{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T06:40:58Z","timestamp":1759992058000,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,7,6]],"date-time":"2009-07-06T00:00:00Z","timestamp":1246838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,7,6]]},"DOI":"10.1145\/1619258.1619272","type":"proceedings-article","created":{"date-parts":[[2009,9,25]],"date-time":"2009-09-25T19:16:31Z","timestamp":1253906191000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["Tuning complex event processing rules using the prediction-correction paradigm"],"prefix":"10.1145","author":[{"given":"Yulia","family":"Turchin","sequence":"first","affiliation":[{"name":"Israel Institute of Technology, Haifa, Israel"}]},{"given":"Avigdor","family":"Gal","sequence":"additional","affiliation":[{"name":"Israel Institute of Technology, Haifa, Israel"}]},{"given":"Segev","family":"Wasserkrug","sequence":"additional","affiliation":[{"name":"IBM - Haifa Research Labs, Haifa, Israel"}]}],"member":"320","published-online":{"date-parts":[[2009,7,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-003-0108-y"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 2nd International Conference on Distributed Event-Based Systems (DEBS'08)","author":"Ammon R.","year":"2008","unstructured":"R. Ammon , C. Emmersberger , T. Greiner , A. Paschke , F. Springer , and C. Wolff . Event-driven business process management . In Proceedings of the 2nd International Conference on Distributed Event-Based Systems (DEBS'08) , Rome, Italy , July 2008 . R. Ammon, C. Emmersberger, T. Greiner, A. Paschke, F. Springer, and C. Wolff. Event-driven business process management. In Proceedings of the 2nd International Conference on Distributed Event-Based Systems (DEBS'08), Rome, Italy, July 2008."},{"key":"e_1_3_2_1_3_1","volume-title":"Department of Computer Science","author":"Anderson K.","year":"2004","unstructured":"K. Anderson , A. Carzaniga , D. Heimbigner , and A. Wolf . Event-based document sensing for insider threats. Technical report , Department of Computer Science , University of Colorado , Boulder, Colorado , Feb. 2004 . K. Anderson, A. Carzaniga, D. Heimbigner, and A. Wolf. Event-based document sensing for insider threats. Technical report, Department of Computer Science, University of Colorado, Boulder, Colorado, Feb. 2004."},{"key":"e_1_3_2_1_4_1","volume-title":"Intrusion detection systems. a survey and taxonomy. Technical report","author":"Axelsson S.","year":"2000","unstructured":"S. Axelsson . Intrusion detection systems. a survey and taxonomy. Technical report , 2000 . S. Axelsson. Intrusion detection systems. a survey and taxonomy. Technical report, 2000."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497596"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2005.75"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1385989.1386018"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-005-5724-z"},{"key":"e_1_3_2_1_9_1","volume-title":"IEEE International Conference on Data Mining - Life Sciences Data Mining Workshop","author":"Campbell M.","year":"2004","unstructured":"M. Campbell , C.-S. Li , C. Aggarwal , M. Naphade , K.-L. Wu , and T. Zhang . An evaluation of over-the-counter medication sales for syndromic surveillance . In IEEE International Conference on Data Mining - Life Sciences Data Mining Workshop , 2004 . M. Campbell, C.-S. Li, C. Aggarwal, M. Naphade, K.-L. Wu, and T. Zhang. An evaluation of over-the-counter medication sales for syndromic surveillance. In IEEE International Conference on Data Mining - Life Sciences Data Mining Workshop, 2004."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/0169-023X(94)90006-X"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2007.4281487"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.21"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-004-7778-z"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.950318"},{"key":"e_1_3_2_1_15_1","first-page":"412","volume-title":"CIDR 2007, Third Biennial Conference on Innovative Data Systems Research","author":"Demers A.","year":"2007","unstructured":"A. Demers , J. Gehrke , B. Panda , M. Riedewald , V. Sharma , and W. White . Cayuga: A general purpose event monitoring system . In CIDR 2007, Third Biennial Conference on Innovative Data Systems Research , pages 412 -- 422 , Asilomar, CA, USA , Jan. 2007 . www.crdrdb.org. A. Demers, J. Gehrke, B. Panda, M. Riedewald, V. Sharma, and W. White. Cayuga: A general purpose event monitoring system. In CIDR 2007, Third Biennial Conference on Innovative Data Systems Research, pages 412--422, Asilomar, CA, USA, Jan. 2007. www.crdrdb.org."