2008 IEEE 24th International Conference on Data Engineering 2008
DOI: 10.1109/icde.2008.4497596
|View full text |Cite
|
Sign up to set email alerts
|

Probabilistic Event Extraction from RFID Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 50 publications
(26 citation statements)
references
References 7 publications
0
26
0
Order By: Relevance
“…In this step, the different data gathered from each customer including services used, customer tracking, facial and voice analysis results, and social media activity are prepared for data mining as depicted in Figure 4(a). Data cleaning and disambiguating methods (Khoussainova et al, 2008) should be applied to handle inconsistent data and missing values. 2.…”
Section: Multi-domain Data Miningmentioning
confidence: 99%
“…In this step, the different data gathered from each customer including services used, customer tracking, facial and voice analysis results, and social media activity are prepared for data mining as depicted in Figure 4(a). Data cleaning and disambiguating methods (Khoussainova et al, 2008) should be applied to handle inconsistent data and missing values. 2.…”
Section: Multi-domain Data Miningmentioning
confidence: 99%
“…PEEX [6] is Cascadiaś event detection subsystem. PEEX supports probabilistic events represented as tuples and stored in relations named for each event type.…”
Section: Peexmentioning
confidence: 99%
“…Scenic translates these graphical event definitions into PeexL, a SQL-like language for defining high-level events. The Probabilistic Event EXtraction system (PEEX) [6] is an RFID data management system that enables applications to declaratively specify events in PeexL. It then continuously and automatically extracts these events from RFID data streams and stores them persistently to simplify their subsequent management.…”
Section: Introductionmentioning
confidence: 99%
“…The stream of tags read by various sensors is stored in a relation SIGHTING(t, tID, aID), which denotes that the RFID tag tID was detected by antenna aID at time t. Since an RFID antenna has only a certain probability of reading a tag within its range, the PEEX system [13] processes the On Probabilistic Models for Uncertain Sequential Pattern Mining 3 SIGHTING relation to output an uncertain higher-level event relation such as MEETING(time, person1, person2, room, prob). An example tuple in MEETING could be (103, 'Alice', 'Bob', 435, 0.4), which means that at time 103, PEEX believes that Alice and Bob are having a meeting (event) with probability 0.4 in room 435 (source) [13]; since antennae are at xed locations, the source is certain but the event is uncertain.…”
Section: Introductionmentioning
confidence: 99%
“…(a) Employees movements are tracked in a building using RFID sensors [13]. The stream of tags read by various sensors is stored in a relation SIGHTING(t, tID, aID), which denotes that the RFID tag tID was detected by antenna aID at time t. Since an RFID antenna has only a certain probability of reading a tag within its range, the PEEX system [13] processes the On Probabilistic Models for Uncertain Sequential Pattern Mining 3 SIGHTING relation to output an uncertain higher-level event relation such as MEETING(time, person1, person2, room, prob).…”
Section: Introductionmentioning
confidence: 99%