Detection of Suspicious Activity Using Different Rule Engines — Comparison of BaseVISor, Jena and Jess Rule Engines
J. Moskal, and C. Matheus. Rule Representation, Interchange and Reasoning on the Web, volume 5321 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2008)
DOI: 10.1007/978-3-540-88808-6_10
Abstract
In this paper we present our experience working on the problem of detecting suspicious activity using OWL ontologies and inference rules. For this purpose we implemented partial solutions using three different rule engines - BaseVISor, Jena and Jess. Each of them required different levels of effort and each had its strengths and weaknesses. We describe our impressions from working with each engine, focusing on the ease of writing and reading rules, support for RDF-based documents, support for different methods of reasoning and interoperability.
Description
Detection of Suspicious Activity Using Different Rule Engines — Comparison of BaseVISor, Jena and Jess Rule Engines - Springer
%0 Book Section
%1 conf/ruleml/MoskalM08
%A Moskal, Jakub
%A Matheus, ChristopherJ.
%B Rule Representation, Interchange and Reasoning on the Web
%D 2008
%E Bassiliades, Nick
%E Governatori, Guido
%E Paschke, Adrian
%I Springer Berlin Heidelberg
%K Detection Inference Rete Rules Security
%P 73-80
%R 10.1007/978-3-540-88808-6_10
%T Detection of Suspicious Activity Using Different Rule Engines — Comparison of BaseVISor, Jena and Jess Rule Engines
%U http://dx.doi.org/10.1007/978-3-540-88808-6_10
%V 5321
%X In this paper we present our experience working on the problem of detecting suspicious activity using OWL ontologies and inference rules. For this purpose we implemented partial solutions using three different rule engines - BaseVISor, Jena and Jess. Each of them required different levels of effort and each had its strengths and weaknesses. We describe our impressions from working with each engine, focusing on the ease of writing and reading rules, support for RDF-based documents, support for different methods of reasoning and interoperability.
%@ 978-3-540-88807-9
@incollection{conf/ruleml/MoskalM08,
abstract = {In this paper we present our experience working on the problem of detecting suspicious activity using OWL ontologies and inference rules. For this purpose we implemented partial solutions using three different rule engines - BaseVISor, Jena and Jess. Each of them required different levels of effort and each had its strengths and weaknesses. We describe our impressions from working with each engine, focusing on the ease of writing and reading rules, support for RDF-based documents, support for different methods of reasoning and interoperability.},
added-at = {2013-07-22T11:11:33.000+0200},
author = {Moskal, Jakub and Matheus, ChristopherJ.},
biburl = {https://www.bibsonomy.org/bibtex/29e3dbe8fd7fa492622b5cc8fdd7ee65c/gron},
booktitle = {Rule Representation, Interchange and Reasoning on the Web},
description = {Detection of Suspicious Activity Using Different Rule Engines — Comparison of BaseVISor, Jena and Jess Rule Engines - Springer},
doi = {10.1007/978-3-540-88808-6_10},
editor = {Bassiliades, Nick and Governatori, Guido and Paschke, Adrian},
interhash = {0aa2971f3debfce1e6530d471d42a775},
intrahash = {9e3dbe8fd7fa492622b5cc8fdd7ee65c},
isbn = {978-3-540-88807-9},
keywords = {Detection Inference Rete Rules Security},
pages = {73-80},
publisher = {Springer Berlin Heidelberg},
series = {Lecture Notes in Computer Science},
timestamp = {2013-07-22T11:11:33.000+0200},
title = {Detection of Suspicious Activity Using Different Rule Engines — Comparison of BaseVISor, Jena and Jess Rule Engines},
url = {http://dx.doi.org/10.1007/978-3-540-88808-6_10},
volume = 5321,
year = 2008
}