WO2004015627A2 - Rule engine - Google Patents

Rule engine Download PDF

Info

Publication number
WO2004015627A2
WO2004015627A2 PCT/US2003/025076 US0325076W WO2004015627A2 WO 2004015627 A2 WO2004015627 A2 WO 2004015627A2 US 0325076 W US0325076 W US 0325076W WO 2004015627 A2 WO2004015627 A2 WO 2004015627A2
Authority
WO
WIPO (PCT)
Prior art keywords
business
rule
programming language
target programming
rules
Prior art date
Application number
PCT/US2003/025076
Other languages
French (fr)
Other versions
WO2004015627A3 (en
Inventor
Pedram Abrari
Eric Andrew Moore
Original Assignee
Corticon Technologies, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Corticon Technologies, Inc. filed Critical Corticon Technologies, Inc.
Priority to AU2003259744A priority Critical patent/AU2003259744A1/en
Priority to EP03785168A priority patent/EP1543472A2/en
Publication of WO2004015627A2 publication Critical patent/WO2004015627A2/en
Publication of WO2004015627A3 publication Critical patent/WO2004015627A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computing arrangements using knowledge-based models
    • G06N5/04Inference or reasoning models
    • G06N5/046Forward inferencing; Production systems
    • G06N5/047Pattern matching networks; Rete networks

Definitions

  • This invention relates to a rule engine.
  • a knowledge base contains encoded knowledge.
  • the knowledge base typically incorporates definitions of facts and rules along with control information.
  • An inference engine (sometimes referred to as a rule interpreter or rule engine) provides a reasoning mechanism in an expert system.
  • the inference engine typically implements forward chaining and backward chaining strategies. Forward chaining is a process of applying a set of previously determined rules to the facts in a knowledge base to see if any of them fire and thereby generate new facts. In essence, all derivable knowledge is derived in forward chaining.
  • Backward chaining is goal-driven and used to process some queries against the knowledge base. A query is considered a goal and the knowledge base is searched for facts supporting that goal. Antecedents of such rules are made subgoals for further search if necessary.
  • Inference engines designed for expert systems are increasingly used in business automation.
  • the invention features a method including, in a processing system, receiving a rule set as a single package, generating a dependency graph for the rule set, and generating a sequence of processing logic for optimal processing of inputted facts.
  • Processing can include single pass execution when there are no logical loops.
  • Processing can include multi-pass execution when there are logical loops.
  • Processing can also include providing an endless loop terminating condition.
  • Generating the dependency graph can include determining logical dependencies across rules contained in the rule set. Generating the dependency graph further can include resolving logical conflicts using override instructions.
  • Generating the dependency graph further can include analyzing the rule set with a business logic generation utility optimized for one of a plurality of target programming languages and generating optimized business logic for a selected target programming language.
  • the target programming language can be Java, C++, C#, Jython, JavaScript and Visual Basic.
  • the business logic generation utility's generated processing logic can include a series of calls to a working memory database to retrieve, manipulate and update data.
  • the invention features a method for automating business processes including, in a computer system, receiving a rule set as a single package, determining logical conflicts within the rule set, resolving the logical conflicts, and generating a sequence of processing logic from the rule set for optimal processing of inputted facts.
  • Resolving can include determining override conditions in rule collision events.
  • Generating can include analyzing the rule set with a business logic generation utility optimized for one of a plurality of target programming languages and generating optimized business logic for the selected target programming language.
  • the target programming language can be Java, C++, C#, Jython, JavaScript and visual basic.
  • the business logic generation utility's generated processing logic can include a series of calls to a working memory database to retrieve, manipulate and update data.
  • FIG. 1 is a block diagram of a platform.
  • FIG. 2 is a block diagram of a deployment platform.
  • FIG. 3 is flow diagram of an example development project.
  • FIG. 4 is a business rulesheet for a profiling example.
  • FIG. 5 is a business rulesheet for a rejection example.
  • FIG. 6 is a conflict detection rulesheet view of FIG. 4.
  • FIG. 7 is a conflict resolution rulesheet view of FIG. 4.
  • FIG. 8 is a completeness check rulesheet view of FIG. 4.
  • FIG. 9 shows an execution flow for inference engines.
  • FIG. 10 shows a set of three sample business rules.
  • FIG. 11 shows the business rules in FIG. 10 loaded into a RETE inference engine.
  • FIG. 12 shows the business rules in FIG. 10 as processed by the invention.
  • FIG. 13 shows a rule engine architecture.
  • FIG. 14 is example generated Java logic for processing rules in FIG. 10.
  • FIG. 15 is example generated Jython logic for processing rules in FIG. 10.
  • FIG. 16 shows an example dependency graph for three business rules.
  • FIG. 17 shows an example dependency graph handling convex subsets (logical loops).
  • a platform 100 includes a deployment platform 110 and a development platform 160.
  • Each platform 110, 160 is further subdivided into application tiers, i.e., a front end (presentation), a middle tier (business logic), and a back end (database).
  • application tiers i.e., a front end (presentation), a middle tier (business logic), and a back end (database).
  • the front end ofthe development platform 160 is provided by products used for rapid development of graphical user interfaces (GUIs), such as the Microsoft FrontPage® web site generation tool.
  • GUIs graphical user interfaces
  • the middle tier ofthe development platform 160 implements a business logic of an application.
  • the development platform 160 implements a visually declarative approach. With the development platform 160, business logic can be subdivided into business rules and process logic.
  • the process logic is included in a UML Modeler and Code Editor 170.
  • the UML Modeler and Code Editor 170 includes a use case modeler 172, a business object modeler 174, a component modeler 176 and an Integrated Development Environment (IDE) 178.
  • IDE Integrated Development Environment
  • Rulepacks are declarative components that encapsulate a set of business rules automating the knowledge of a particular context of a business process. Rulepacks are made up of one or more rulesheets 184. Each rulesheet can contain one or more rules that apply within the same particular scope. Rulepacks are built and maintained by the rules IDE 180.
  • the rules IDE 180 includes a vocabulary 181, which represents business entities, their attributes, relationships, and possibly business methods in a form of a tree view.
  • the vocabulary 181 can be generated within the rules IDE 180 or imported from the Unified Modeling Language (UML) business object modeler (also known as a class diagram) 174 or generated directly from business objects or a relational database.
  • UML Unified Modeling Language
  • the vocabulary 181 serves as an optimal drag-and-drop source for easy generation of rulesheets 184.
  • the rules IDE 180 also includes the rulepack/rulesheet editor 182, which is a visual environment designed to be used by non-technical business experts to build and maintain rulepacks and their rulesheets.
  • a rulesheet is a spreadsheet-like construct for intuitive development of logically correct sets of rules.
  • rulepacks are implemented as extensible markup language (XML) documents expressed in a rules markup language generated for that purpose.
  • the rules markup language defines an XML rules interchange format similar to that ofthe Business Rules Markup Language (BRML), which is defined by the CommonRules Java library, available from International Business Machines Corporation of Armonk, New York.
  • BRML Business Rules Markup Language
  • a rule repository 150 facilitates collaborative rules development through source and version control, allowing generation of authorization and access privileges for rules documents.
  • the rule repository 150 maintains version control, offering an opportunity to roll back to previous versions of rules when necessary.
  • the rule repository 150 can also track a business motivation behind every rule, such as business policy charters and a mission statement.
  • the process logic part ofthe business logic is a thin layer of transactional code, and in one implementation, is built and maintained using the UML modeler and code editor 170.
  • the transactional code i.e., the process logic
  • the process logic can be coded in Java using any standard Java IDE, such as the Together UML modeling tool and IDE products available from TogetherSoft Corporation of Raleigh, North Carolina.
  • the TogetherSoft products automatically generate the majority ofthe process logic (including Enterprise JavaBeans), so programming requirements are reduced to a minimum.
  • a developer uses the UML modeler and code editor 170 to build and maintain a use case model, a business object model (a UML class diagram), a component model, and various other UML models used to implement a complete enterprise application.
  • the UML modeler and editor 170 includes the use case modeler 172, the business object modeler 174, and the component modeler 176, and other UML modelers (not shown).
