[1]
|
Y. GU, G. YU and T. C. Zhang, “RFID Complex Event Processing Techniques,” Journal of Computer Science and Frontiers, Vol. 1, No. 3, 2007, pp. 255-267.
|
[2]
|
C. Guo, K. Li, Y. Y. Wang, S. H. Liu and H. A. Wang, “A Location Index for Range Query in Real-Time Locating System,” Journal of Computer Research and Development, Vol. 48, No. 10, 2011, pp. 1908-1917.
|
[3]
|
F. S. Wang, S. R. Liu, P. Y. Liu, “Complex RFID Event Processing,” The VLDB Journal, Vol. 18, No. , 2009, pp. 913-931. doi:10.1007/s00778-009-0139-0
|
[4]
|
W. Yao, C.-H. Chu and Z. Li, “Leveraging Complex Event Processing for Smart Hospitals Using,” Journal of Network and Computer Applications, Vol. 34, No. 3, 2011, pp. 799-810. doi:10.1016/j.jnca.2010.04.020
|
[5]
|
D. C. Luckham, “The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems,” Addison-Wesley Long-man Publishing Co., Inc., Boston, 2001.
|
[6]
|
F. Fabret, H. Jaconsen, P. Lirbeta, K. Ross and D. Shasha, “Filtering Algorithm and Implementation for Very Fast Publish/Subscribe System,” Sigmod, Vol. 30, No. 2, 2001, pp. 115-126. doi:10.1145/375663.375677
|
[7]
|
E. Wu, Y. Diao and S. Rizvi, “High-Performance Complex Event Processing over Streams,” SIGMOD, Chicago, 27-29 June 2006, pp. 407-418.
doi:10.1145/1142473.1142520
|
[8]
|
M. Altinel and M. Franklin, “Efficient Filtering of XML Documents for Selective Dissemination of Information,” Proceedings of the 26th International Conference on VLDB, Cairo, 10-14 September 2000, pp. 53-64.
|
[9]
|
SAX Project Organization, “SAX: Simple API for XML,” 2004. http://www.saxproject.org/
|
[10]
|
Y. Diao, M. Altinel, M. Franklin, H. Zhang and P. Fischer, “Path Sharing and Predicate Evaluation for High-Performance XML Filtering,” ACM Transactions on Database Systems, Vol. 28, No. 4, 2003, pp. 467-516.
doi:10.1145/958942.958947
|
[11]
|
R. Alur, L. Fix and T. A. Henzinger, “Event-Clock Automata: A Determinizable Class of Timed Automata [C],” Proceeding of the 6th Annual Conference on Computer aided Veification (CAV). Lecture notes in computer science 818, Springer-Verlag, London, 1994, pp.1-13.
|
[12]
|
Y. Ping, L. Ning, W. Yue, “Intrusion Detection Based Timed Automata for Ad Hoc Networks,” Journal of Electronics & Information Technology, Vol. 31, No. 10, 2009, pp. 2310-2315.
|
[13]
|
L.-X. Li and Z. Jin, “Modeling and Verifying Services of Internet of Things Based on Timed Automata,” Chinese Journal of Computers, Vol. 34, No. 8, 2011, pp. 1366- 1377.
|
[14]
|
A. Repanovici, “Smart Library: RFID Implementation in Libraries [C],” Proceedings of the 8th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering and Data Bases, Cambridge, 21-23 February 2009, pp. 523-526.
|
[15]
|
Y. M. Nie, Z. H. Li and Q. Chen, “Enhanced Probabilistic Interpretation over Uncertain Radio Frequency Identification Data Streams,” Journal of Xi’an Jiaotong University, Vol. 45, No. 12, 2011, pp. 45-52.
|