Pub Date : 2010-05-31DOI: 10.4018/978-1-60566-697-6
A. Hinze, A. Buchmann
Literary Education and Digital Learning: Methods and Technologies for Humanities Studies provides insight into the most relevant issues in literary education and digital learning. This unique reference fills a gap in literature teaching, covering literary aspects both from educational and research perspectives.
{"title":"Principles and Applications of Distributed Event-Based Systems","authors":"A. Hinze, A. Buchmann","doi":"10.4018/978-1-60566-697-6","DOIUrl":"https://doi.org/10.4018/978-1-60566-697-6","url":null,"abstract":"Literary Education and Digital Learning: Methods and Technologies for Humanities Studies provides insight into the most relevant issues in literary education and digital learning. This unique reference fills a gap in literature teaching, covering literary aspects both from educational and research perspectives.","PeriodicalId":253133,"journal":{"name":"Principles and Applications of Distributed Event-Based Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130334984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Keeney, Dominic Jones, Song Guo, D. Lewis, D. O’Sullivan
Content-based networks (CBN), such as [1--3], have formed around the necessity to match a varying subscriber base to that of a networks publication creators. This "de-coupling" of the parties involved in the communication process allows for message routing to be conducted based on who is interested in a particular message, through a routing table based on subscriber's filters applied to each message, rather than flooding the network in the search for interested possible parties. The underlying message routing structure allows for a message inserted anywhere in the network to propagate across the network based on positive matches to filters (subscriptions) until each and every client interested in the message has been notified in an efficient event-based manner.
{"title":"Knowledge-based networking","authors":"J. Keeney, Dominic Jones, Song Guo, D. Lewis, D. O’Sullivan","doi":"10.1145/1385989.1386034","DOIUrl":"https://doi.org/10.1145/1385989.1386034","url":null,"abstract":"Content-based networks (CBN), such as [1--3], have formed around the necessity to match a varying subscriber base to that of a networks publication creators. This \"de-coupling\" of the parties involved in the communication process allows for message routing to be conducted based on who is interested in a particular message, through a routing table based on subscriber's filters applied to each message, rather than flooding the network in the search for interested possible parties. The underlying message routing structure allows for a message inserted anywhere in the network to propagate across the network based on positive matches to filters (subscriptions) until each and every client interested in the message has been notified in an efficient event-based manner.","PeriodicalId":253133,"journal":{"name":"Principles and Applications of Distributed Event-Based Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129339448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/9781605666976.ch017
S. Tarkoma, J. Heikkinen, J. V. Gurp
{"title":"Mobile Push for Converged Mobile Services","authors":"S. Tarkoma, J. Heikkinen, J. V. Gurp","doi":"10.4018/9781605666976.ch017","DOIUrl":"https://doi.org/10.4018/9781605666976.ch017","url":null,"abstract":"","PeriodicalId":253133,"journal":{"name":"Principles and Applications of Distributed Event-Based Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114416387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-60566-697-6.CH002
Rolando Blanco, P. Alencar
Applications are regularly developed by composing functionality encapsulated in units of computation. Depending on the type of system these units of computation, components for short, include modules, classes, and programs. The functionality provided by components can be composed by procedural abstraction and implicit invocation (Garlan & Shaw, 1994; Dingel et al., 1998; Notkin et al., 1993). When composing functionality by procedural abstraction, also referred to as explicit invocation, names that identify a component are statically bound to the component implementing the functionality. This is the case of a function in one module invoking another function in another module, or a program in one computer using a Remote Procedure Call (RPC) to invoke functionality implemented by a different program on another computer. In contrast, when composing functionality by implicit invocation, a component announces an event. This event announcement triggers the invocation of functionality implemented by another component. The component announcing the event may or may not be required to know the name nor location of the component triggered by the event. aBsTRaCT
应用程序通常是通过组合封装在计算单元中的功能来开发的。根据系统的类型,这些计算单元(简称组件)包括模块、类和程序。组件提供的功能可以通过过程抽象和隐式调用组成(Garlan & Shaw, 1994;Dingel et al., 1998;Notkin et al., 1993)。当通过过程抽象(也称为显式调用)组合功能时,标识组件的名称被静态地绑定到实现该功能的组件。这是一个模块中的函数调用另一个模块中的另一个函数的情况,或者一台计算机中的程序使用远程过程调用(RPC)来调用由另一台计算机上的不同程序实现的功能。相反,当通过隐式调用组合功能时,组件会宣布一个事件。此事件公告触发对另一个组件实现的功能的调用。宣布该事件的组件可能需要也可能不需要知道由该事件触发的组件的名称和位置。摘要