  • the UML modeler and editor 170 also includes the IDE (Integrated Development Environment) 178 that supports a Java development kit (JDK), optionally extended with a Java math library to support business domain calculations.
  • the use case modeler 172 is used to build and maintain business requirements visually in the form of UML-standard use cases.
  • the business object modeler 174 is used to build and maintain an enterprise-level object model of all data elements.
  • the enterprise-level model represents all data in the enterprise and can be generated de nova or derived from existing enterprise databases.
  • the objects ofthe enterprise-level object model also contain business functions. Business rules that are non-declarative in nature or involve an algorithm or complex mathematical calculation are captured as functions.
  • the procedural component modeler 176 is used to build and maintain those procedural business components that use rulepacks.
  • the deployment platform 110 supports deployment on diverse distributed user interface devices 112, such as web browsers, telephones, personal digital assistants, and other client programs and access devices. Each user interface device merely communicates with supported middle tier application servers.
  • the middle tier of an application includes a web server 120, a Java application server 130, and a business intelligence server 140.
  • Any web server supporting JSP (Java Server Pages) and any Java application server can be used, such as a J2EE (Java 2 Enterprise Edition) compliant application server.
  • the business intelligence server 140 manages multiple rule components 142.
  • a rule component contains a rule engine instance.
  • a rule component deploys a rulepack as a functional knowledge unit.
  • the multiple rule components 142 are deployed in a J2EE environment 130.
  • a user interface 112 communicates with a servlet 122, which can be generated by a Java Server Page (JSP), which communicates with session and entity beans 132, which in turn communicate with the rule components 142 through a standardized messaging scheme.
  • JSP Java Server Page
  • Two types of messages are supported, i.e., synchronous (e.g., direct Java calls) and asynchronous (e.g., using XML-based messages).
  • the rule components 142 are preloaded with the rules in a rulepack for optimal performance.
  • the rule components 142 can interact with various types of business components using standardized messaging (e.g., XML messaging).
  • the business intelligence server 140 provides a central integration hub that interacts with diverse application components, such as Microsoft® COM (Component Object Model) components, CORBA (Common Object Request Broker Architecture) components, enterprise JavaBeans (EJB) components, and Java components.
  • the business intelligence server 140 turns any Java application server into an application integrator, acting as a control center for an enterprise information system.
  • the back end ofthe deployment platform 110 can include any number of databases 134 based on database management products from any number of vendors.
  • the rule repository 150 is implemented as a database, e.g., a relational database.
  • the business intelligence server 140 is a virtual extension ofthe rule repository 150, remotely managing the lifecycle of all deployed rule components 142. Once a business rule is modified in the rule repository 150, all rule components containing rulepacks affected by the change are dynamically notified to refresh their business logic. This allows for real-time modification of system behavior without downtime.
  • a simple application development methodology that takes advantage ofthe features ofthe application development platform 100 is now described as an example. Unlike traditional techniques that focus on a combination of data and process, or on objects that encapsulate both data and process, the our methodology places business rules in the center of the development process.
  • Business rule analysis accelerates the software development lifecycle by reducing unstructured requirements into concrete statements that are easily verified by business users.
  • our methodology enables analysts and developers to identify, capture and test business rules from the very inception of a project.
  • our methodology guarantees that UML-conforming documentation (such as use case models) are generated as an inherent by-product ofthe software development process.
  • our methodology ensures that the documents remain in synchronization with the application logic because the business rules that the documents represent are part ofthe application. By allowing developers to begin building and testing business rules at project inception, our methodology ensures healthy design disciplines, such as providing tangible design deliverables in a project's early phases.
  • a business object model can be generated de nova or derived (330) from an existing database.
  • the business object modeler 176 can capture the business object model as a UML class diagram.
  • the IDE 180 transforms this into a vocabulary tree view for easy drag-and-drop functionality onto the rulesheets 184.
  • the vocabulary can also be generated directly in the rules IDE 180, without the need for an object model.
  • the vocabulary is displayed in the form of a tree of business terms such as entities (non-leaf nodes), their attributes (leaves), and their relationships to other entities (named branches).
  • Such a tree view presents a conceptual semantic model in a form that is understandable to the business user.
  • the tree view can be used for building rules, test data, user interfaces, databases, and other application components.
  • Elements of the tree view can be used by a user to drag-and-drop vocabulary terms onto a rulesheet.
  • a vocabulary term can be either simple (root-level) or complex (branch-level).
  • relationship traversals are handled automatically using a dot-notation (e.g., person.employer.address) that gives a business term a specific context.
  • Business rules are developed and tested (340) using the vocabulary 181, the rulepack editor 182, and the tester 183.
  • Business rules are captured as discrete rule sets (rulepacks). Three types of business rules are rejecters (constraints), projectors (triggers), and producers (derivations).
  • the rulepack editor 182 enables developers to compose all types of rules that operate on data structures defined in the business object model. Developers can drag-and-drop terms from the vocabulary tree view 181 onto a rulesheet to define the conditions and actions of each rulepack.
  • a business rule can be defined as a statement that defines or constrains some aspect of a business.
  • a business process can be considered procedural logic used to retrieve, manipulate and update data in a transactional environment. Business rules are stored in our rule engine.
  • Our rule engine is designed in a top down approach from the business-side to the execution engine.
  • Our rule engine stores rules (also referred to as rulesheets) in a spreadsheet manner using a decision table concept.
  • a decision table (often called a truth table) contains a list of decisions and the criteria on which they are based. All possible situations for decisions are typically listed, and the action to take in each situation is specified.
  • a rudimentary example is, for a traffic intersection, the decision to proceed might be expressed as "yes” or "no" and the criteria might be the "light is red” or the "light is green.”
  • FIG. 4 shows an exemplary profile rulesheet 400.
  • the profile rulesheet 400 captures business rules because it isolates the conditions and actions and is designed to allow one to find conflicts.
  • Conditions 402 are located in a top left side quadrant and actions 404 are located in a bottom left side quadrant.
  • the columns in a right quadrant are the actual implementations ofthe rules and the rule statements are located in a lower quadrant.
  • a first column 406 shows a smoker is high risk. More specifically, if Person. smoker is true, then Person.risk is high.
  • the smoker condition in this rule is a "don't care” so a dash indicating "don't care” is placed in the second column 408.
  • the conditions 402 and columns 406 and 408 represent a formal representation of informal rule statements 1 (410) and 2 (412).
  • a rulepack containing one or more rulesheets that make up a unit of logic is also called a decision service. Each rulesheet in a decision service is designed to do a particular task analogous to a subroutine in a procedural language. In operation, the rule engine goes from rulesheet to rulesheet until a final rulesheet is reached and processed.
  • FIG. 6 shows an exemplary conflict detection rulesheet 430 ofthe rulesheet 400 of FIG. 4.
  • a rule editor can detect conflicts and highlight them to the user as shown in FIG. 6.
  • a conflict can be thought of as a logical conflict between two or more rules.
  • a logical conflict is where there are two or more different rules that, for the same exact fact/data input(s), all rules fire resulting in contradictory and mutually exclusive actions.
  • FIG. 7 shows a conflict resolution rulesheet 440 that illustrates a Person being a smoker is logically more significant than her being a married woman younger than thirty, and therefore the smoker rule overrides the female rule. Thus for such a Person, smoker rule fires and female rule is suppressed.
  • FIG. 8 shows a completeness check rulesheet 450.
  • a completeness check insures that all logically possible data scenarios have been covered by insuring all possible valid combinations of data are accounted for. In the example, a total of seven possible
  • “simple” scenarios are missing from the rulesheet, which can be compressed to a smallest possible set of three “complex” rules that can include dashes (or “don't cares") for some condition values. Also some conditions can result in a set of values for a rule.
  • the completeness check rulesheet 450 allows a business user to view all possibilities and determine which business rules are important and complete the rulesheet. The way the number of missing rules is detected is that for each condition a complete value set is specified. In the example, for smoker there is ⁇ true, false ⁇ , for age there is ⁇ younger than thirty, thirty and older ⁇ , for sex there is ⁇ male, female ⁇ , and for married there is ⁇ true, false ⁇ . This gives a total of 2 4 possibilities, or 16 possibilities. So there are 16 possible "simple” rules, i.e., rules that do not include dashes or "don't cares".
