{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T14:56:34Z","timestamp":1777733794639,"version":"3.51.4"},"reference-count":23,"publisher":"Association for Computing Machinery (ACM)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2008,8]]},"abstract":"<jats:p>Complex Event Detection (CED) is emerging as a key capability for many monitoring applications such as intrusion detection, sensor-based activity &amp; phenomena tracking, and network monitoring. Existing CED solutions commonly assume centralized availability and processing of all relevant events, and thus incur significant overhead in distributed settings. In this paper, we present and evaluate communication efficient techniques that can efficiently perform CED across distributed event sources.<\/jats:p>\n          <jats:p>\n            Our techniques are\n            <jats:italic>plan-based:<\/jats:italic>\n            we generate multi-step event acquisition and processing plans that leverage temporal relationships among events and event occurrence statistics to minimize event transmission costs, while meeting application-specific latency expectations. We present an optimal but exponential-time dynamic programming algorithm and two polynomial-time heuristic algorithms, as well as their extensions for detecting multiple complex events with common sub-expressions. We characterize the behavior and performance of our solutions via extensive experimentation on synthetic and real-world data sets using our prototype implementation.\n          <\/jats:p>","DOI":"10.14778\/1453856.1453869","type":"journal-article","created":{"date-parts":[[2014,6,24]],"date-time":"2014-06-24T12:17:57Z","timestamp":1403612277000},"page":"66-77","source":"Crossref","is-referenced-by-count":92,"title":["Plan-based complex event detection across distributed sources"],"prefix":"10.14778","volume":"1","author":[{"given":"Mert","family":"Akdere","sequence":"first","affiliation":[{"name":"Brown University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"U\u01e7ur","family":"\u00c7etintemel","sequence":"additional","affiliation":[{"name":"Brown University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nesime","family":"Tatbul","sequence":"additional","affiliation":[{"name":"ETH Zurich"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2008,8]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Scalable Trigger Processing. ICDE","author":"Hanson Eric N.","year":"1999"},{"key":"e_1_2_1_2_1","volume-title":"Tinydb. TODS","author":"Madden S.","year":"2005"},{"key":"e_1_2_1_3_1","volume-title":"University of Cambridge","author":"Pietzuch Peter R.","year":"2004"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/RIDE.1994.282859"},{"key":"e_1_2_1_5_1","volume-title":"VLDB","author":"Chakravarthy S.","year":"1994"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/0169-023X(94)90006-X"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142520"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/311531.311623"},{"key":"e_1_2_1_9_1","volume-title":"On the Semantics of Complex Events in Active Database Management Systems. ICDE '99","author":"Unland D."},{"key":"e_1_2_1_10_1","unstructured":"The Power of Events. David Luckham May 2002.  The Power of Events. David Luckham May 2002."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/42201.42203"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247540"},{"key":"e_1_2_1_13_1","unstructured":"Pattern Recognition and Machine Learning. Bishop Christopher M. 2006 ISBN: 978-0-387-31073-2.  Pattern Recognition and Machine Learning. Bishop Christopher M. 2006 ISBN: 978-0-387-31073-2."},{"key":"e_1_2_1_14_1","unstructured":"Combinatorial optimization: algorithms and complexity. Christos H. Papadimitriou Kenneth Steiglitz. 1998.  Combinatorial optimization: algorithms and complexity. Christos H. Papadimitriou Kenneth Steiglitz. 1998."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/24.693785"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-005-0159-3"},{"key":"e_1_2_1_17_1","volume-title":"The Design of the Borealis Stream Processing Engine. CIDR '05","author":"Abadi Daniel"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872857"},{"key":"e_1_2_1_19_1","volume-title":"CIDR Conference","author":"Motwani R.","year":"2003"},{"key":"e_1_2_1_20_1","unstructured":"http:\/\/planetflow.planet-lab.org  http:\/\/planetflow.planet-lab.org"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/582095.582099"},{"key":"e_1_2_1_22_1","unstructured":"SNORT Network Intrusion Detection. http:\/\/www.snort.org  SNORT Network Intrusion Detection. http:\/\/www.snort.org"},{"key":"e_1_2_1_23_1","volume-title":"Event Detection Services Using Data Service Middleware in Distributed Sensor Networks. IPSN","author":"Li S.","year":"2003"}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/1453856.1453869","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T11:06:44Z","timestamp":1672225604000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/1453856.1453869"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,8]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,8]]}},"alternative-id":["10.14778\/1453856.1453869"],"URL":"https:\/\/doi.org\/10.14778\/1453856.1453869","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2008,8]]}}}