{"title":"Event Models in Distributed Event Based Systems","authors":"Rolando Blanco, P. Alencar","doi":"10.4018/978-1-60566-697-6.CH002","DOIUrl":"https://doi.org/10.4018/978-1-60566-697-6.CH002","url":null,"abstract":"Applications are regularly developed by composing functionality encapsulated in units of computation. Depending on the type of system these units of computation, components for short, include modules, classes, and programs. The functionality provided by components can be composed by procedural abstraction and implicit invocation (Garlan & Shaw, 1994; Dingel et al., 1998; Notkin et al., 1993). When composing functionality by procedural abstraction, also referred to as explicit invocation, names that identify a component are statically bound to the component implementing the functionality. This is the case of a function in one module invoking another function in another module, or a program in one computer using a Remote Procedure Call (RPC) to invoke functionality implemented by a different program on another computer. In contrast, when composing functionality by implicit invocation, a component announces an event. This event announcement triggers the invocation of functionality implemented by another component. The component announcing the event may or may not be required to know the name nor location of the component triggered by the event. aBsTRaCT","PeriodicalId":253133,"journal":{"name":"Principles and Applications of Distributed Event-Based Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121206865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/9781605666976.ch005
D. Cutting, A. Quigley
{"title":"Serendipity Reloaded","authors":"D. Cutting, A. Quigley","doi":"10.4018/9781605666976.ch005","DOIUrl":"https://doi.org/10.4018/9781605666976.ch005","url":null,"abstract":"","PeriodicalId":253133,"journal":{"name":"Principles and Applications of Distributed Event-Based Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128054946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-60566-697-6.CH001
A. Gal, E. Hadar
In recent years, there has been a growing need for the use of active systems. Active systems perform automatic actions that may be reactive, such as responding to provided stimuli. They may also perform automatic actions that are proactive, such as predicting possible phenomena. While earliest active systems were directed to databases (Dayal U. et al. 1988, Widom & Ceri, 1996), a current major need for such active functionality covers other areas such as Business Activity Monitoring aBsTRaCT
近年来,有源系统的使用需求越来越大。主动系统执行可能是反应性的自动动作,例如对提供的刺激作出反应。它们还可以执行主动的自动操作,例如预测可能出现的现象。虽然最早的活动系统是针对数据库的(Dayal U. et al. 1988, Widom & Ceri, 1996),但目前对此类活动功能的主要需求涵盖了其他领域,如业务活动监控
{"title":"Generic Architecture of Complex Event Processing Systems","authors":"A. Gal, E. Hadar","doi":"10.4018/978-1-60566-697-6.CH001","DOIUrl":"https://doi.org/10.4018/978-1-60566-697-6.CH001","url":null,"abstract":"In recent years, there has been a growing need for the use of active systems. Active systems perform automatic actions that may be reactive, such as responding to provided stimuli. They may also perform automatic actions that are proactive, such as predicting possible phenomena. While earliest active systems were directed to databases (Dayal U. et al. 1988, Widom & Ceri, 1996), a current major need for such active functionality covers other areas such as Business Activity Monitoring aBsTRaCT","PeriodicalId":253133,"journal":{"name":"Principles and Applications of Distributed Event-Based Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115440490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-60566-697-6.CH007
Éric Piel, Alberto González-Sanchez, H. Groß
Publish/subscribe systems are event-based systems separated into several components which publish and subscribe events that correspond to data types. Testing each component individually is not sufficient for testing the whole system; it also requires testing the integration of those components together. In this chapter, first we identify the specificities and difficulties of integration testing of publish/subscribe systems. Afterwards, two different and complementary techniques to test the integration are presented. One is based on the random generation of a high number of event sequences and on generic oracles, in order to find a malfunctioning state of the system. The second one uses a limited number of predefined data-flows which must respect a precise behaviour, implementable with the same mechanism as unit-testing. As event-based systems are well fitted for runtime modification, the particularities of runtime testing are also introduced, and the usage in the context of integration testing is detailed. A case study presents an example of integration testing on a small system inspired by the systems used in the maritime safety and security domain.
