1994
DOI: 10.1007/978-1-4471-3225-7_7
|View full text |Cite
|
Sign up to set email alerts
|

Rules in an Open System: The REACH Rule System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

1998
1998
2007
2007

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 53 publications
(21 citation statements)
references
References 1 publication
0
21
0
Order By: Relevance
“…The recent context is the context most likely to be used in a real-time environment where sensors are read periodically. In the chronicle context, event As mentioned in Branding et al 1993 there is a trend towards modeling composite events using more complex condition parts. Primitive e v ents are used to trigger rules and the condition part of such a rule queries the event history to determine whether its action is to be executed.…”
Section: Rulesmentioning
confidence: 99%
See 2 more Smart Citations
“…The recent context is the context most likely to be used in a real-time environment where sensors are read periodically. In the chronicle context, event As mentioned in Branding et al 1993 there is a trend towards modeling composite events using more complex condition parts. Primitive e v ents are used to trigger rules and the condition part of such a rule queries the event history to determine whether its action is to be executed.…”
Section: Rulesmentioning
confidence: 99%
“…There is a distinction drawn between when a rule is red and when it is executed Branding et al 1993. A rule is red when its corresponding event is triggered.…”
Section: Rulesmentioning
confidence: 99%
See 1 more Smart Citation
“…Though the temporal and spatial that support a unified view of both these attributes in the case of real world events. Composite event detection using event templates has also been proposed in several papers [3], [5], [15].…”
Section: Related Workmentioning
confidence: 99%
“…This creates an additional constraint on how abnormality detection algorithms may be designed. While event detection and anomaly detection are important problems in the data mining community [4,6,15,17], these models do not address the problem in the context of predicting rare anomalies in the presence of many spurious (but similar) patterns. In order to achieve the specificities in abnormality detection, we will utilize a supervised approach in which the abnormality detection process learns from the data stream.…”
Section: Introductionmentioning
confidence: 99%