Open AccessThis article is
- freely available
Monitoring Threshold Functions over Distributed Data Streams with Node Dependent Constraints
Department of Mathematics and Statistics, University of Maryland, Baltimore County, Baltimore, MD 21250, USA
* Author to whom correspondence should be addressed.
Received: 19 June 2012; in revised form: 8 September 2012 / Accepted: 11 September 2012 / Published: 18 September 2012
Abstract: Monitoring data streams in a distributed system has attracted considerable interest in recent years. The task of feature selection (e.g., by monitoring the information gain of various features) requires a very high communication overhead when addressed using straightforward centralized algorithms. While most of the existing algorithms deal with monitoring simple aggregated values such as frequency of occurrence of stream items, motivated by recent contributions based on geometric ideas we present an alternative approach. The proposed approach enables monitoring values of an arbitrary threshold function over distributed data streams through stream dependent constraints applied separately on each stream. We report numerical experiments on a real-world data that detect instances where communication between nodes is required, and compare the approach and the results to those recently reported in the literature.
Keywords: data streams; distributed system; convex optimization; feedback; feature selection
Article StatisticsClick here to load and display the download statistics.
Notes: Multiple requests from the same IP address are counted as one view.
Cite This Article
MDPI and ACS Style
Malinovsky, Y.; Kogan, J. Monitoring Threshold Functions over Distributed Data Streams with Node Dependent Constraints. Algorithms 2012, 5, 379-397.
Malinovsky Y, Kogan J. Monitoring Threshold Functions over Distributed Data Streams with Node Dependent Constraints. Algorithms. 2012; 5(3):379-397.
Malinovsky, Yaakov; Kogan, Jacob. 2012. "Monitoring Threshold Functions over Distributed Data Streams with Node Dependent Constraints." Algorithms 5, no. 3: 379-397.