Raman Adaikkalavan

According to our database1, Raman Adaikkalavan authored at least 31 papers between 2004 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
iScheduler: intelligent scheduling system for academic institutions.
Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education, 2018

2015
Stream Processing with Secure Information Flow Constraints.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

2013
On the Efficient Processing of Multilevel Secure Continuous Queries.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Information flow control for stream processing in clouds.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

2012
Multilevel secure data stream processing: Architecture and implementation.
J. Comput. Secur., 2012

2011
Successful implementation of an active learning laboratory in computer science.
Proceedings of the ACM SIGUCCS Fall Conference on User Services 2011, 2011

Secure shared continuous query processing.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Multilevel Secure Data Stream Processing.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Seamless Event and Data Stream Processing: Reconciling Windows and Consumption Modes.
Proceedings of the Database Systems for Advanced Applications, 2011

Searching for Complex Patterns over Large Stored Information Repositories.
Proceedings of the Advances in Databases - 28th British National Conference on Databases, 2011

2010
Access Control Using Active Rules.
Proceedings of the Data Security and Security Data, 2010

Load Shedding in Data Stream Management Systems Using Application Semantics.
Proceedings of the Data Security and Security Data, 2010

2009
Provenance and Impact of Complex Event Processing (CEP): A Retrospective View (Ursprung und Bedeutung von Complex Event Processing (CEP): eine retrospektive Sicht).
it Inf. Technol., 2009

When to Trigger Active Rules?
Proceedings of the 15th International Conference on Management of Data, 2009

2008
Events must be complete in event processing!
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Events and streams: harnessing and unleashing their synergy!
Proceedings of the Second International Conference on Distributed Event-Based Systems, 2008

2007
Event Specification and Processing for Advanced Applications: Generalization and Formalization.
Proceedings of the Database and Expert Systems Applications, 18th International Conference, 2007

Ubiquitous Nature of Event-Driven Approaches: A Retrospective View.
Proceedings of the Event Processing, 6.5. - 11.5.2007, 2007

2006
SnoopIB: Interval-based event specification and detection for active databases.
Data Knowl. Eng., 2006

Discovery-based role activations in role-based access control.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

How To Search for Complex Patterns Over Streaming and Stored Data.
Proceedings of the 2006 International Conference on Artificial Intelligence, 2006

How to Use Events and Rules for Supporting Role-Based Security? (Invited Paper).
Proceedings of the 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 2006

Extensions to Stream Processing Architecture for Supporting Event Processing.
Proceedings of the Database and Expert Systems Applications, 17th International Conference, 2006

Events and Rules for Java: Using a Seamless and Dynamic Approach.
Proceedings of the Databases and Information Systems IV, 2006

2005
InfoFilter: a system for expressive pattern specification and detection over text streams.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

SmartGate: a smart push-pull approach to support role-based security in web gateways.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

NFMi: An Inter-domain Network Fault Management System.
Proceedings of the 21st International Conference on Data Engineering, 2005

Active Authorization Rules for Enforcing Role-Based Access Control and its Extensions.
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005

Formalization and Detection of Events Using Interval-Based Semantics.
Proceedings of the Advances in Data Management 2005, 2005

2004
Information Security: Using a Novel Event-Based Approach.
Proceedings of the International Conference on Information and Knowledge Engineering. IKE'04, 2004

Formalization and Detection of Events over a Sliding Window in Active Databases Using Interval-Based Semantics.
Proceedings of the Advances in Databases and Information Systems, 2004


  Loading...