Author of the publication

Detection of Suspicious Activity Using Different Rule Engines - Comparison of BaseVISor, Jena and Jess Rule Engines.

, and . RuleML, volume 5321 of Lecture Notes in Computer Science, page 73-80. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Need for Constructive Induction.. ML, page 173-177. Morgan Kaufmann, (1991)KDD-93: Progress and Challenges in Knowledge Discovery in Databases., , , and . AI Magazine, 15 (3): 77-82 (1994)Knowledge Discovery in Databases: An Overview., , and . AI Magazine, 13 (3): 57-70 (1992)Feature construction: An analytic framework and an application to decision trees. University of Illinois Urbana-Champaign, USA, (1990)An Application of Semantic Web Technologies to Situation Awareness., , , and . ISWC, volume 3729 of Lecture Notes in Computer Science, page 944-958. Springer, (2005)A Semantic Wiki Alerting Environment Incorporating Credibility and Reliability Evaluation., , and . STIDS, volume 713 of CEUR Workshop Proceedings, page 100-107. CEUR-WS.org, (2010)Choosing Between Axioms, Rules and Queries: Experiments in Semantic Integration Techniques., , , , and . OWLED, volume 796 of CEUR Workshop Proceedings, CEUR-WS.org, (2011)A Demonstration of Formal Policy Reasoning Using an Extended Version of BaseVISor., , and . POLICY, page 225-227. IEEE Computer Society, (2008)Approaches to Relating and Integrating Semantic Data from Heterogeneous Sources., , , , and . Web Intelligence, page 170-177. IEEE Computer Society, (2011)Transforming XML Schema to OWL Using Patterns., , , , and . ICSC, page 102-109. IEEE Computer Society, (2011)