Title
Detection of Suspicious Activity Using Different Rule Engines -- Comparison of BaseVISor, Jena and Jess Rule Engines
Abstract
In this paper we present our experience working on the problem of detecting suspicious activity using OWL ontologies and inference rules. For this purpose we implemented partial solutions using three different rule engines - BaseVISor, Jena and Jess. Each of them required different levels of effort and each had its strengths and weaknesses. We describe our impressions from working with each engine, focusing on the ease of writing and reading rules, support for RDF-based documents, support for different methods of reasoning and interoperability.
Year
DOI
Venue
2008
10.1007/978-3-540-88808-6_10
RuleML
Keywords
Field
DocType
different rule engine,different rule engines,suspicious activity,different level,partial solution,rdf-based document,different method,owl ontology,inference rule,jess rule engines
Ontology (information science),Data mining,World Wide Web,Information retrieval,Computer science,Interoperability,Rule of inference,Strengths and weaknesses,Database,RDF
Conference
Volume
ISSN
Citations 
5321
0302-9743
3
PageRank 
References 
Authors
0.43
3
2
Name
Order
Citations
PageRank
Jakub Moskal161.53
Christopher J. Matheus21071333.53