HEAL DSpace

A performance comparison of ontology reasoning and rule engines

Αποθετήριο DSpace/Manakin

Εμφάνιση απλής εγγραφής

dc.contributor.author Dellas, NL en
dc.contributor.author Koutsoloukas, EA en
dc.contributor.author Lioudakis, GV en
dc.contributor.author Kaklamani, DI en
dc.contributor.author Venieris, IS en
dc.date.accessioned 2014-03-01T02:44:24Z
dc.date.available 2014-03-01T02:44:24Z
dc.date.issued 2007 en
dc.identifier.uri https://dspace.lib.ntua.gr/xmlui/handle/123456789/31798
dc.subject Ontology en
dc.subject Performance en
dc.subject Reasoning en
dc.subject Rule engines en
dc.subject.other Laws and legislation en
dc.subject.other Real time systems en
dc.subject.other Telecommunication en
dc.subject.other JESS rules en
dc.subject.other Mobile and wireless communications en
dc.subject.other Ontology modeling en
dc.subject.other Perfor mance comparison en
dc.subject.other Performance en
dc.subject.other Policy-based systems en
dc.subject.other Reasoning en
dc.subject.other Rule engines en
dc.subject.other Technological solutions en
dc.subject.other User privacy en
dc.subject.other Ontology en
dc.title A performance comparison of ontology reasoning and rule engines en
heal.type conferenceItem en
heal.identifier.primary 10.1109/ISTMWC.2007.4299267 en
heal.identifier.secondary 4299267 en
heal.identifier.secondary http://dx.doi.org/10.1109/ISTMWC.2007.4299267 en
heal.publicationDate 2007 en
heal.abstract Even though ontology modeling and policy based systems were originally created for different problem spaces it became obvious in the course of time that they can both be useful tools to express restrictions in a real life situation into technically enforceable rules. One of such situations where both ontology reasoning and rule engines can be applied as technological solutions is the design of an information system that enforces restrictions related to user privacy protection. During the design of such a system, privacy related restrictions could be expressed either as rules into an ontology describing the privacy world of a user, or as a set of straightforward Jess rules. A performance comparison of the two approaches is presented in this paper. en
heal.journalName 2007 16th IST Mobile and Wireless Communications Summit en
dc.identifier.doi 10.1109/ISTMWC.2007.4299267 en


Αρχεία σε αυτό το τεκμήριο

Αρχεία Μέγεθος Μορφότυπο Προβολή

Δεν υπάρχουν αρχεία που σχετίζονται με αυτό το τεκμήριο.

Αυτό το τεκμήριο εμφανίζεται στην ακόλουθη συλλογή(ές)

Εμφάνιση απλής εγγραφής