{"title":"Automatic Learning of Predictive CEP Rules: Bridging the Gap between Data Mining and Complex Event Processing","authors":"Raef Mousheimish, Y. Taher, K. Zeitouni","doi":"10.1145/3093742.3093917","DOIUrl":"https://doi.org/10.1145/3093742.3093917","url":null,"abstract":"Due to the undeniable advantage of prediction and proactivity, many research areas and industrial applications are accelerating the pace to keep up with data science and predictive analytics. However and due to three well-known facts, the reactive Complex Event Processing (CEP) technology might lag behind when prediction becomes a requirement. 1st fact: The one and only inference mechanism in this domain is totally guided by CEP rules. 2nd fact: The only way to define a CEP rule is by writing it manually with the help of a human expert. 3rd fact: Experts tend to write reactive CEP rules, because and regardless of the level of expertise, it is nearly impossible to manually write predictive CEP rules. Combining these facts together, the CEP is---and will stay--- a reactive computing technique. Therefore in this article, we present a novel data mining-based approach that automatically learns predictive CEP rules. The approach proposes a new learning algorithm where complex patterns from multivariate time series are learned. Then at run-time, a seamless transformation into the CEP world takes place. The result is a ready-to-use CEP engine with enrolled predictive CEP rules. Many experiments on publicly-available data sets demonstrate the effectiveness of our approach.","PeriodicalId":325666,"journal":{"name":"Proceedings of the 11th ACM International Conference on Distributed and Event-based Systems","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115823822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Autonomous and Dynamic Coordination and Discovery Service for Wide-Area Peer-to-peer Publish/Subscribe: Experience Paper","authors":"Kyoungho An, S. Khare, A. Gokhale, Akram Hakiri","doi":"10.1145/3093742.3093910","DOIUrl":"https://doi.org/10.1145/3093742.3093910","url":null,"abstract":"Industrial Internet of Things (IIoT) applications are mission-critical, which require a scalable data sharing and dissemination platform that supports quality of service (QoS) properties such as timeliness, resilience, and security. Although the Object Management Group (OMG)'s Data Distribution Service (DDS), which is a data-centric, peer-to-peer publish/subscribe standard supporting multiple QoS properties, is well-suited to meet the requirements of IIoT applications, its design and current technology limitations constrains its use to local area networks only. Moreover, although broker-based bridging services exist to inter-connect isolated DDS networks, these solutions lack autonomous and dynamic coordination and discovery capabilities that are needed to bridge multiple, isolated networks on demand. To address these limitations, and enable a practical and readily deployable solution for IIoT, this paper presents and empirically validates PubSubCoord, which is an autonomous, coordination and discovery service for DDS endpoints operating over wide area networks.","PeriodicalId":325666,"journal":{"name":"Proceedings of the 11th ACM International Conference on Distributed and Event-based Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130749995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vincenzo Gulisano, Zbigniew Jerzak, R. Katerinenko, M. Strohbach, H. Ziekow
{"title":"The DEBS 2017 Grand Challenge","authors":"Vincenzo Gulisano, Zbigniew Jerzak, R. Katerinenko, M. Strohbach, H. Ziekow","doi":"10.1145/3093742.3096342","DOIUrl":"https://doi.org/10.1145/3093742.3096342","url":null,"abstract":"The ACM DEBS 2017 Grand Challenge is the seventh in a series of challenges which seek to provide a common ground and evaluation criteria for a competition aimed at both research and industrial event-based systems. The focus of the 2017 Grand Challenge is on the analysis of the RDF streaming data generated by digital and analogue sensors embedded within manufacturing equipment. The analysis aims at the detection of anomalies in the behavior of such manufacturing equipment. This paper describes the specifics of the data streams and continuous queries that define the DEBS 2017 Grand Challenge. It also describes the benchmarking platform that supports testing of corresponding solutions.","PeriodicalId":325666,"journal":{"name":"Proceedings of the 11th ACM International Conference on Distributed and Event-based Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125433727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges with Image Event Processing: Poster","authors":"Asra Aslam, S. Hasan, E. Curry","doi":"10.1145/3093742.3095095","DOIUrl":"https://doi.org/10.1145/3093742.3095095","url":null,"abstract":"There has been substantial research in the