{"id":"https://openalex.org/W2151795750","doi":"https://doi.org/10.14778/1453856.1453869","title":"Plan-based complex event detection across distributed sources","display_name":"Plan-based complex event detection across distributed sources","publication_year":2008,"publication_date":"2008-08-01","ids":{"openalex":"https://openalex.org/W2151795750","doi":"https://doi.org/10.14778/1453856.1453869","mag":"2151795750"},"language":"en","primary_location":{"id":"doi:10.14778/1453856.1453869","is_oa":false,"landing_page_url":"https://doi.org/10.14778/1453856.1453869","pdf_url":null,"source":{"id":"https://openalex.org/S4210226185","display_name":"Proceedings of the VLDB Endowment","issn_l":"2150-8097","issn":["2150-8097"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the VLDB Endowment","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074606611","display_name":"Mert Akdere","orcid":null},"institutions":[{"id":"https://openalex.org/I175594653","display_name":"John Brown University","ror":"https://ror.org/02ct41q97","country_code":"US","type":"education","lineage":["https://openalex.org/I175594653"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mert Akdere","raw_affiliation_strings":["Brown University"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Brown University","institution_ids":["https://openalex.org/I175594653"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109862110","display_name":"U\u011fur \u00c7etintemel","orcid":null},"institutions":[{"id":"https://openalex.org/I175594653","display_name":"John Brown University","ror":"https://ror.org/02ct41q97","country_code":"US","type":"education","lineage":["https://openalex.org/I175594653"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"U\u01e7ur \u00c7etintemel","raw_affiliation_strings":["Brown University"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Brown University","institution_ids":["https://openalex.org/I175594653"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002085554","display_name":"Nesime Tatbul","orcid":"https://orcid.org/0000-0002-0416-7022"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Nesime Tatbul","raw_affiliation_strings":["ETH Zurich"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"ETH Zurich","institution_ids":["https://openalex.org/I35440088"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5074606611"],"corresponding_institution_ids":["https://openalex.org/I175594653"],"apc_list":null,"apc_paid":null,"fwci":14.1048,"has_fulltext":false,"cited_by_count":136,"citation_normalized_percentile":{"value":0.99002011,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"1","issue":"1","first_page":"66","last_page":"77"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10317","display_name":"Advanced Database Systems and Queries","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10317","display_name":"Advanced Database Systems and Queries","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11106","display_name":"Data Management and Algorithms","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.770768404006958},{"id":"https://openalex.org/keywords/complex-event-processing","display_name":"Complex event processing","score":0.6832032203674316},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.6801447868347168},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.5519086718559265},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4971154034137726},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.492005318403244},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4902351498603821},{"id":"https://openalex.org/keywords/event-monitoring","display_name":"Event monitoring","score":0.48789143562316895},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4877384603023529},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4861711859703064},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.4801449477672577},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.4731995761394501},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4713194966316223},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.32553166151046753},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.289617121219635},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.27865171432495117},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.10482242703437805}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.770768404006958},{"id":"https://openalex.org/C123606473","wikidata":"https://www.wikidata.org/wiki/Q907918","display_name":"Complex event processing","level":3,"score":0.6832032203674316},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.6801447868347168},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.5519086718559265},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4971154034137726},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.492005318403244},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4902351498603821},{"id":"https://openalex.org/C2778135862","wikidata":"https://www.wikidata.org/wiki/Q5416719","display_name":"Event