Basics: events, rules, and patterns:
- An overview of the Rete algorithm for the many pattern/many object pattern match problem. (chapter 2 here).
- Scalable Trigger Processing. Hanson et al. ICDE 1999.
- Cayuga: A General Purpose Event Monitoring System. Demers et al., CIDR 2007.
- High-Performance Complex Event Processing over Streams. Wu et al., SIGMOD 2006.
- Expressing and optimizing sequence queries in database systems. Sadri et al., TODS 2004.
Web:
- A probabilistic approach to spatiotemporal theme pattern mining on weblogs. Mei et al., WWW 2006.
- NetProbe: A Fast and Scalable System for Fraud Detection in Online Auction Networks. Pandit et al., WWW 2007.
- Resource-adaptive real-time new event detection. Luo et al., SIGMOD 2007.
- A Stateful Intrusion Detection System for World-Wide Web Servers. Vigna et al. ACSAC 2003.
Audio, Video:
- Rule-based spatio-temporal query processing for video databases. Donderler et al., VLDB Journal 2004.
- Detecting Irregularities in Images and in Video. Boiman and Irani, ICCV 2005.
- Query by Humming: a Time Series Database Approach. Zhu and Shasha, SIGMOD 2003.
- Querying Shapes of Histories. Agrawal et al., VLDB 1995.
Data Mining:
- Sequential Pattern Mining with Constraints on Large Protein Databases. Ho et al., COMAD 2005.
- Sequential PAttern Mining using a Bitmap Representation. Ayres et al., KDD 2002.
- SPIRIT: Sequential Pattern Mining with Regular Expression Constraints. Garofalakis et al., VLDB 1999.
- Streaming Pattern Discovery in Multiple Time-Series. Papadimitriou at al., VLDB 2005.
Systems:
- Checking system rules using system-specific, programmer-written compiler extensions. Engler et al., OSDI 2000.
- Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code. Engler et al., SOSP 2001.
- Pip: Expecting the Unexpected in Distributed Systems. Reynolds et al., NSDI 2006.
Networks:
- Fast and Memory-Efficient Regular Expression Matching for Deep Packet Inspection. Yu et al. ANCS 2006.
- Protomatching Network Traffic for High Throughput Network Intrusion Detection. Rubin et al., CCS 2006.
Languages:
- From Uncertainty to Belief: Inferring the Specification Within. Kremenek et al., OSDI 2006
- PR_Miner: Automatically extracting implicit programming rules and detecting violations in Large Software Code. Li and Zhou, FSE 2005.
|