/Sub systems is still largely unexplored, especially lacking q

    reuse strategies in distributed complex event detection

    No full text
    Software Engineering Society of Korean; Institute for Information Scientists and Engineers; IEEE Reliability Society; KAIST (Korea Advanced Institute of Science and Technology); Korea Information Promotion Agency; Samsung SDSIn a Pub/Sub system, the procedure of distributed event detection can be divided into two interacting phases: the subscription matching and the subscription/ event routing. Also, the performance of the system is greatly influenced by these two parts. Adopting a reuse strategy in matching and routing can reduce matching workload and network traffic. However, few of the existing researches provide a reuse solution comprehensively in distributed environments. This paper focuses on exploiting reuse to improve distributed complex event detection. The Pub/Sub system OGENS is introduced, in which the reuses are exploited in the channel-based subscription/event routing and the complex event matching. © 2009 IEEE

    an efficient primitive subscription matching algorithm for rfid applications

    No full text
    China Computer FederationPub/Sub systems can facilitate monitoring and managing objects for RFID applications. To fully support RFID applications, Pub/Sub systems should provide the means of subscribing RFID tags and the corresponding efficient matching algorithm. Th

    language-theoretic abstraction refinement

    No full text
    We give a language-theoretic counterexample-guided abstraction refinement (CEGAR) algorithm for the safety verification of recursive multi-threaded programs. First, we reduce safety verification to the (undecidable) language emptiness problem for the intersection of context-free languages. Initially, our CEGAR procedure overapproximates the intersection by a context-free language. If the overapproximation is empty, we declare the system safe. Otherwise, we compute a bounded language from the overapproximation and check emptiness for the intersection of the context free languages and the bounded language (which is decidable). If the intersection is non-empty, we report a bug. If empty, we refine the overapproximation by removing the bounded language and try again. The key idea of the CEGAR loop is the language-theoretic view: different strategies to get regular overapproximations and bounded approximations of the intersection give different implementations. We give concrete algorithms to approximate context-free languages using regular languages and to generate bounded languages representing a family of counterexamples. We have implemented our algorithms and provide an experimental comparison on various choices for the regular overapproximation and the bounded underapproximation. © 2012 Springer-Verlag Berlin Heidelberg.Institute of Cybernetics at TUT; "Tallinn University of Technology(TUT)"; EXCS Eur. Reg. Dev. Fund (ERDF); Estonian Convention Bureau; Microsoft ResearchWe give a language-theoretic counterexample-guided abstraction refinement (CEGAR) algorithm for the safety verification of recursive multi-threaded programs. First, we reduce safety verification to the (undecidable) language emptiness problem for the intersection of context-free languages. Initially, our CEGAR procedure overapproximates the intersection by a context-free language. If the overapproximation is empty, we declare the system safe. Otherwise, we compute a bounded language from the overapproximation and check emptiness for the intersection of the context free languages and the bounded language (which is decidable). If the intersection is non-empty, we report a bug. If empty, we refine the overapproximation by removing the bounded language and try again. The key idea of the CEGAR loop is the language-theoretic view: different strategies to get regular overapproximations and bounded approximations of the intersection give different implementations. We give concrete algorithms to approximate context-free languages using regular languages and to generate bounded languages representing a family of counterexamples. We have implemented our algorithms and provide an experimental comparison on various choices for the regular overapproximation and the bounded underapproximation. © 2012 Springer-Verlag Berlin Heidelberg

    composite subscription and matching algorithm for rfid applications

    No full text
    IEEE Computer SocietyRFID technology facilitates monitoring and managing products. In most RFID applications, users pay much attention to temporal and logical event patterns, which is further strengthened by highly temporal RFID data. If RFID events or other kinds of events

    subscribing and matching rfid-related events

    No full text
    IEEE Comp Soc TCEC, Univ Hong Kong, Hong Kong Univ Sci & TechnolPublish/subscribe service can deliver customized events and increase product visibility for users in RFID applications such as logistics supporting systems. This paper herein presents a composite subscription specification for RFID-related ap

    Application of chromatographic plate theory on the weathered crust elution-deposited rare earth ore with carboxylate

    No full text
    To improve the leaching process of rare earth and reduce the impurities in the leachate, the carboxylate ammonium, such as ammonium acetate, ammonium citrate and ammonium tartrate, were selected as lixiviant to compare the effects of concentration, flow rate, pH and temperature on leaching mass process of rare earth and aluminum. Meanwhile, the leaching behaviors of rare earth and aluminum leached by three kinds of carboxylate ammonium were analyzed by chromatographic plate theory. The relationship between the flow rate and height equivalent (HETP) could fit well with the Van Deemter equation and there was an optimal flow rate (uopt) for the leaching of the rare earth and aluminum. Besides, the conditions of carboxylate ammonium lixiviant were optimized. The optimum concentrations of ammonium acetate, ammonium tartrate and ammonium citrate were 15 g/L, 25 g/L and 5 g/L respectively, the leaching flow rate was 0.50 mL/min, the pH value was approximatively 7.00 and the leaching temperature was 293 K to 303 K. At these conditions, the mass transfer efficiencies of three ammonium carboxylates for rare earth and aluminum was in the order of ammonium acetate > ammonium tartrate > ammonium citrate. Moreover, the ammonium acetate could commendably inhibit aluminum ions entering the lixivium
    corecore