skip to main content
10.1145/2335484.2335496acmconferencesArticle/Chapter ViewAbstractPublication PagesdebsConference Proceedingsconference-collections
research-article

A basic model for proactive event-driven computing

Published:16 July 2012Publication History

ABSTRACT

During the movie "Source Code" there is a shift in the plot; from (initially) reacting to a train explosion that already occurred and trying to eliminate further explosions, to (later) changing the reality to avoid the original train explosion. Whereas changing the history after events have happened is still within the science fiction domain, changing the reality to avoid events that have not happened yet is, in many cases, feasible, and may yield significant benefits. We use the term proactive behavior to designate the change of what will be reality in the future. In particular, we focus on proactive event-driven computing: the use of event-driven systems to predict future events and react to them before they occur. In this paper we start our investigation of this large area by constructing a model and end-to-end implementation of a restricted subset of basic proactive applications that is trying to eliminate a single forecasted event, selecting between a finite and relatively small set of feasible actions, known at design time, based on quantified cost functions over time. After laying out the model, we describe the extensions required of the conceptual architecture of event processing to support such applications: supporting proactive agents as part of the model, supporting the derivation of forecasted events, and supporting various aspects of uncertainty; next, we show a decision algorithm that selects among the alternatives. We demonstrate the approach by implementing an example of a basic proactive application in the area of condition based maintenance, and showing experimental results.

References

  1. C. Boutilier, T. Dean, and S. Hanks. Decision theoretic planning: Structural assumptions and computational leverage. Journal of AI Research, 11:1--94, 1999.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. Brafman, C. Domshlak, Y. Engel, and Z. Feldman. Planning for operational control systems with predictable exogenous events. In AAAI, 2011.Google ScholarGoogle Scholar
  3. J. Cowie, A. Ogielski, BJ Premore, and Y. Yuan. Internet worms and global routing instabilities. In Proc. of SPIE, 2002.Google ScholarGoogle Scholar
  4. Y. Engel and O. Etzion. Towards proactive event-driven computing. In Proceedings of the 5th ACM international conference on Distributed event-based system, pages 125--136, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. O. Etzion and P. Niblett. Event Processing in Action. Manning Publications, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Hocheol, K. Taehwan, and C. Joongmin. Proactive task execution using data sharing and event transition among personal devices. TIIS, 4(6):1237--1252, 2010.Google ScholarGoogle Scholar
  7. A. K. S. Jardine, D. Lin, and D. Banjevic. A review on machinery diagnostics and prognostics implementing condition-based maintenance. Mechanical systems and signal processing, 20(7):1483--1510, 2006.Google ScholarGoogle Scholar
  8. N. Leavitt. Complex-event processing poised for growth. IEEE Computer, 42(4):17--20, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. E. T. Lee and J. W. Wang. Statistical methods for survival data analysis. Wiley-Interscience, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  10. D. C. Luckham. The power of events: an introduction to complex event processing in distributed enterprise systems. Addison-Wesley Longman Publishing Co., Inc., 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage. Inferring internet denial-of-service activity. ACM Transactions on Computer Systems (TOCS), 24(2):115--139, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. C. Moxey et al. A conceptual model for event processing systems. An IBM Redguide publication, http://www.redbooks.ibm.com/redpapers/pdfs/redp4642.pdf, 2010.Google ScholarGoogle Scholar
  13. R. Reiter. On closed world data bases. Logic and Data Bases, pages 55--76, 1977.Google ScholarGoogle Scholar
  14. SK Sethiya. Condition based maintenance (cbm). 2006.Google ScholarGoogle Scholar
  15. G. Sharon and O. Etzion. Event-processing network model and implementation. IBM Systems Journal, 47(2):321--334, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. F. Song and X. Cheng-Zhong. Quantifying event correlations for proactive failure management in networked computing systems. Journal of Parallel Distributed Computing (JPDC), 70(11):1100--1109, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. D. L. Tennenhouse. Proactive computing. Communications of the ACM (CACM), 43(5):43--50, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. R. Thullner, S. Rozsnyai, J. Schiefer, H. Obweger, and M. Suntinger. Proactive business process compliance monitoring with event-based systems. In EDOCW, pages 429--437, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. R. Want, T. Pering, and D. L. Tennenhouse. Comparing autonomic and proactive computing. IBM Systems Journal (IBMSJ), 42(1):129--135, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Wasserkrug, A. Gal, and O. Etzion. A model for reasoning with uncertain rules in event composition. In UAI, 2005.Google ScholarGoogle Scholar
  21. S. Wasserkrug, A. Gal, and O. Etzion. Inference of Security Hazards from Event Composition Based on Incomplete or Uncertain Information. IEEE Transactions on Knowledge and Data Engineering, 20(8):1111--1114, August 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. S. Wasserkrug, A. Gal, O. Etzion, and Y. Turchin. Efficient processing of uncertain events in rule-based systems. IEEE Transactions on Knowledge and Data Engineering, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A basic model for proactive event-driven computing

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              DEBS '12: Proceedings of the 6th ACM International Conference on Distributed Event-Based Systems
              July 2012
              410 pages
              ISBN:9781450313155
              DOI:10.1145/2335484

              Copyright © 2012 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 16 July 2012

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              Overall Acceptance Rate130of553submissions,24%

              Upcoming Conference

              DEBS '24

            PDF Format

            View or Download as a PDF file.

            PDFPresentation Slides

            eReader

            View online with eReader.

            eReader