area of event processing where systems are focused on event processing of structured data. However, in the context of smart cities, significant number of realtime applications for event-driven systems consist of image data, rather than structured events. Therefore, there is a need for a system that can process multimedia events such as images. This paper discusses challenges with processing images within event-based systems.","PeriodicalId":325666,"journal":{"name":"Proceedings of the 11th ACM International Conference on Distributed and Event-based Systems","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123475277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Miyuru Dayarathna, Prabhash Akmeemana, S. Perera, Malith Jayasinghe
{"title":"Solution Recommender for System Failure Recovery via Log Event Pattern Matching on a Knowledge Graph: Demo","authors":"Miyuru Dayarathna, Prabhash Akmeemana, S. Perera, Malith Jayasinghe","doi":"10.1145/3093742.3095094","DOIUrl":"https://doi.org/10.1145/3093742.3095094","url":null,"abstract":"System anomalies such as network interruptions, operating system halt, disk crash could result in significant financial losses to organizations. In this demonstration we describe a novel log event analysis framework called Solution Recommender which provides a ranked list of solutions to overcome such system errors. The solution recommender gathers log events via a publisher/subscriber mechanism and indexes them inside the WSO2 Data Analytics Server (DAS). Collected information is analyzed using a knowledge graph which conducts log event pattern matching to identify solutions for system failures. We have implemented the proposed approach on WSO2 Log Analyzer for WSO2 API Manager and tested its functionality. In this paper we describe our experience of implementing the log event recommender interlace, the first such recommender developed in a log event analyzer system. The insights presented here will assist practitioners with implementing such Log Event analysis solutions for real world scenarios.","PeriodicalId":325666,"journal":{"name":"Proceedings of the 11th ACM International Conference on Distributed and Event-based Systems","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121659297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ivo Correia, A. Artikis, Nikos Katzouris, Chris Baber, Natan Morar, Inna Skarbovsky, Fabiana Fournier, G. Paliouras
{"title":"Demonstration of a Prototype for Credit Card Fraud Management: Demo","authors":"Ivo Correia, A. Artikis, Nikos Katzouris, Chris Baber, Natan Morar, Inna Skarbovsky, Fabiana Fournier, G. Paliouras","doi":"10.1145/3093742.3095096","DOIUrl":"https://doi.org/10.1145/3093742.3095096","url":null,"abstract":"Credit card fraud management is accomplished most of the times through an automated process. However, there are occasions when machines cannot evaluate the outcome of a given case with enough confidence, and therefore, human domain expertise must be used to settle those transactions. This demo paper presents the two dashboards developed for the European project SPEEDD, which have the goal to provide a better detection tool for fraud analysts, focusing mostly on fraud flagging reasons, visual display of the information, and usage of context and correlation between transactions, to help successfully closing fraud cases.","PeriodicalId":325666,"journal":{"name":"Proceedings of the 11th ACM International Conference on Distributed and Event-based Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124534137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Event Crowd: A Novel Approach for Crowd-Enabled Event Processing","authors":"Piyush Yadav, U. Hassan, S. Hasan, E. Curry","doi":"10.1145/3093742.3093922","DOIUrl":"https://doi.org/10.1145/3093742.3093922","url":null,"abstract":"Event processing systems involve the processing of high volume and variety data which has inherent uncertainties like incomplete event streams, imprecise event recognition etc. With the emergence of crowdsourcing platforms, the performance of event processing systems can be enhanced by including 'human-in-the-loop' to leverage their cognitive ability. The resulting crowd-sourced event processing can cater to the problem of event uncertainty and veracity by using humans to verify the results. This paper introduces the first hybrid crowd-enabled event processing engine. The paper proposes a list of five event crowd operators that are domain and language independent and can be used by any event processing framework. These operators encapsulate the complexities to deal with crowd workers and allow developers to define an event-crowd hybrid workflow. The operators are: Annotate, Rank, Verify, Rate, and Match. The paper presents a proof of concept of event crowd operators, schedulers, poolers, aggregators in an event processing system. The paper