Abstract
In this chapter, we consider the application of MS4 Me™ to data engineering for complex data and interest-based data distribution in which data is targeted to the consumer’s interests. We discussed mappings of Pruned Entity Structures, in the form of XML documents, based on underlying System Entity Structures. Then we show how you can develop simulation models that implement such mappings and exchange XML documents in the manner of interest-based data distribution. Distributed simulation implementations that employ the DEVS protocol (Chap. 9) and data distribution services (Chap. 10) can deploy such models to provide the basis for information exchange based on the concepts of interest-based distribution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
KDD Cup. (1999). http://www.sigkdd.org/kddcup/index.php?section=1999&method=info/.
Kim, T., Seo, Ch., & Zeigler, B. P. (2010). Web-based distributed network analyzer using a system entity structure over a service-oriented architecture. Simulation, 86(3), 155–180.
Zeigler, B. P., & Hammonds, P. (2007). Modeling & simulation-based data engineering: Introducing pragmatics into ontologies for net-centric information exchange. New York: Academic Press.
Author information
Authors and Affiliations
Corresponding author
Appendix: System Entity Structures for Examples
Appendix: System Entity Structures for Examples
throughput analysis From the top perspective, ThruPutAnalize is made of EventInfo and Payload! EventInfo has EventTime! The range of EventInfo’s EventTime is long! Payload has PacketSize! The range of Payload’s PacketSize is int! Protocol Analysis From the top perspective, ProtocolAnalyze is made of IDPart and Protocol! IDPart has ID! The range of IDPart’s ID is string! Protocol can be TCP, UDP, or FTP in protocolType! LAND Attack From the top perspective, LANDAttack is made of SrcIP and DestIP! LANDAttack has EventTime! The range of LANDAttack’s EventTime is long! SrcIP has IPAddress ! The range of SrcIP’s IPAddress is string! DestIP has IPAddress ! The range of DestIP’s IPAddress is string! POD Attack From the top perspective, PODAttack is made of EventInfo, SrcPort, DestPort, and Protocol! EventInfo has EventTime! The range of EventInfo’s EventTime is long! SrcPort has portNumber ! The range of SrcPort’s portNumber is string! DestPort has portNumber ! The range of DestPort’s portNumber is string! Protocol can be TCP, UDP, HTTP, or FTP in protocolType!
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Zeigler, B.P., Sarjoughian, H.S. (2017). Interest-Based Information Exchange: Mappings and Models. In: Guide to Modeling and Simulation of Systems of Systems. Simulation Foundations, Methods and Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-64134-8_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-64134-8_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-64133-1
Online ISBN: 978-3-319-64134-8
eBook Packages: Computer ScienceComputer Science (R0)