|
|
|
|
LEADER |
02994nam a22005295i 4500 |
001 |
978-3-642-45269-7 |
003 |
DE-He213 |
005 |
20150519191321.0 |
007 |
cr nn 008mamaa |
008 |
131120s2013 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642452697
|9 978-3-642-45269-7
|
024 |
7 |
|
|a 10.1007/978-3-642-45269-7
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.D3
|
072 |
|
7 |
|a UN
|2 bicssc
|
072 |
|
7 |
|a UMT
|2 bicssc
|
072 |
|
7 |
|a COM021000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.74
|2 23
|
245 |
1 |
0 |
|a Transactions on Large-Scale Data- and Knowledge-Centered Systems XI
|h [electronic resource] :
|b Special Issue on Advanced Data Stream Management and Continuous Query Processing /
|c edited by Abdelkader Hameurlain, Josef Küng, Roland Wagner, Bernd Amann, Philippe Lamarre.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2013.
|
300 |
|
|
|a X, 127 p. 37 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 8290
|
505 |
0 |
|
|a ASSIST: Access Controlled Ship Identification Streams -- The HIT Model: Workflow-Aware Event Stream Monitoring -- P-Bench: Benchmarking in Data-Centric Pervasive Application Development -- Efficient Mining of Lag Patterns in Evolving Time Series -- On the Power of the Adversary to Solve the Node Sampling Problem.
|
520 |
|
|
|a This, the 11th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains five selected papers focusing on Advanced Data Stream Management and Processing of Continuous Queries. The contributions cover different methods for avoiding unauthorized access to streaming data, modeling complex real-time behavior of stream processing applications, comparing different event-centric and data-centric platforms for the development of applications in pervasive environments, capturing localized repeated associative relationships from multiple time series, and obtaining uniform and fresh sampling strategies over input data streams generated by large open systems containing malicious participants.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Database management.
|
650 |
|
0 |
|a Data mining.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Database Management.
|
650 |
2 |
4 |
|a Data Mining and Knowledge Discovery.
|
700 |
1 |
|
|a Hameurlain, Abdelkader.
|e editor.
|
700 |
1 |
|
|a Küng, Josef.
|e editor.
|
700 |
1 |
|
|a Wagner, Roland.
|e editor.
|
700 |
1 |
|
|a Amann, Bernd.
|e editor.
|
700 |
1 |
|
|a Lamarre, Philippe.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642452680
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 8290
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-45269-7
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|