  • the rulesheets can be optimized to reduce the total number of possibilities into a smallest possible rule set.
  • a first rule states if a Person is a smoker, younger than 30, female and married then her risk profile is set to 'Low' .
  • a second rule is identical to the first rule except the smoker condition value is different, i.e., if the person is a non-smoker and the other attributes are the same as the first rule then the risk profile is set to 'Low'.
  • the Person is younger than thirty, female and married, whether she is a smoker or not, then her risk profile is set to 'Low' . That means that the smoker condition is irrelevant and does not impact the outcome.
  • Any set of rules can be compressed into the smallest possible set that is logically equivalent to the original set.
  • the compressed set of rules can have many conditions with a value of "don't care” or a subset ofthe total possible values.
  • the rale editor implements this approach of rules capture and compression.
  • a benefit ofthe rulesheet approach to rules capture is that the logic ofthe rules is exposed such that the user can visually see the logical interrelationships across the rules.
  • the user can easily detect logical conflicts and resolve them, h the traditional inference engines and similar approaches, these logical interrelationships can only be discovered indirectly by testing and observing the system behavior.
  • prior inference engines have been designed to perform dynamic conflict resolution. This requirement forces an iterative, one-rule-at-a-time execution design for inference engines, as shown in FIG. 9, which is inefficient for business rules automation. Since the rule editor described above helps the user resolve logical conflicts at capture time, our rule engine does not incorporate dynamic conflict resolution. Dynamic conflict resolution is what inference engines in traditional expert systems have been designed for. The fundamental architecture of traditional inferences engines is inherently suboptimal and slow for business rales automation.
  • Inference engines are an offshoot of expert systems. Interference engines were designed to solve the expert systems problem. Expert systems are primarily used for "decision support”. There is a human user interacting with the system and interpreting the outcome to help him make decisions. The architecture is designed to fail gracefully in cases of logical conflicts. The failure is in the form of inconsistent and non-determimstic behavior. Therefore, logical inconsistencies in the rule set are tolerated.
  • the human expert can add/remove rules to/from the running system. Typically, the expert system is loaded with facts and infers new facts in a long running session. The user requests typically come in the from numerous small messages. Also, typically the number of users is small and scalability is not a major requirement.
  • Inference engines are designed to support dynamic conflict resolution. Inference engines are increasingly used to automate business rales. However, architecturally they were not designed for business automation, where the requirements for a rule engine are drastically different, i.e., the rule engine is used for "decision automation", not “decision support.” Typically, there is no human expert to interpret the results. Therefore, the behavior ofthe rale engine must be deterministic, i.e., that given any particular input there is one and only one possible output. Logical inconsistencies in the rule set are not tolerated and unacceptable. Rule engines are typically used as stateless "decision services". The client requests are typically in the form of one large message in and one large message out.
  • Business rule engines must also be very scalable as opposed to inference engines in expert systems. Furthermore, there is a major rule capture problem. Our rule editor is designed for a business user. It provides an intuitive environment for capturing rules and resolving logical inconsistencies (e.g., one such inconsistency being rule conflicts). In our implementation, due to the fact that rale conflicts are resolved statically, there is no architectural requirement for dynamic conflict resolution in the rule engine.
  • FIG. 9 shows a basic architecture of inference engines. This architecture is driven by the dynamic conflict resolution requirement of expert systems. Each rale's premises are pattern matched against the known facts. All rules whose premises are fully matched are activated and placed on the agenda (conflict set). Activated rules are only fired one at a time using a conflict resolution algorithm determining which rale to fire next. When a rule fires, it may update the known facts. Before the next rale fires, another pattern match cycle occurs to make sure the agenda is up-to-date. This may also result in deactivating rales on the agenda whose premises are no longer satisfied. The most expensive part of this architecture, in terms of computer resources, is the pattern matching. It can take up to 90% of processing time.
  • FIG. 11 shows a RETE network 450 generated at runtime for the three rales in FIG. 10.
  • the network 450 is a series of pattern-matching nodes with memory (i.e. nodes that recall the previous matches made) and a series of join nodes.
  • the final state ofthe RETE network 450 is shown after execution is finished.
  • the final state ofthe agenda is displayed in the lower left corner. Note that both rules 1 and 2 where placed on the agenda for Person D. However, rule 1 fired first resulting in deactivation of rule 2. The net effect is that rule 1 has overridden rale 2. Therefore, the activation of rule 2 turned out to be unnecessary and a processing overhead. In fact, a total of 24 pattern matches were unnecessarily performed. A grand total of 46 pattern matches were performed to process the rules against the given set of facts.
  • FIG. 12 shows a flow diagram 480 depicting how the same rules (as shown in FIG. 10) are processed using our rule engine.
  • the logic necessary to process the rales is generated using an optimizing business logic generation utility.
  • This utility uses a dependency analysis utility, described below, to determine the logical dependencies across the set of rules. It also takes into account the rale overrides.
  • Rule 3 is dependent on the outcome of both rules 1 and 2 (Person.risk). Therefore, rule 3 is processed after rules 1 and 2 have finished processing. Also, since rule 2 is overridden by rale 1 then only Persons who do not match rale l's premise (i.e. are non-smokers) are processed by rule 2.
  • FIG. 12 shows the final state ofthe process.
  • the engine was able to arrive at the same exact outcome in a single-pass and using only 13 pattern matches as opposed to 46 used in the RETE case (of FIG. 11). Furthermore, unlike the RETE network 450 that can only process one activated rule at a time, the engine 480 is capable of a high degree of parallel processing since all logical conflicts have already been resolved at compile time.
  • the same dependency analysis utility can be used in conjunction with various business logic generation utilities, each optimized for a different target programming language.
  • FIG. 13 a rule engine where the business rales are captured in a declarative high-level language is shown.
  • a code generator/compiler 502 converts rules 504 into low-level business logic 508 coded in and optimized for a programming language, such as, for example, Java, C++, Jython, or JavaScrip.
  • a base library 510 that implements the rule engine's working memory is included. This is analogous to an in-memory relational database. It provides many ofthe relational algebra operations available in a relational database such as union, intersect, difference, product, restrict, project, join, divide, and so forth.
  • the business logic 508 generated is a series of calls to the working memory database to retrieve, manipulate, and update the data.
  • FIG. 14 includes example JAVA code for processing ofthe three business rales in FIG. 10.
  • FIG. 15 includes example Python code for the processing ofthe three business rules in FIG. 10.
  • working memory 510 is ideally implemented using a variation of a relational model. This is because the relational model is proven to be one ofthe most universal methods of data representation and capable of capturing a large majority of data semantics. Therefore, various types of request message payloads can be transformed to/from the working memory 510. Two ofthe most popular types of payloads are XML 512 and data objects 514.
  • An intermediate working memory form of data representation allows the generated business logic 508 to be independent of a message payload type.
  • Many inference engine vendors capture rules bound and tightly coupled to the message payload structure. Therefore, a rule set written for an XML message must be rewritten if the message type is to change to, for instance, data objects.
  • Our method relies on a high-level declarative rales capture methodology. The rales are, therefore, independent ofthe low-level constructs such a message types and structures. This makes for much more portable and reusable rule sets.
  • tuple set manager (ITSMgr) 518 is rule engine's working memory 510 preloaded with facts/data.
  • the ITSMgr 518 is asked initially to generate tuple sets ofthe contents of a table (i.e. each tuple representing an instance of a business entity). Then the script associates an alias with the resulting tuple set; this is tantamount to a relational bound variable, described below.
  • the generated business logic 508 in FIG. 13 is a series of statements that fetch tuple sets, and bind them to variables, then apply some relational operations to the tuple sets which in turn can update the tuple sets and the base data.
  • Some logical problems with multiple bind variables can occur. For example, one might find the same entity in a single rulesheet bound to both alias A and alias B, from a logical perspective. Assume one wants to take a Person entity and break up the instances of Person into two subsets, where one subset is male Persons and another subset is female Persons. One then generates two bind variables, say M and F, and associates conditions with these bind variables. The condition associated with M says that all its tuples must have a sex attribute equal to 'male'. The condition associated with F says that all its tuples must have a sex attribute equal to 'female' . From this point forward M and F represent those two Person subsets.