monitoring","level":3,"score":0.48789143562316895},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4877384603023529},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4861711859703064},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.4801449477672577},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.4731995761394501},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4713194966316223},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.32553166151046753},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.289617121219635},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27865171432495117},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.10482242703437805},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.14778/1453856.1453869","is_oa":false,"landing_page_url":"https://doi.org/10.14778/1453856.1453869","pdf_url":null,"source":{"id":"https://openalex.org/S4210226185","display_name":"Proceedings of the VLDB Endowment","issn_l":"2150-8097","issn":["2150-8097"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the VLDB Endowment","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.147.3614","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.3614","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.brown.edu/~ugur/ced.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1579145134","https://openalex.org/W1605983374","https://openalex.org/W1646696449","https://openalex.org/W1973322711","https://openalex.org/W1978933387","https://openalex.org/W2010801412","https://openalex.org/W2053913299","https://openalex.org/W2058978608","https://openalex.org/W2066417879","https://openalex.org/W2106105896","https://openalex.org/W2115503987","https://openalex.org/W2118751582","https://openalex.org/W2139781575","https://openalex.org/W2140393476","https://openalex.org/W2140954455","https://openalex.org/W2140970291","https://openalex.org/W2153329411","https://openalex.org/W2166604013","https://openalex.org/W2615155959"],"related_works":["https://openalex.org/W2096781418","https://openalex.org/W70655528","https://openalex.org/W2367311595","https://openalex.org/W1588840315","https://openalex.org/W2365881709","https://openalex.org/W2892249622","https://openalex.org/W2497332262","https://openalex.org/W4387873888","https://openalex.org/W2135630707","https://openalex.org/W912394015"],"abstract_inverted_index":{"Complex":[0],"Event":[1],"Detection":[2],"(CED)":[3],"is":[4],"emerging":[5],"as":[6,15,112,114],"a":[7],"key":[8],"capability":[9],"for":[10,117],"many":[11],"monitoring":[12],"applications":[13],"such":[14],"intrusion":[16],"detection,":[17],"sensor-based":[18],"activity":[19],"&amp;":[20],"phenomena":[21],"tracking,":[22],"and":[23,33,39,52,75,84,107,129,139],"network":[24],"monitoring.":[25],"Existing":[26],"CED":[27,61],"solutions":[28,133],"commonly":[29],"assume":[30],"centralized":[31],"availability":[32],"processing":[34,76],"of":[35,131],"all":[36],"relevant":[37],"events,":[38],"thus":[40],"incur":[41],"significant":[42],"overhead":[43],"in":[44],"distributed":[45,63],"settings.":[46],"In":[47],"this":[48],"paper,":[49],"we":[50,70],"present":[51,99],"evaluate":[53],"communication":[54],"efficient":[55],"techniques":[56,67],"that":[57,78],"can":[58],"efficiently":[59],"perform":[60],"across":[62],"event":[64,73,85,90],"sources.":[65],"Our":[66],"are":[68],"plan-based:":[69],"generate":[71],"multi-step":[72],"acquisition":[74],"plans":[77],"leverage":[79],"temporal":[80],"relationships":[81],"among":[82],"events":[83,121],"occurrence":[86],"statistics":[87],"to":[88],"minimize":[89],"transmission":[91],"costs,":[92],"while":[93],"meeting":[94],"application-specific":[95],"latency":[96],"expectations.":[97],"We":[98,125],"an":[100],"optimal":[101],"but":[102],"exponential-time":[103],"dynamic":[104],"programming":[105],"algorithm":[106],"two":[108],"polynomial-time":[109],"heuristic":[110],"algorithms,":[111],"well":[113],"their":[115],"extensions":[116],"detecting":[118],"multiple":[119],"complex":[120],"with":[122],"common":[123],"sub-expressions.":[124],"characterize":[126],"the":[127],"behavior":[128],"performance":[130],"our":[132,144],"via":[134],"extensive":[135],"experimentation":[136],"on":[137],"synthetic":[138],"real-world":[140],"data":[141],"sets":[142],"using":[143],"prototype":[145],"implementation.":[146]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":9},{"year":2016,"cited_by_count":12},{"year":2015,"cited_by_count":9},{"year":2014,"cited_by_count":13},{"year":2013,"cited_by_count":8},{"year":2012,"cited_by_count":12}],"updated_date":"2026-05-21T06:26:12.895304","created_date":"2025-10-10T00:00:00"}
