Inproceedings,

Detection of Suspicious Activity Using Different Rule Engines - Comparison of BaseVISor, Jena and Jess Rule Engines.

, and .
RuleML, volume 5321 of Lecture Notes in Computer Science, page 73-80. Springer, (2008)

Meta data

Tags

Users

  • @gron
  • @dblp

Comments and Reviews