  • Some rulesheets can be specified to require iteration due to some intended logical loops in their rale set.
  • the generated business logic 508 in FIG. 13 contains a loop construct.
  • the rule engine iterates through a loop until no more changes to the data are made or a predetermined maximum number of iterations is reached. The latter stop condition is necessary to avoid endless loops.
  • An advantage of our rule engine is that when the working memory 510 is loaded, all of the associations and relationships between the entities passed in are preserved so that the engine can rapidly traverse such associations without requiring a relational join across entities (tables) .
  • the working memory 510 is based on a relational model.
  • the working memory 510 also leverages object-orientation concepts such as pointers to efficiently traverse associations.
  • object-orientation concepts such as pointers to efficiently traverse associations.
  • a join is performed across two tables resulting in a cross product, wliich contains a larger number of records than the original tables. Then typically the large result set is filtered down to the desired set by equating a foreign key field of one table to an associated primary key field of another.
  • Association traversals in the relational model are expensive due to computational intensive nature of such joins.
  • entity associations are tracked as bidirectional pointers so the engine does not have to perform dynamic joins to transverse associations. This is similar to how associations are carried in an object-oriented model, i.e., as object pointers.
  • Our process has an advantage over object models. In our process the object pointers are unidirectional and thus can only be traversed in one direction. The associations are bidirectional and thus can be traversed in both directions. This effectively doubles the expressive power of the rule language.
  • Our design principle is to perform the most computationally intensive parts of rule processing (e.g. generation of dependency graphs and conflict resolution) at rules capture and business logic generation stage. This removes the burden of having to perform such tasks at runtime, simplifying the rule engine architecture.
  • the rules capture environment and business logic generation utility thus, become more computationally intensive. In effect, a lot of "smarts" are moved from the rule engine to the rule editor.
  • Clearly removing computational complexity from a runtime environment is always advantageous and results in significantly better performance; e.g. than that of traditional inference engines.
  • a dependency graph 600 is generated for all the rales in the rulepack.
  • This dependency graph 600 contains a node for each data entity, entity attribute, entity collection, conditional expression, action expression, and rule.
  • the graph 600 contains edges from a parent node that affect the rank of a child node.
  • An entity node points to its attribute nodes.
  • An entity node points to a collection node of that entity representing all instances ofthe entity.
  • An attribute node points to a condition node if the attribute is used in the conditional expression.
  • An attribute node points to an action node if the attribute is used in the action expression.
  • a condition node points to a rule node if the condition is used in that rale.
  • a rule node points to an action node if the action is used in that rule.
  • a rule node points to another rale node if the first rule overrides the second rale.
  • An action node points to an attribute node if the action updates the attribute.
  • This dependency graph 600 forms a circuit with some start nodes and some end nodes. It is also possible for a subset of nodes to form a closed loop. Such a closed loop is called a convex subset.
  • a ranking strategy is applied to rank the nodes such that a child node has a greater value than each of its parent nodes. Also if two nodes are independent of each another (there is no path connecting the nodes) the node that is the more computationally intensive is ranked higher. The ranks are used to determine the order of processing ofthe nodes and how their computation code appears in the generated business logic.
  • the generated business logic 516 When a convex subset exists, the generated business logic 516 will iterate and continue processing the nodes until there are no more data changes in the working memory 510. Since the general ranking strategy states that each node must have a rank higher than its parent, the ranking method can result in an endless loop when encountering a convex subset. The method handles this as follows. Consider dependency graph G as shown in FIG. 17:
  • the fact that there is a convex subset in the graph requires special business logic to be generated involving a loop construct to iteratively process the set of rales in the convex subset until no more data changes occur.
  • the ranked dependency graph takes a group of rales and creates an algorithm to test rule conditions and fire rules whose conditions are met.
  • the invention can be implemented in digital electronic circuitry, or in computer hardware, firmware, software, or in combinations of them.
  • Apparatus ofthe invention can be implemented in a computer program product tangibly embodied in a machine- readable storage device for execution by a programmable processor; and method steps of the invention can be performed by a programmable processor executing a program of instructions to perform functions ofthe invention by operating on input data and generating output.
  • the invention can be implemented advantageously in one or more computer programs that are executable on a programmable system including at least one programmable processor coupled to receive data and instructions from, and to transmit data and instructions to, a data storage system, at least one input device, and at least one output device.
  • Each computer program can be implemented in a High-level procedural or object-oriented programming language or in assembly or machine language if desired; and in any case, the language can be a compiled or interpreted language.
  • Suitable processors include, by way of example, both general and special purpose microprocessors.
  • a processor will receive instructions and data from a readonly memory and/or a random access memory.
  • a computer will include one or more mass storage devices for storing data files; such devices include magnetic disks, such as internal hard disks and removable disks; magneto-optical disks; and optical disks.
  • Storage devices suitable for tangibly embodying computer program instructions and data include all forms of non- volatile memory, including by way of example semiconductor memory devices, such as EPROM, EEPROM, and flash memory devices; magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM disks. Any ofthe foregoing can be supplemented by, or incorporated in, ASICs (application-specific integrated circuits).
  • the invention can be implemented on a computer system having a display device such as a monitor or LCD screen for displaying information to the user and a keyboard and a pointing device such as a mouse or a trackball by which the user can provide input to the computer system.
  • the computer system can be programmed to provide a graphical user interface through which computer programs interact with users.

Abstract

Methods and apparatus, including computer program products, for inference processing in a fact-based business automation system, including receiving a rule set as a single package, generating a dependency graph for the rule set, and generating a sequence of processing logic for optimal processing of inputted facts.

Description

RULE ENGINE
TECHNICAL FIELD
This invention relates to a rule engine.
BACKGROUND A knowledge base contains encoded knowledge. In a rule-based expert system, the knowledge base typically incorporates definitions of facts and rules along with control information. An inference engine (sometimes referred to as a rule interpreter or rule engine) provides a reasoning mechanism in an expert system. In a rule based expert system, the inference engine typically implements forward chaining and backward chaining strategies. Forward chaining is a process of applying a set of previously determined rules to the facts in a knowledge base to see if any of them fire and thereby generate new facts. In essence, all derivable knowledge is derived in forward chaining. Backward chaining is goal-driven and used to process some queries against the knowledge base. A query is considered a goal and the knowledge base is searched for facts supporting that goal. Antecedents of such rules are made subgoals for further search if necessary. Inference engines designed for expert systems are increasingly used in business automation.
SUMMARY
In an aspect, the invention features a method including, in a processing system, receiving a rule set as a single package, generating a dependency graph for the rule set, and generating a sequence of processing logic for optimal processing of inputted facts. One or more ofthe following features can be included. Processing can include single pass execution when there are no logical loops. Processing can include multi-pass execution when there are logical loops. Processing can also include providing an endless loop terminating condition. Generating the dependency graph can include determining logical dependencies across rules contained in the rule set. Generating the dependency graph further can include resolving logical conflicts using override instructions. Generating the dependency graph further can include analyzing the rule set with a business logic generation utility optimized for one of a plurality of target programming languages and generating optimized business logic for a selected target programming language. The target programming language can be Java, C++, C#, Jython, JavaScript and Visual Basic. The business logic generation utility's generated processing logic can include a series of calls to a working memory database to retrieve, manipulate and update data.
In another aspect, the invention features a method for automating business processes including, in a computer system, receiving a rule set as a single package, determining logical conflicts within the rule set, resolving the logical conflicts, and generating a sequence of processing logic from the rule set for optimal processing of inputted facts.
One or more ofthe following features can be included. Resolving can include determining override conditions in rule collision events. Generating can include analyzing the rule set with a business logic generation utility optimized for one of a plurality of target programming languages and generating optimized business logic for the selected target programming language. The target programming language can be Java, C++, C#, Jython, JavaScript and visual basic. The business logic generation utility's generated processing logic can include a series of calls to a working memory database to retrieve, manipulate and update data.
