Abstract. Being able to activate triggers at timepoints reached or after time intervals elapsed has been acknowledged by many authors as a valuable functionality of a DBMS. Recentl...
Sensor networks have opened new horizons and opportunities for a variety of environmental monitoring, surveillance and healthcare applications. One of the major tasks of sensor ne...
Mobile information access involves retrieving information from wired service providers. Often there are situations where the information is not available from a single service pro...
Dipanjan Chakraborty, Filip Perich, Anupam Joshi, ...
This paper retrospectively analyzes the progress of event-based capability and their applicability in various domains. Although research on event-based approaches started in a hum...
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time and prevent execution. We argue that it is impossible to perfectly self-protec...
Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Mai...