},{"key":"e_1_3_2_1_16_1","first-page":"180","volume-title":"Proceedings of the 1st International Workshop on Rules in Database Systems","author":"Diaz O.","year":"1993","unstructured":"O. Diaz , A. Jaime , and N. Paton . Dear: a debugger for active rules in an object-oriented context . In Proceedings of the 1st International Workshop on Rules in Database Systems , pages 180 -- 193 , Aug 1993 . O. Diaz, A. Jaime, and N. Paton. Dear: a debugger for active rules in an object-oriented context. In Proceedings of the 1st International Workshop on Rules in Database Systems, pages 180--193, Aug 1993."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/846183.846199"},{"key":"e_1_3_2_1_18_1","volume-title":"Publish\/Subscribe and Message Filtering Technologies. IGI Global","author":"Gal A.","year":"2009","unstructured":"A. Gal and E. Hadar . Generic architecture of complex event processing systems. In A. Hinze and A. Buchmann, editors, Handbook of Research on Advanced Distributed Event-Based Systems , Publish\/Subscribe and Message Filtering Technologies. IGI Global , 2009 . A. Gal and E. Hadar. Generic architecture of complex event processing systems. In A. Hinze and A. Buchmann, editors, Handbook of Research on Advanced Distributed Event-Based Systems, Publish\/Subscribe and Message Filtering Technologies. IGI Global, 2009."},{"key":"e_1_3_2_1_19_1","volume-title":"Applied Optimal Estimation","author":"Gelb A.","year":"1974","unstructured":"A. Gelb , editor. Applied Optimal Estimation . MIT Press , Cambridge, MA , 1974 . A. Gelb, editor. Applied Optimal Estimation. MIT Press, Cambridge, MA, 1974."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-006-0015-4"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-6089-0","volume-title":"Tabu Search","author":"Glover F.","year":"1997","unstructured":"F. Glover and M. Laguna . Tabu Search . Kluwer, Norwell , MA. , 1997 . F. Glover and M. Laguna. Tabu Search. Kluwer, Norwell, MA., 1997."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2007.17"},{"key":"e_1_3_2_1_23_1","volume-title":"Publish\/Subscribe and Message Filtering Technologies. IGI Global","author":"Hinze A.","year":"2009","unstructured":"A. Hinze and A. Buchmann , editors. Handbook of Research on Advanced Distributed Event-Based Systems , Publish\/Subscribe and Message Filtering Technologies. IGI Global , 2009 . A. Hinze and A. Buchmann, editors. Handbook of Research on Advanced Distributed Event-Based Systems, Publish\/Subscribe and Message Filtering Technologies. IGI Global, 2009."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1115\/1.3662552"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/956415.956436"},{"key":"e_1_3_2_1_26_1","volume-title":"Darpa intrusion detection evaluation","author":"Labs L.","year":"1999","unstructured":"L. Labs . Darpa intrusion detection evaluation , 1999 . L. Labs. Darpa intrusion detection evaluation, 1999."},{"key":"e_1_3_2_1_27_1","volume-title":"The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems","author":"Luckham D.","year":"2002","unstructured":"D. Luckham . The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems . Addison-Wesley , 2002 . D. Luckham. The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems. Addison-Wesley, 2002."},{"key":"e_1_3_2_1_28_1","volume-title":"Intrusion and Intrusion Detection","author":"McHugh J.","year":"2001","unstructured":"J. McHugh . Intrusion and Intrusion Detection . 2001 . J. McHugh. Intrusion and Intrusion Detection. 2001."