@gron

Detection of Suspicious Activity Using Different Rule Engines — Comparison of BaseVISor, Jena and Jess Rule Engines

, and . Rule Representation, Interchange and Reasoning on the Web, volume 5321 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2008)
DOI: 10.1007/978-3-540-88808-6_10

Abstract

In this paper we present our experience working on the problem of detecting suspicious activity using OWL ontologies and inference rules. For this purpose we implemented partial solutions using three different rule engines - BaseVISor, Jena and Jess. Each of them required different levels of effort and each had its strengths and weaknesses. We describe our impressions from working with each engine, focusing on the ease of writing and reading rules, support for RDF-based documents, support for different methods of reasoning and interoperability.

Description

Detection of Suspicious Activity Using Different Rule Engines — Comparison of BaseVISor, Jena and Jess Rule Engines - Springer

Links and resources

Tags

community

  • @gron
  • @dblp
@gron's tags highlighted