demonstrates the implementation of these operators and simulates the system with various performance metrics. The experimental evaluation shows that throughput of the system was 7.86 events per second with average latency of 7.16 seconds for 100 crowd workers. Finally, the paper concludes with avenues for future research in crowd-enabled event processing.","PeriodicalId":325666,"journal":{"name":"Proceedings of the 11th ACM International Conference on Distributed and Event-based Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121518672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multilateral Context Analysis based on the Novel Visualization of Network Tomography: Poster","authors":"Young Yoon, Yongjun Choi, Suchul Shin","doi":"10.1145/3093742.3095090","DOIUrl":"https://doi.org/10.1145/3093742.3095090","url":null,"abstract":"In this paper, we present a novel method for visualizing the tomography of network flows. We offer visual cues to spot correlated network flows by conducting co-occurrence and sequence mining. We can focus the analysis of network flows on particular layer and map workflows of networked applications to the tomography. We show that our visualization method offers more intuitive means to track down the complicated symptoms of advanced and covert security threats.","PeriodicalId":325666,"journal":{"name":"Proceedings of the 11th ACM International Conference on Distributed and Event-based Systems","volume":"32 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114046778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FlowDB: Integrating Stream Processing and Consistent State Management","authors":"Lorenzo Affetti, Alessandro Margara, G. Cugola","doi":"10.1145/3093742.3093929","DOIUrl":"https://doi.org/10.1145/3093742.3093929","url":null,"abstract":"Recent advances in stream processing technologies led to their adoption in many large companies, where they are becoming a core element in the data processing stack. In these settings, stream processors are often used in combination with various kinds of data management frameworks to build software architectures that combine data storage, processing, retrieval, and mining. However, the adoption of separate and heterogeneous subsystems makes these architectures overmuch complex, and this hinders the design, development, maintenance, and evolution of the overall system. We address this issue by proposing a new model that integrates data management within a distributed stream processor. The model enables individual stream processing operators to persist data and make it visible and queryable from external components. It offers flexible mechanisms to control the consistency of data, including transactional updates plus ordering and integrity constraints. The paper contributes to the research on stream processing in various ways: we introduce a new model that has the potential to simplify complex data-intensive applications by integrating data management capabilities within a stream processing system; we define data consistency guarantees and show how they are enforced within this new model; we implement the model into the FlowDB prototype, and study its overhead with respect to a pure stream processing system using real world case studies and synthetic workloads. Finally, we further prove the benefits of the proposed model by showing that FlowDB can outperform a state-of-the-art, in-memory distributed database in data management tasks.","PeriodicalId":325666,"journal":{"name":"Proceedings of the 11th ACM International Conference on Distributed and Event-based Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114763183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joong-Hyun Choi, Kang-Woo Lee, Hyungkun Jung, Eun-Sun Cho
{"title":"Runtime Anomaly Detection Method in Smart Factories using Machine Learning on RDF Event Streams: Grand Challenge","authors":"Joong-Hyun Choi, Kang-Woo Lee, Hyungkun Jung, Eun-Sun Cho","doi":"10.1145/3093742.3095104","DOIUrl":"https://doi.org/10.1145/3093742.3095104","url":null,"abstract":"This year's ACM DEBS Grand Challenge problem is about anomaly detection of manufacturing equipments based on machine learning techniques, which is fairy challenging. This requires semi-realtime handling of RDF data values continuously collected in streams, measured from analog sensors attached to multiple machines. This paper shows our experience in implementing solutions of the problems in this domain. It includes our elaboration on high degree of concurrency in continuous query processing, to make better use of distributed environments provided by docker containers.","PeriodicalId":325666,"journal":{"name":"Proceedings of the 11th ACM International Conference on Distributed and Event-based Systems","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117300280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}