1 |
M. Thirumaran and G. G. Brendha, "Incremental stages of a semantic framework for automating the changes on long term composed services," Human-centric Computing and Information Sciences, vol. 6, no. 1, pp. 1-26, 2016.
DOI
|
2 |
C. G. Lee et al., "Monitoring of Timing Constraints with Confidence Threshold Requirements," IEEE Transactions on Computers, vol. 56, no. 7, pp. 977-991, 2007.
DOI
|
3 |
OASIS, Web Services Distributed Management: Management Using Web Services (MUWS 1.1) Part 1 and Web Services Distributed Management: Management Using Web Services (MUWS 1.1) Part 2, 01 August 2006. http://docs.oasis-open.org/wsdm/wsdm-muws1-1.1-spec-os-01.pdf.
|
4 |
G. Liu et al., "Composite Events for Network Event Correlation," in Proc. of the IFIP/IEEE Symposium on Integrated Network Management, 1999.
|
5 |
Apache ODE. http://ode.apache.org/index.html.
|
6 |
A. Asaf and E. Opher, "Amit-the situation manager," The International Journal on Very Large Data Bases, vol. 13, no. 2, pp. 177-203, May 2004.
DOI
|
7 |
Esper. http://www.espertech.com/.
|
8 |
H. N. Sad and T. Noria, "A Novel Approach for Integrating Security in Business Rules Modeling Using Agents and an Encryption Algorithm," Journal of Information Processing Systems, vol. 12, no. 4, pp. 688-710, 2016.
DOI
|
9 |
K. M. Chandy, S. Ramo and W. R. Schulte, "What is Event Driven Architecture (EDA) and Why Does it Matter?," Gartner Inc., March 2007.
|
10 |
T. Wang, S. Truptil and F. Benaben, "An automatic model-to-model mapping and transformation methodology to serve model-based systems engineering," Information Systems and e-Business Management, vol. 15, pp. 323-376, 2017.
DOI
|
11 |
K. M. Chandy, "Event-Driven Applications: Costs, Benefits and Design Approaches," California Institute of Technology, November 2006.
|
12 |
OASIS Standard, Web Services Business Process Execution Language Version 2.0. OASIS, 11 April 2007. http://docs.oasis-open.org/wsbpel/2.0/OS/wsbpel-v2.0-OS.html.
|
13 |
D. Luckham, The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems, Addison-Wesley, 2002.
|
14 |
K. Lin, N. Panahi, Y. Zhang and S. Chang, "Building Accountability Middleware to Support Dependable SOA," IEEE Internet Computing, vol. 13, no. 12, pp. 16-25, 2009.
DOI
|
15 |
L. Baresi, S. Guinea, M. Pistore and M. Trainotti, "Dynamo + Astro: An Integrated Approach for BPEL Monitoring," in Proc. of IEEE International Conference on Web Services (ICWS 2009), pp.230-237, 2009.
|
16 |
D. Luckham and B. Frasca, "Complex Event Processing in Distributed System," Stanford University Tech, Report CSL-TR-98-754, Mar, 1998.
|
17 |
M. Hellinger and S. Fingerhut, "Business Activity Monitoring: EAI Meets Data Warehousing," eAI JOURNAL, pp. 18-21, July 2002.
|
18 |
C. McGregor and J. Schiefer, "A Web-Service based framework for analyzing and measuring business performance," Information Systems and e-Business Management, vol. 2, no. 1, pp. 89-110, Springer, 2004.
|
19 |
D. Wang et al., "Utility-maximizing event stream suppression," in Proc. of 2013 ACM SIGMOD International Conference on Management of Data, pp. 589-600, June 2013.
|
20 |
A. K. Mok and G. Liu, "Efficient Runtime Monitoring of Timing Constraints," in Proc. of the IEEE Real-Time Technology and Applications Symposium (RTAS), 1997.
|