The details of one or more embodiments ofthe invention are set forth in the accompanying drawings and the description below. Other features and advantages ofthe invention will be apparent from the description and drawings, and from the claims.
DESCRIPTION OF DRAWINGS
FIG. 1 is a block diagram of a platform.
FIG. 2 is a block diagram of a deployment platform.
FIG. 3 is flow diagram of an example development project.
FIG. 4 is a business rulesheet for a profiling example. FIG. 5 is a business rulesheet for a rejection example.
FIG. 6 is a conflict detection rulesheet view of FIG. 4.
FIG. 7 is a conflict resolution rulesheet view of FIG. 4.
FIG. 8 is a completeness check rulesheet view of FIG. 4.
FIG. 9 shows an execution flow for inference engines. FIG. 10 shows a set of three sample business rules.
FIG. 11 shows the business rules in FIG. 10 loaded into a RETE inference engine.
FIG. 12 shows the business rules in FIG. 10 as processed by the invention.
FIG. 13 shows a rule engine architecture. FIG. 14 is example generated Java logic for processing rules in FIG. 10. FIG. 15 is example generated Jython logic for processing rules in FIG. 10. FIG. 16 shows an example dependency graph for three business rules. FIG. 17 shows an example dependency graph handling convex subsets (logical loops).
Like reference symbols in the various drawings indicate like elements.
DETAILED DESCRIPTION
As shown in FIG. 1, a platform 100 includes a deployment platform 110 and a development platform 160. Each platform 110, 160 is further subdivided into application tiers, i.e., a front end (presentation), a middle tier (business logic), and a back end (database).
The front end ofthe development platform 160 is provided by products used for rapid development of graphical user interfaces (GUIs), such as the Microsoft FrontPage® web site generation tool. The middle tier ofthe development platform 160 implements a business logic of an application. The development platform 160 implements a visually declarative approach. With the development platform 160, business logic can be subdivided into business rules and process logic.
The process logic is included in a UML Modeler and Code Editor 170. The UML Modeler and Code Editor 170 includes a use case modeler 172, a business object modeler 174, a component modeler 176 and an Integrated Development Environment (IDE) 178.
Business rules, which often make up the bulk of business logic, are built and maintained in the visually declarative environment in a rules integrated development environment (IDE) 180. This allows non-technical developers, such as business experts and analysts, to generate and maintain enterprise business rules as reusable, adaptable components, which we refer to as rulepacks. Rulepacks are declarative components that encapsulate a set of business rules automating the knowledge of a particular context of a business process. Rulepacks are made up of one or more rulesheets 184. Each rulesheet can contain one or more rules that apply within the same particular scope. Rulepacks are built and maintained by the rules IDE 180.
The rules IDE 180 includes a vocabulary 181, which represents business entities, their attributes, relationships, and possibly business methods in a form of a tree view. The vocabulary 181 can be generated within the rules IDE 180 or imported from the Unified Modeling Language (UML) business object modeler (also known as a class diagram) 174 or generated directly from business objects or a relational database. The vocabulary 181 serves as an optimal drag-and-drop source for easy generation of rulesheets 184. The rules IDE 180 also includes the rulepack/rulesheet editor 182, which is a visual environment designed to be used by non-technical business experts to build and maintain rulepacks and their rulesheets. A rulesheet is a spreadsheet-like construct for intuitive development of logically correct sets of rules. In an example, rulepacks are implemented as extensible markup language (XML) documents expressed in a rules markup language generated for that purpose. The rules markup language defines an XML rules interchange format similar to that ofthe Business Rules Markup Language (BRML), which is defined by the CommonRules Java library, available from International Business Machines Corporation of Armonk, New York.
A rule repository 150 facilitates collaborative rules development through source and version control, allowing generation of authorization and access privileges for rules documents. The rule repository 150 maintains version control, offering an opportunity to roll back to previous versions of rules when necessary. The rule repository 150 can also track a business motivation behind every rule, such as business policy charters and a mission statement.
The process logic part ofthe business logic is a thin layer of transactional code, and in one implementation, is built and maintained using the UML modeler and code editor 170. When implemented in Enterprise Java architecture, the transactional code (i.e., the process logic) can be coded in Java using any standard Java IDE, such as the Together UML modeling tool and IDE products available from TogetherSoft Corporation of Raleigh, North Carolina. The TogetherSoft products automatically generate the majority ofthe process logic (including Enterprise JavaBeans), so programming requirements are reduced to a minimum.
A developer uses the UML modeler and code editor 170 to build and maintain a use case model, a business object model (a UML class diagram), a component model, and various other UML models used to implement a complete enterprise application. For these purposes, the UML modeler and editor 170 includes the use case modeler 172, the business object modeler 174, and the component modeler 176, and other UML modelers (not shown). The UML modeler and editor 170 also includes the IDE (Integrated Development Environment) 178 that supports a Java development kit (JDK), optionally extended with a Java math library to support business domain calculations. The use case modeler 172 is used to build and maintain business requirements visually in the form of UML-standard use cases. The business object modeler 174 is used to build and maintain an enterprise-level object model of all data elements. The enterprise-level model represents all data in the enterprise and can be generated de nova or derived from existing enterprise databases. The objects ofthe enterprise-level object model also contain business functions. Business rules that are non-declarative in nature or involve an algorithm or complex mathematical calculation are captured as functions. The procedural component modeler 176 is used to build and maintain those procedural business components that use rulepacks. The deployment platform 110 supports deployment on diverse distributed user interface devices 112, such as web browsers, telephones, personal digital assistants, and other client programs and access devices. Each user interface device merely communicates with supported middle tier application servers.
As shown in FIG. 1, the middle tier of an application includes a web server 120, a Java application server 130, and a business intelligence server 140. Any web server supporting JSP (Java Server Pages) and any Java application server can be used, such as a J2EE (Java 2 Enterprise Edition) compliant application server.
As shown in FIG. 2, the business intelligence server 140 manages multiple rule components 142. A rule component contains a rule engine instance. A rule component deploys a rulepack as a functional knowledge unit. The multiple rule components 142 are deployed in a J2EE environment 130. A user interface 112 communicates with a servlet 122, which can be generated by a Java Server Page (JSP), which communicates with session and entity beans 132, which in turn communicate with the rule components 142 through a standardized messaging scheme. Two types of messages are supported, i.e., synchronous (e.g., direct Java calls) and asynchronous (e.g., using XML-based messages).
The rule components 142 are preloaded with the rules in a rulepack for optimal performance. The rule components 142 can interact with various types of business components using standardized messaging (e.g., XML messaging). The business intelligence server 140 provides a central integration hub that interacts with diverse application components, such as Microsoft® COM (Component Object Model) components, CORBA (Common Object Request Broker Architecture) components, enterprise JavaBeans (EJB) components, and Java components. The business intelligence server 140 turns any Java application server into an application integrator, acting as a control center for an enterprise information system.
The back end ofthe deployment platform 110 can include any number of databases 134 based on database management products from any number of vendors. The rule repository 150 is implemented as a database, e.g., a relational database. The business intelligence server 140 is a virtual extension ofthe rule repository 150, remotely managing the lifecycle of all deployed rule components 142. Once a business rule is modified in the rule repository 150, all rule components containing rulepacks affected by the change are dynamically notified to refresh their business logic. This allows for real-time modification of system behavior without downtime.
A simple application development methodology that takes advantage ofthe features ofthe application development platform 100 is now described as an example. Unlike traditional techniques that focus on a combination of data and process, or on objects that encapsulate both data and process, the our methodology places business rules in the center of the development process.
