CSCI 2950-T: Topics in Databases and Systems
Complex Event Processing
 Main          MOTD          Schedule          Details  

Basics: events, rules, and patterns
:
  1. An overview of the Rete algorithm for the many pattern/many object pattern match problem. (chapter 2 here).
  2. Scalable Trigger Processing. Hanson et al. ICDE 1999.
  3. Cayuga: A General Purpose Event Monitoring System. Demers et al., CIDR 2007.
  4. High-Performance Complex Event Processing over Streams. Wu et al., SIGMOD 2006.
  5. Expressing and optimizing sequence queries in database systems. Sadri et al., TODS 2004.
Web:
  1. A probabilistic approach to spatiotemporal theme pattern mining on weblogs. Mei et al., WWW 2006.
  2. NetProbe: A Fast and Scalable System for Fraud Detection in Online Auction Networks. Pandit et al., WWW 2007.
  3. Resource-adaptive real-time new event detection. Luo et al., SIGMOD 2007.
  4. A Stateful Intrusion Detection System for World-Wide Web Servers. Vigna et al. ACSAC 2003.
Audio, Video:
  1. Rule-based spatio-temporal query processing for video databases. Donderler et al., VLDB Journal 2004.
  2. Detecting Irregularities in Images and in Video. Boiman  and Irani, ICCV 2005.
  3. Query by Humming: a Time Series Database Approach. Zhu and Shasha, SIGMOD 2003.
  4. Querying Shapes of Histories. Agrawal et al., VLDB 1995.
Data Mining:
  1. Sequential Pattern Mining with Constraints on Large Protein Databases. Ho et al., COMAD 2005.
  2. Sequential PAttern Mining using a Bitmap Representation. Ayres et al., KDD 2002. 
  3. SPIRIT: Sequential Pattern Mining with Regular Expression Constraints. Garofalakis et al., VLDB 1999.
  4. Streaming Pattern Discovery in Multiple Time-Series. Papadimitriou at al., VLDB 2005.
Systems:
  1. Checking system rules using system-specific, programmer-written compiler extensions. Engler et al., OSDI 2000.
  2. Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code. Engler et al., SOSP 2001.
  3. Pip: Expecting the Unexpected in Distributed Systems. Reynolds et al., NSDI 2006.
Networks:
  1. Fast and Memory-Efficient Regular Expression Matching for Deep Packet Inspection. Yu et al. ANCS 2006.
  2. Protomatching Network Traffic for High Throughput Network Intrusion Detection. Rubin et al., CCS 2006.
Languages:
  1. From Uncertainty to Belief: Inferring the Specification Within. Kremenek et al., OSDI 2006
  2. PR_Miner: Automatically extracting implicit programming rules and detecting violations in Large Software Code. Li and Zhou, FSE 2005.