<--- Back to Details
First PageDocument Content
Computing / Software engineering / Cognition / Information systems / Complex event processing / Process / Apama / Enterprise application integration / Stream processing / Software AG / Event stream processing / Event
Date: 2016-06-21 17:53:50
Computing
Software engineering
Cognition
Information systems
Complex event processing
Process
Apama
Enterprise application integration
Stream processing
Software AG
Event stream processing
Event

Add to Reading List

Source URL: www.apamacommunity.com

Download Document from Source Website

File Size: 946,83 KB

Share Document on Facebook

Similar Documents

Formal methods / Software engineering / Computing / Logic in computer science / Non-interference / Exception handling / Formal verification / Refinement / Thread / Futures and promises / Covert channel / Application programming interface

Nickel: A Framework for Design and Verification of Information Flow Control Systems Helgi Sigurbjarnarson, Luke Nelson, Bruno Castro-Karney, James Bornholt, Emina Torlak, Xi Wang University of Washington

DocID: 1xVUp - View Document

Location map Eichenweg 1, Zollikofen Federal Office of Information Technology, Systems and Telecommunication FOITT Arrival by public transportation

DocID: 1xVJL - View Document

Computer law / Artificial intelligence / Trevor Bench-Capon / JURIX / Applications of artificial intelligence to legal informatics / Leon van der Torre / Ambient intelligence / Computer science

LEGAL KNOWLEDGE AND INFORMATION SYSTEMS Frontiers in Artificial Intelligence and Applications The book series Frontiers in Artificial Intelligence and Applications (FAIA) covers all aspects of theoretical and applied A

DocID: 1xVqW - View Document

Information theory / Statistical theory / Physics / Probability and statistics / Entropy / Conditional entropy / Principle of maximum entropy

LECTURE 2 Information theory for complex systems Stefan Thurner www.complex-systems.meduniwien.ac.at

DocID: 1xVpK - View Document

Computer security / Security engineering / Prevention / Security / Crime prevention / Cryptography / Information governance / National security / Password / Operating system / Protection ring / Capability-based security

The Protection of Information in Computer Systems JEROME H. SALTZER, SENIOR MEMBER, IEEE, AND MICHAEL D. SCHROEDER, MEMBER, IEEE Invited Paper Abstract - This tutorial paper explores the mechanics of

DocID: 1xVbf - View Document