000 | 02999nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-3-642-45269-7 | ||
003 | DE-He213 | ||
005 | 20200421112551.0 | ||
007 | cr nn 008mamaa | ||
008 | 131120s2013 gw | s |||| 0|eng d | ||
020 |
_a9783642452697 _9978-3-642-45269-7 |
||
024 | 7 |
_a10.1007/978-3-642-45269-7 _2doi |
|
050 | 4 | _aQA76.9.D3 | |
072 | 7 |
_aUN _2bicssc |
|
072 | 7 |
_aUMT _2bicssc |
|
072 | 7 |
_aCOM021000 _2bisacsh |
|
082 | 0 | 4 |
_a005.74 _223 |
245 | 1 | 0 |
_aTransactions on Large-Scale Data- and Knowledge-Centered Systems XI _h[electronic resource] : _bSpecial Issue on Advanced Data Stream Management and Continuous Query Processing / _cedited by Abdelkader Hameurlain, Josef K�ung, Roland Wagner, Bernd Amann, Philippe Lamarre. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2013. |
|
300 |
_aX, 127 p. 37 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8290 |
|
505 | 0 | _aASSIST: Access Controlled Ship Identification Streams -- The HIT Model: Workflow-Aware Event Stream Monitoring -- P-Bench: Benchmarking in Data-Centric Pervasive Application Development -- Efficient Mining of Lag Patterns in Evolving Time Series -- On the Power of the Adversary to Solve the Node Sampling Problem. | |
520 | _aThis, the 11th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains five selected papers focusing on Advanced Data Stream Management and Processing of Continuous Queries. The contributions cover different methods for avoiding unauthorized access to streaming data, modeling complex real-time behavior of stream processing applications, comparing different event-centric and data-centric platforms for the development of applications in pervasive environments, capturing localized repeated associative relationships from multiple time series, and obtaining uniform and fresh sampling strategies over input data streams generated by large open systems containing malicious participants. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aDatabase management. | |
650 | 0 | _aData mining. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aDatabase Management. |
650 | 2 | 4 | _aData Mining and Knowledge Discovery. |
700 | 1 |
_aHameurlain, Abdelkader. _eeditor. |
|
700 | 1 |
_aK�ung, Josef. _eeditor. |
|
700 | 1 |
_aWagner, Roland. _eeditor. |
|
700 | 1 |
_aAmann, Bernd. _eeditor. |
|
700 | 1 |
_aLamarre, Philippe. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642452680 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8290 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-45269-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c58875 _d58875 |