Business rule analysis, as facilitated by the platform 100, accelerates the software development lifecycle by reducing unstructured requirements into concrete statements that are easily verified by business users. In addition, our methodology enables analysts and developers to identify, capture and test business rules from the very inception of a project. In addition, our methodology guarantees that UML-conforming documentation (such as use case models) are generated as an inherent by-product ofthe software development process. Furthermore, our methodology ensures that the documents remain in synchronization with the application logic because the business rules that the documents represent are part ofthe application. By allowing developers to begin building and testing business rules at project inception, our methodology ensures healthy design disciplines, such as providing tangible design deliverables in a project's early phases. Moreover, business rules developed early in the development process are directly incorporated into a final application, resulting in cost savings when compared with traditional "throw away" prototyping techniques. • As shown in FIG. 3, in an example development project 300, business analysts collaborate with subject matter experts (SMEs) to define (310) high-level business requirements using vocabulary understandable to the SMEs. Having the business requirements, the analysts generate (315) UML use cases using the use case modeler 172, which allows a user to specify actors and their various usages ofthe system graphically. For each use case the SME and business analyst include a high-level written narrative that explains the use case in clear, concise business terms.
A business object model can be generated de nova or derived (330) from an existing database. The business object modeler 176 can capture the business object model as a UML class diagram. The IDE 180 transforms this into a vocabulary tree view for easy drag-and-drop functionality onto the rulesheets 184. However, the vocabulary can also be generated directly in the rules IDE 180, without the need for an object model. In the tree view, the vocabulary is displayed in the form of a tree of business terms such as entities (non-leaf nodes), their attributes (leaves), and their relationships to other entities (named branches). Such a tree view presents a conceptual semantic model in a form that is understandable to the business user. The tree view can be used for building rules, test data, user interfaces, databases, and other application components. Elements of the tree view can be used by a user to drag-and-drop vocabulary terms onto a rulesheet. In the tree view, a vocabulary term can be either simple (root-level) or complex (branch-level). When an entity relationship link is drag-and-dropped, relationship traversals are handled automatically using a dot-notation (e.g., person.employer.address) that gives a business term a specific context.
Business rules are developed and tested (340) using the vocabulary 181, the rulepack editor 182, and the tester 183. Business rules are captured as discrete rule sets (rulepacks). Three types of business rules are rejecters (constraints), projectors (triggers), and producers (derivations). The rulepack editor 182 enables developers to compose all types of rules that operate on data structures defined in the business object model. Developers can drag-and-drop terms from the vocabulary tree view 181 onto a rulesheet to define the conditions and actions of each rulepack. A business rule can be defined as a statement that defines or constrains some aspect of a business. A business process can be considered procedural logic used to retrieve, manipulate and update data in a transactional environment. Business rules are stored in our rule engine. Our rule engine is designed in a top down approach from the business-side to the execution engine. Our rule engine stores rules (also referred to as rulesheets) in a spreadsheet manner using a decision table concept. In general, a decision table (often called a truth table) contains a list of decisions and the criteria on which they are based. All possible situations for decisions are typically listed, and the action to take in each situation is specified. A rudimentary example is, for a traffic intersection, the decision to proceed might be expressed as "yes" or "no" and the criteria might be the "light is red" or the "light is green."
FIG. 4 shows an exemplary profile rulesheet 400. The profile rulesheet 400 captures business rules because it isolates the conditions and actions and is designed to allow one to find conflicts. Conditions 402 are located in a top left side quadrant and actions 404 are located in a bottom left side quadrant. The columns in a right quadrant are the actual implementations ofthe rules and the rule statements are located in a lower quadrant. In the example shown, a first column 406 shows a smoker is high risk. More specifically, if Person. smoker is true, then Person.risk is high. In the example shown in a second column 408, a married (i.e., Person.married = T) woman (i.e., Person.sex = F) under the age of thirty (i.e., Person.age < 30) is low risk (i.e., Person.risk = low). Essentially, the smoker condition in this rule is a "don't care" so a dash indicating "don't care" is placed in the second column 408. Thus, the conditions 402 and columns 406 and 408 represent a formal representation of informal rule statements 1 (410) and 2 (412). A rulepack containing one or more rulesheets that make up a unit of logic is also called a decision service. Each rulesheet in a decision service is designed to do a particular task analogous to a subroutine in a procedural language. In operation, the rule engine goes from rulesheet to rulesheet until a final rulesheet is reached and processed.
FIG. 5 shows an output ofthe exemplary rulesheet 400 of FIG. 4 (i.e. Person.risk) and how it flows to an exemplary reject rulesheet 420 that implements a rule statement 422, i.e., a high risk person is rejected, by setting Person.reject = T when Person.risk = High.
FIG. 6 shows an exemplary conflict detection rulesheet 430 ofthe rulesheet 400 of FIG. 4. A rule editor can detect conflicts and highlight them to the user as shown in FIG. 6. A conflict can be thought of as a logical conflict between two or more rules. In other words, a logical conflict is where there are two or more different rules that, for the same exact fact/data input(s), all rules fire resulting in contradictory and mutually exclusive actions. In the example, both rales fire for a Person who is a smoker, younger than thirty, female and married. Thus, one rule sets the Person.risk = High and one rule sets the Person.risk = Low. When such conflict is detected it can be resolved by engaging an override feature 432.
FIG. 7 shows a conflict resolution rulesheet 440 that illustrates a Person being a smoker is logically more significant than her being a married woman younger than thirty, and therefore the smoker rule overrides the female rule. Thus for such a Person, smoker rule fires and female rule is suppressed.
FIG. 8 shows a completeness check rulesheet 450. A completeness check insures that all logically possible data scenarios have been covered by insuring all possible valid combinations of data are accounted for. In the example, a total of seven possible
"simple" scenarios are missing from the rulesheet, which can be compressed to a smallest possible set of three "complex" rules that can include dashes (or "don't cares") for some condition values. Also some conditions can result in a set of values for a rule. The completeness check rulesheet 450 allows a business user to view all possibilities and determine which business rules are important and complete the rulesheet. The way the number of missing rules is detected is that for each condition a complete value set is specified. In the example, for smoker there is { true, false }, for age there is { younger than thirty, thirty and older }, for sex there is { male, female }, and for married there is { true, false }. This gives a total of 24 possibilities, or 16 possibilities. So there are 16 possible "simple" rules, i.e., rules that do not include dashes or "don't cares". The rulesheets can be optimized to reduce the total number of possibilities into a smallest possible rule set.
For example, consider two rules 410 and 412 (of FIG. 4). Let's assume two different rules. A first rule states if a Person is a smoker, younger than 30, female and married then her risk profile is set to 'Low' . A second rule is identical to the first rule except the smoker condition value is different, i.e., if the person is a non-smoker and the other attributes are the same as the first rule then the risk profile is set to 'Low'. In both rules, if the Person is younger than thirty, female and married, whether she is a smoker or not, then her risk profile is set to 'Low' . That means that the smoker condition is irrelevant and does not impact the outcome. This is because for all the smoker condition possibilities (true and false), the risk profile is set to Low. Thus, the two "simple" rules can be collapsed into a single "complex" rale in which the smoker condition is irrelevant (i.e., "don't care") and the total number of rules can be compressed from two to one.
Any set of rules can be compressed into the smallest possible set that is logically equivalent to the original set. The compressed set of rules can have many conditions with a value of "don't care" or a subset ofthe total possible values. The rale editor implements this approach of rules capture and compression.
A benefit ofthe rulesheet approach to rules capture is that the logic ofthe rules is exposed such that the user can visually see the logical interrelationships across the rules. The user can easily detect logical conflicts and resolve them, h the traditional inference engines and similar approaches, these logical interrelationships can only be discovered indirectly by testing and observing the system behavior. Also, since logical conflicts among rules in traditional systems are handled at runtime, prior inference engines have been designed to perform dynamic conflict resolution. This requirement forces an iterative, one-rule-at-a-time execution design for inference engines, as shown in FIG. 9, which is inefficient for business rules automation. Since the rule editor described above helps the user resolve logical conflicts at capture time, our rule engine does not incorporate dynamic conflict resolution. Dynamic conflict resolution is what inference engines in traditional expert systems have been designed for. The fundamental architecture of traditional inferences engines is inherently suboptimal and slow for business rales automation.
