LEADER 03616nam 22006015 450 001 9910483860003321 005 20200704223745.0 010 $a3-642-45269-8 024 7 $a10.1007/978-3-642-45269-7 035 $a(CKB)3710000000031319 035 $a(DE-He213)978-3-642-45269-7 035 $a(SSID)ssj0001068035 035 $a(PQKBManifestationID)11650525 035 $a(PQKBTitleCode)TC0001068035 035 $a(PQKBWorkID)11094668 035 $a(PQKB)11183417 035 $a(MiAaPQ)EBC3093452 035 $a(PPN)176117989 035 $a(EXLCZ)993710000000031319 100 $a20131120d2013 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTransactions on Large-Scale Data- and Knowledge-Centered Systems XI$b[electronic resource] $eSpecial Issue on Advanced Data Stream Management and Continuous Query Processing /$fedited by Abdelkader Hameurlain, Josef Küng, Roland Wagner, Bernd Amann, Philippe Lamarre 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (X, 127 p. 37 illus.) 225 1 $aTransactions on Large-Scale Data- and Knowledge-Centered Systems,$x1869-1994 ;$v8290 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-45268-X 327 $aASSIST: Access Controlled Ship Identification Streams -- The HIT Model: Workflow-Aware Event Stream Monitoring -- P-Bench: Benchmarking in Data-Centric Pervasive Application Development -- Efficient Mining of Lag Patterns in Evolving Time Series -- On the Power of the Adversary to Solve the Node Sampling Problem. 330 $aThis, the 11th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains five selected papers focusing on Advanced Data Stream Management and Processing of Continuous Queries. The contributions cover different methods for avoiding unauthorized access to streaming data, modeling complex real-time behavior of stream processing applications, comparing different event-centric and data-centric platforms for the development of applications in pervasive environments, capturing localized repeated associative relationships from multiple time series, and obtaining uniform and fresh sampling strategies over input data streams generated by large open systems containing malicious participants. 410 0$aTransactions on Large-Scale Data- and Knowledge-Centered Systems,$x1869-1994 ;$v8290 606 $aDatabase management 606 $aData mining 606 $aDatabase Management$3https://scigraph.springernature.com/ontologies/product-market-codes/I18024 606 $aData Mining and Knowledge Discovery$3https://scigraph.springernature.com/ontologies/product-market-codes/I18030 615 0$aDatabase management. 615 0$aData mining. 615 14$aDatabase Management. 615 24$aData Mining and Knowledge Discovery. 676 $a005.74 702 $aHameurlain$b Abdelkader$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKüng$b Josef$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWagner$b Roland$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAmann$b Bernd$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLamarre$b Philippe$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910483860003321 996 $aTransactions on Large-Scale Data- and Knowledge-Centered Systems XI$92557483 997 $aUNINA