2018
DOI: 10.1007/978-3-030-03769-7_20
|View full text |Cite
|
Sign up to set email alerts
|

Scalable Online First-Order Monitoring

Abstract: Online monitoring is the task of identifying complex temporal patterns while incrementally processing streams of data-carrying events. Existing state-of-the-art monitors for first-order patterns, which may refer to and quantify over data values, can process streams of modest velocity in real-time. We show how to scale up first-order monitoring to substantially higher velocities by slicing the stream, based on the events' data values, into substreams that can be monitored independently. Because monitoring is no… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 44 publications
0
2
0
Order By: Relevance
“…We identify integration of such further techniques as avenues of possible future work. Advanced approaches can target scalability by performing slicing upon the event stream, by identifying substreams that can be independently monitored, or by exploiting hash-based partitioning techniques from databases research [32]. We note that our opportunistic, lightweight method of dealing with events excludes data repair techniques [33] in order to reduce complexity and load.…”
Section: Complex Event Processing and Data Streamsmentioning
confidence: 99%
See 1 more Smart Citation
“…We identify integration of such further techniques as avenues of possible future work. Advanced approaches can target scalability by performing slicing upon the event stream, by identifying substreams that can be independently monitored, or by exploiting hash-based partitioning techniques from databases research [32]. We note that our opportunistic, lightweight method of dealing with events excludes data repair techniques [33] in order to reduce complexity and load.…”
Section: Complex Event Processing and Data Streamsmentioning
confidence: 99%
“…Furthermore, our work can be considered complementary to those that study different RV techniques and languages for IoT systems: with our greybox design, we can support different logics and verification tools with minimal impact on the service architecture itself. Various approaches and RV tools exist in the literature [45], [46], [47]; as we show in Sec. 4, in order to support them, it would suffice to replace the MFOTL verification engine and provide the appropriate application model.…”
Section: Runtime Verification For the Iotmentioning
confidence: 99%