Inference engines are an offshoot of expert systems. Interference engines were designed to solve the expert systems problem. Expert systems are primarily used for "decision support". There is a human user interacting with the system and interpreting the outcome to help him make decisions. The architecture is designed to fail gracefully in cases of logical conflicts. The failure is in the form of inconsistent and non-determimstic behavior. Therefore, logical inconsistencies in the rule set are tolerated. The human expert can add/remove rules to/from the running system. Typically, the expert system is loaded with facts and infers new facts in a long running session. The user requests typically come in the from numerous small messages. Also, typically the number of users is small and scalability is not a major requirement. Due to the fact that individual rales can be added/removed dynamically, prior inference engines are designed to support dynamic conflict resolution. Inference engines are increasingly used to automate business rales. However, architecturally they were not designed for business automation, where the requirements for a rule engine are drastically different, i.e., the rule engine is used for "decision automation", not "decision support." Typically, there is no human expert to interpret the results. Therefore, the behavior ofthe rale engine must be deterministic, i.e., that given any particular input there is one and only one possible output. Logical inconsistencies in the rule set are not tolerated and unacceptable. Rule engines are typically used as stateless "decision services". The client requests are typically in the form of one large message in and one large message out. Business rule engines must also be very scalable as opposed to inference engines in expert systems. Furthermore, there is a major rule capture problem. Our rule editor is designed for a business user. It provides an intuitive environment for capturing rules and resolving logical inconsistencies (e.g., one such inconsistency being rule conflicts). In our implementation, due to the fact that rale conflicts are resolved statically, there is no architectural requirement for dynamic conflict resolution in the rule engine.
FIG. 9 shows a basic architecture of inference engines. This architecture is driven by the dynamic conflict resolution requirement of expert systems. Each rale's premises are pattern matched against the known facts. All rules whose premises are fully matched are activated and placed on the agenda (conflict set). Activated rules are only fired one at a time using a conflict resolution algorithm determining which rale to fire next. When a rule fires, it may update the known facts. Before the next rale fires, another pattern match cycle occurs to make sure the agenda is up-to-date. This may also result in deactivating rales on the agenda whose premises are no longer satisfied. The most expensive part of this architecture, in terms of computer resources, is the pattern matching. It can take up to 90% of processing time. This is why there are numerous pattern matching algorithms (e.g. RETE and TREAT), each optimized for a specific problem domain. The pattern match-conflict resolution cycle shown in FIG. 9 allows rales to impact other rales execution. For example, a rale can deactivate another rale by updating working memory so that the latter rules' premises are no longer satisfied. FIG. 10 lists three business rules. Rules 1 and 2, as previously discussed, are in conflict with each other. In order to resolve the conflict, let us assume rule 1 overrides rule 2. In order to implement these rules in an inference engine, they are converted to formal logic as shown. However, in order to implement an override, rule priorities are used to insure rale 1 fires first. Furthermore, an additional condition "Person.risk = null" is added to the premises of both rules to make them mutually exclusive (i.e. only one can fire for each Person).
FIG. 11 shows a RETE network 450 generated at runtime for the three rales in FIG. 10. The network 450 is a series of pattern-matching nodes with memory (i.e. nodes that recall the previous matches made) and a series of join nodes. Given the working memory of facts in the upper right corner ofthe diagram, the final state ofthe RETE network 450 is shown after execution is finished. The final state ofthe agenda is displayed in the lower left corner. Note that both rules 1 and 2 where placed on the agenda for Person D. However, rule 1 fired first resulting in deactivation of rule 2. The net effect is that rule 1 has overridden rale 2. Therefore, the activation of rule 2 turned out to be unnecessary and a processing overhead. In fact, a total of 24 pattern matches were unnecessarily performed. A grand total of 46 pattern matches were performed to process the rules against the given set of facts.
FIG. 12 shows a flow diagram 480 depicting how the same rules (as shown in FIG. 10) are processed using our rule engine. The logic necessary to process the rales is generated using an optimizing business logic generation utility. This utility uses a dependency analysis utility, described below, to determine the logical dependencies across the set of rules. It also takes into account the rale overrides. Rule 3 is dependent on the outcome of both rules 1 and 2 (Person.risk). Therefore, rule 3 is processed after rules 1 and 2 have finished processing. Also, since rule 2 is overridden by rale 1 then only Persons who do not match rale l's premise (i.e. are non-smokers) are processed by rule 2. FIG. 12 shows the final state ofthe process. The engine was able to arrive at the same exact outcome in a single-pass and using only 13 pattern matches as opposed to 46 used in the RETE case (of FIG. 11). Furthermore, unlike the RETE network 450 that can only process one activated rule at a time, the engine 480 is capable of a high degree of parallel processing since all logical conflicts have already been resolved at compile time.
The same dependency analysis utility can be used in conjunction with various business logic generation utilities, each optimized for a different target programming language. In FIG. 13, a rule engine where the business rales are captured in a declarative high-level language is shown. A code generator/compiler 502 converts rules 504 into low-level business logic 508 coded in and optimized for a programming language, such as, for example, Java, C++, Jython, or JavaScrip. A base library 510 that implements the rule engine's working memory is included. This is analogous to an in-memory relational database. It provides many ofthe relational algebra operations available in a relational database such as union, intersect, difference, product, restrict, project, join, divide, and so forth. The business logic 508 generated is a series of calls to the working memory database to retrieve, manipulate, and update the data.
FIG. 14 includes example JAVA code for processing ofthe three business rales in FIG. 10. FIG. 15 includes example Python code for the processing ofthe three business rules in FIG. 10.
Referring again to FIG. 13, working memory 510 is ideally implemented using a variation of a relational model. This is because the relational model is proven to be one ofthe most universal methods of data representation and capable of capturing a large majority of data semantics. Therefore, various types of request message payloads can be transformed to/from the working memory 510. Two ofthe most popular types of payloads are XML 512 and data objects 514. An intermediate working memory form of data representation allows the generated business logic 508 to be independent of a message payload type. Many inference engine vendors capture rules bound and tightly coupled to the message payload structure. Therefore, a rule set written for an XML message must be rewritten if the message type is to change to, for instance, data objects. Our method relies on a high-level declarative rales capture methodology. The rales are, therefore, independent ofthe low-level constructs such a message types and structures. This makes for much more portable and reusable rule sets.
In the sample codes shown in FIG. 14 and 15, tuple set manager (ITSMgr) 518 is rule engine's working memory 510 preloaded with facts/data. The ITSMgr 518 is asked initially to generate tuple sets ofthe contents of a table (i.e. each tuple representing an instance of a business entity). Then the script associates an alias with the resulting tuple set; this is tantamount to a relational bound variable, described below. The generated business logic 508 in FIG. 13 is a series of statements that fetch tuple sets, and bind them to variables, then apply some relational operations to the tuple sets which in turn can update the tuple sets and the base data.
Some logical problems with multiple bind variables can occur. For example, one might find the same entity in a single rulesheet bound to both alias A and alias B, from a logical perspective. Assume one wants to take a Person entity and break up the instances of Person into two subsets, where one subset is male Persons and another subset is female Persons. One then generates two bind variables, say M and F, and associates conditions with these bind variables. The condition associated with M says that all its tuples must have a sex attribute equal to 'male'. The condition associated with F says that all its tuples must have a sex attribute equal to 'female' . From this point forward M and F represent those two Person subsets.
Some rulesheets can be specified to require iteration due to some intended logical loops in their rale set. When this is the case, the generated business logic 508 in FIG. 13 contains a loop construct. The rule engine iterates through a loop until no more changes to the data are made or a predetermined maximum number of iterations is reached. The latter stop condition is necessary to avoid endless loops. Most business scenarios, however, only need a single pass execution and do not require loop processing. An advantage of our rule engine is that when the working memory 510 is loaded, all of the associations and relationships between the entities passed in are preserved so that the engine can rapidly traverse such associations without requiring a relational join across entities (tables) . The working memory 510 is based on a relational model. However, the working memory 510 also leverages object-orientation concepts such as pointers to efficiently traverse associations. To traverse an association in the relational model, a join is performed across two tables resulting in a cross product, wliich contains a larger number of records than the original tables. Then typically the large result set is filtered down to the desired set by equating a foreign key field of one table to an associated primary key field of another. Association traversals in the relational model are expensive due to computational intensive nature of such joins. Here when information is passed in, entity associations are tracked as bidirectional pointers so the engine does not have to perform dynamic joins to transverse associations. This is similar to how associations are carried in an object-oriented model, i.e., as object pointers. Our process has an advantage over object models. In our process the object pointers are unidirectional and thus can only be traversed in one direction. The associations are bidirectional and thus can be traversed in both directions. This effectively doubles the expressive power of the rule language.