{"title":"Automating Integration Testing of Large-Scale Publish/Subscribe Systems","authors":"Éric Piel, Alberto González-Sanchez, H. Groß","doi":"10.4018/978-1-60566-697-6.CH007","DOIUrl":"https://doi.org/10.4018/978-1-60566-697-6.CH007","url":null,"abstract":"Publish/subscribe systems are event-based systems separated into several components which publish and subscribe events that correspond to data types. Testing each component individually is not sufficient for testing the whole system; it also requires testing the integration of those components together. In this chapter, first we identify the specificities and difficulties of integration testing of publish/subscribe systems. Afterwards, two different and complementary techniques to test the integration are presented. One is based on the random generation of a high number of event sequences and on generic oracles, in order to find a malfunctioning state of the system. The second one uses a limited number of predefined data-flows which must respect a precise behaviour, implementable with the same mechanism as unit-testing. As event-based systems are well fitted for runtime modification, the particularities of runtime testing are also introduced, and the usage in the context of integration testing is detailed. A case study presents an example of integration testing on a small system inspired by the systems used in the maritime safety and security domain.","PeriodicalId":253133,"journal":{"name":"Principles and Applications of Distributed Event-Based Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127237674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-60566-697-6.CH012
Anton Michlmayr, P. Leitner, Florian Rosenberg, S. Dustdar
Service-oriented Architectures (SOA) and Web services have received a lot of attention from both industry and academia. Services as the core entities of every SOA are changing regularly based on various reasons. This poses a clear problem in distributed environments since service providers and consumers are generally loosely coupled. Using the publish/subscribe style of communication service consumers can be notified when such changes occur. In this chapter, we present an approach that leverages event processing mechanisms for Web service runtime environments based on a rich event model and different event visibilities. Our approach covers the full service lifecycle, including runtime information concerning service discovery and service invocation, as well as Quality of Service attributes. Furthermore, besides subscribing to events of interest, users can also search in historical event data. We show how this event notification support was integrated into our service runtime environment VRESCo and give some usage examples in an application context.
{"title":"Event Processing in Web Service Runtime Environments","authors":"Anton Michlmayr, P. Leitner, Florian Rosenberg, S. Dustdar","doi":"10.4018/978-1-60566-697-6.CH012","DOIUrl":"https://doi.org/10.4018/978-1-60566-697-6.CH012","url":null,"abstract":"Service-oriented Architectures (SOA) and Web services have received a lot of attention from both industry and academia. Services as the core entities of every SOA are changing regularly based on various reasons. This poses a clear problem in distributed environments since service providers and consumers are generally loosely coupled. Using the publish/subscribe style of communication service consumers can be notified when such changes occur. In this chapter, we present an approach that leverages event processing mechanisms for Web service runtime environments based on a rich event model and different event visibilities. Our approach covers the full service lifecycle, including runtime information concerning service discovery and service invocation, as well as Quality of Service attributes. Furthermore, besides subscribing to events of interest, users can also search in historical event data. We show how this event notification support was integrated into our service runtime environment VRESCo and give some usage examples in an application context.","PeriodicalId":253133,"journal":{"name":"Principles and Applications of Distributed Event-Based Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121362984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-60566-697-6.CH006
J. Bacon, D. Eyers, Jatinder Singh
This chapter examines techniques for securing various types of event-based systems. The first section discusses typical application requirements. The following section examines specific event dissemination approaches. Applying applicationlevel security to event-based systems is introduced at first, along with an overview of Role-Based Access Control. Application-level security is a perimeter defence for an event-based system. The next section demonstrates mechanisms for implementing security within a large-scale distributed broker network, including discussion of aBsTRaCT
{"title":"Securing Event-Based Systems","authors":"J. Bacon, D. Eyers, Jatinder Singh","doi":"10.4018/978-1-60566-697-6.CH006","DOIUrl":"https://doi.org/10.4018/978-1-60566-697-6.CH006","url":null,"abstract":"This chapter examines techniques for securing various types of event-based systems. The first section discusses typical application requirements. The following section examines specific event dissemination approaches. Applying applicationlevel security to event-based systems is introduced at first, along with an overview of Role-Based Access Control. Application-level security is a perimeter defence for an event-based system. The next section demonstrates mechanisms for implementing security within a large-scale distributed broker network, including discussion of aBsTRaCT","PeriodicalId":253133,"journal":{"name":"Principles and Applications of Distributed Event-Based Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121891395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-60566-697-6.CH018
Katrine Stemland Skjelsvik, V. Goebel, T. Plagemann
Rescue operations may occur in environments where there is no communication infrastructure or where the infrastructure has been damaged by the incident itself. In addition to, or as a replacement to radio and telephones, handheld PDA-like devices can be used at the rescue site for communication. Such devices run applications and can spontaneously form a mobile ad-hoc network (MANET) using their wireless network interfaces. The purpose of setting up such a network is to exchange aBsTRaCT
{"title":"Event-Based Interaction for Rescue and Emergency Applications in Mobile and Disruptive Environments","authors":"Katrine Stemland Skjelsvik, V. Goebel, T. Plagemann","doi":"10.4018/978-1-60566-697-6.CH018","DOIUrl":"https://doi.org/10.4018/978-1-60566-697-6.CH018","url":null,"abstract":"Rescue operations may occur in environments where there is no communication infrastructure or where the infrastructure has been damaged by the incident itself. In addition to, or as a replacement to radio and telephones, handheld PDA-like devices can be used at the rescue site for communication. Such devices run applications and can spontaneously form a mobile ad-hoc network (MANET) using their wireless network interfaces. The purpose of setting up such a network is to exchange aBsTRaCT","PeriodicalId":253133,"journal":{"name":"Principles and Applications of Distributed Event-Based Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134113897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}