},{"issue":"12","key":"e_1_3_2_1_29_1","article-title":"Network intrusion detection using naive bayes","volume":"7","author":"Panda M.","year":"2007","unstructured":"M. Panda and M. R. Patra . Network intrusion detection using naive bayes . IJCSNS International Journal of Computer Science and Network Security , 7 ( 12 ), December 2007 . M. Panda and M. R. Patra. Network intrusion detection using naive bayes. IJCSNS International Journal of Computer Science and Network Security, 7(12), December 2007.","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2004.1265833"},{"key":"e_1_3_2_1_31_1","volume-title":"22th International Workshop on Bayesian Inference and Maximum Entropy Methods in Science and Engineering","author":"Puttini R.","year":"2002","unstructured":"R. Puttini , Z. Marrakchi , and L. M\u00e9 . A bayesian classification model for real-time intrusion detection . In 22th International Workshop on Bayesian Inference and Maximum Entropy Methods in Science and Engineering , 2002 . R. Puttini, Z. Marrakchi, and L. M\u00e9. A bayesian classification model for real-time intrusion detection. In 22th International Workshop on Bayesian Inference and Maximum Entropy Methods in Science and Engineering, 2002."},{"key":"e_1_3_2_1_32_1","volume-title":"In London Communication Symposium","author":"Sebyala A.","year":"2002","unstructured":"A. Sebyala , T. Olukemi , and L. Sacks . Active platform security through intrusion detection using nave bayesian network for anomaly detection . In In London Communication Symposium , 2002 . A. Sebyala, T. Olukemi, and L. Sacks. Active platform security through intrusion detection using nave bayesian network for anomaly detection. In In London Communication Symposium, 2002."},{"key":"e_1_3_2_1_33_1","volume-title":"In Preceedings of the IEEE Symposium of Security and Privacy","author":"Valdes A.","year":"1991","unstructured":"A. Valdes and K. Skinner . Adaptive, model-based monitoring for cyber attack detection . In In Preceedings of the IEEE Symposium of Security and Privacy , 1991 . A. Valdes and K. Skinner. Adaptive, model-based monitoring for cyber attack detection. In In Preceedings of the IEEE Symposium of Security and Privacy, 1991."},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 1st Int'l Workshop on Knowledge Discovery from Sensor Data, in conjunction with ACM 13th Int'l Conference on Knowledge Discovery and Data Mining","author":"Vijayakumar N.","year":"2007","unstructured":"N. Vijayakumar and B. Plale . Prediction of missing events in sensor data streams using kalman filters . In Proceedings of the 1st Int'l Workshop on Knowledge Discovery from Sensor Data, in conjunction with ACM 13th Int'l Conference on Knowledge Discovery and Data Mining , Aug. 2007 . N. Vijayakumar and B. Plale. Prediction of missing events in sensor data streams using kalman filters. In Proceedings of the 1st Int'l Workshop on Knowledge Discovery from Sensor Data, in conjunction with ACM 13th Int'l Conference on Knowledge Discovery and Data Mining, Aug. 2007."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.74"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1385989.1386022"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1385989.1386014"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/1758126.1758141"}],"event":{"name":"DEBS '09: The 3rd ACM International Conference on Distributed Event-based Systems","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Nashville Tennessee","acronym":"DEBS '09"},"container-title":["Proceedings of the Third ACM International Conference on Distributed Event-Based Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1619258.1619272","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1619258.1619272","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:23Z","timestamp":1750249403000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1619258.1619272"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,6]]},"references-count":38,"alternative-id":["10.1145\/1619258.1619272","10.1145\/1619258"],"URL":"https:\/\/doi.org\/10.1145\/1619258.1619272","relation":{},"subject":[],"published":{"date-parts":[[2009,7,6]]},"assertion":[{"value":"2009-07-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}