Our design principle is to perform the most computationally intensive parts of rule processing (e.g. generation of dependency graphs and conflict resolution) at rules capture and business logic generation stage. This removes the burden of having to perform such tasks at runtime, simplifying the rule engine architecture. The rules capture environment and business logic generation utility, thus, become more computationally intensive. In effect, a lot of "smarts" are moved from the rule engine to the rule editor. Clearly removing computational complexity from a runtime environment is always advantageous and results in significantly better performance; e.g. than that of traditional inference engines.
In traditional inference engines, there is a conflict resolution step that is required to dynamically handle conflicting rules, but it is also very computationally intensive. Our approach is to resolve conflict when the business logic is generated for execution, leaving the runtime business logic 508 clean and typically requiring only a single pass.
Referring to FIG. 16, to accomplish this conflict resolution analysis at business logic generation time a dependency graph 600 is generated for all the rales in the rulepack. This dependency graph 600 contains a node for each data entity, entity attribute, entity collection, conditional expression, action expression, and rule. The graph 600 contains edges from a parent node that affect the rank of a child node. An entity node points to its attribute nodes. An entity node points to a collection node of that entity representing all instances ofthe entity. An attribute node points to a condition node if the attribute is used in the conditional expression. An attribute node points to an action node if the attribute is used in the action expression. A condition node points to a rule node if the condition is used in that rale. A rule node points to an action node if the action is used in that rule. A rule node points to another rale node if the first rule overrides the second rale. An action node points to an attribute node if the action updates the attribute. This dependency graph 600 forms a circuit with some start nodes and some end nodes. It is also possible for a subset of nodes to form a closed loop. Such a closed loop is called a convex subset. After the generation of this graph 600, a ranking strategy is applied to rank the nodes such that a child node has a greater value than each of its parent nodes. Also if two nodes are independent of each another (there is no path connecting the nodes) the node that is the more computationally intensive is ranked higher. The ranks are used to determine the order of processing ofthe nodes and how their computation code appears in the generated business logic.
When a convex subset exists, the generated business logic 516 will iterate and continue processing the nodes until there are no more data changes in the working memory 510. Since the general ranking strategy states that each node must have a rank higher than its parent, the ranking method can result in an endless loop when encountering a convex subset. The method handles this as follows. Consider dependency graph G as shown in FIG. 17:
• G (Nodes, Edges) such that: • Nodes = {A, B, C, D} and
• Edges = {(A, B), (B, C), (C, A), (D, A)} The convex subset is shown in graph G* :
• G*(Nodes*, Edges*) such that:
• Nodes* = {A, B, C} and • Edges* = {(A, B), (B, C), (C, A)}
To properly rank the nodes, we remove the edges involved in the convex subset (loop) from G resulting in graph G' :
• G' (Nodes, Edges') = G - G* where: • Edges' = {(D, A)} Now the nodes in G' are ranked according to the general ranking strategy. This results in A = 2, B = 1, C = 1, D = 1. We select the node with the highest rank involved in the convex subset as the root ofthe loop. Therefore, within G* the node A has the highest rank and becomes the root ofthe convex subset. Now we put the convex subset edges back into G' with the exception of those edges pointing to A, the root. This breaks the loop and allows us to run the general ranking method. The new rankings are A = 2, B = 3, C = 4, D = l s shown in G". This gives us the optimal sequence of processing. The fact that there is a convex subset in the graph requires special business logic to be generated involving a loop construct to iteratively process the set of rales in the convex subset until no more data changes occur. The ranked dependency graph takes a group of rales and creates an algorithm to test rule conditions and fire rules whose conditions are met.
The invention can be implemented in digital electronic circuitry, or in computer hardware, firmware, software, or in combinations of them. Apparatus ofthe invention can be implemented in a computer program product tangibly embodied in a machine- readable storage device for execution by a programmable processor; and method steps of the invention can be performed by a programmable processor executing a program of instructions to perform functions ofthe invention by operating on input data and generating output. The invention can be implemented advantageously in one or more computer programs that are executable on a programmable system including at least one programmable processor coupled to receive data and instructions from, and to transmit data and instructions to, a data storage system, at least one input device, and at least one output device. Each computer program can be implemented in a High-level procedural or object-oriented programming language or in assembly or machine language if desired; and in any case, the language can be a compiled or interpreted language. Suitable processors include, by way of example, both general and special purpose microprocessors. Generally, a processor will receive instructions and data from a readonly memory and/or a random access memory. Generally, a computer will include one or more mass storage devices for storing data files; such devices include magnetic disks, such as internal hard disks and removable disks; magneto-optical disks; and optical disks. Storage devices suitable for tangibly embodying computer program instructions and data include all forms of non- volatile memory, including by way of example semiconductor memory devices, such as EPROM, EEPROM, and flash memory devices; magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM disks. Any ofthe foregoing can be supplemented by, or incorporated in, ASICs (application-specific integrated circuits). To provide for interaction with a user, the invention can be implemented on a computer system having a display device such as a monitor or LCD screen for displaying information to the user and a keyboard and a pointing device such as a mouse or a trackball by which the user can provide input to the computer system. The computer system can be programmed to provide a graphical user interface through which computer programs interact with users.
Other embodiments are within the scope ofthe following claims.

Claims

WHAT IS CLAIMED IS:
1. A method comprising: in a processing system, receiving a rule set as a single package; generating a dependency graph for the rule set; and generating a sequence of processing logic for optimal processing of inputted facts.
2. The method of claim 1 in which processing comprises single pass execution when there are no logical loops.
3. The method of claim 1 in which processing comprises multi-pass execution when there is logical loops.
4. The method of claim 3 in which processing further comprises providing an endless loop terminating condition.
5. The method of claim 1 in which the rule set is free of logical conflicts.
6. The method of claim 1 in which generating the dependency graph comprises determining logical dependencies across rules contained in the rale set.
7. The method of claim 6 in which generating the dependency graph further comprises resolving logical conflicts using override instructions.
8. The method of claim 7 in which generating the dependency graph further comprises analyzing the rule set with a business logic generation utility optimized for one of a plurality of target programming languages and generating optimized logic for a selected target programming language.
9. The method of claim 8 in which the target programming language is Java.
10. The method of claim 8 in which the target programming language is C++.
11. The method of claim 8 in which the target programming language is Jython.
12. The method of claim 8 in which the target programming language is JavaScript.
13. The method of claim 8 in which the target programming language is Nisual Basic
14. The method of claim 8 in which the target programming language is C#.
15. The method of claim 8 in which the business logic generation utility's generated processing logic comprises a series of calls to a working memory database to retrieve, manipulate and update data.
16. A method for automating business processes comprising: in a computer system, receiving a rule set as a single package; determining logical conflicts within the rule set; resolving the logical conflicts; and generating a sequence of processing logic from the rale set for optimal processing of inputted facts.
17. The method of claim 16 in which resolving comprises determining override conditions in rule collision events.
18. The method of claim 16 in which generating comprises analyzing the rule set with a business logic generation utility optimized for one of a plurality of target programming languages and generating optimized business logic for the selected target programming language.
19. The method of claim 18 in which the target programming language is Java.
20. The method of claim 18 in which the target programming language is C++.
21. The method of claim 18 in which the target programming language is Jython.
22. The method of claim 18 in which the target programming language is JavaScript.
23. The method of claim 18 in which the target programming language is Visual Basic.
24. The method of claim 18 in which the target programming language is C#.
25. The method of claim 18 in which the business logic generation utility's generated processing logic comprises a series of calls to a working memory database to retrieve, manipulate and update data.
26. A computer program product, disposed on a computer readable medium, for business processing automation, the program including instructions for causing a processor to: receive a rule set as a single package; generate a dependency graph for the rale set; and generate a sequence of processing logic for optimal processing of inputted facts.
27. The product of claim 26 in which the rule set is free of logical conflicts.
28. The product of claim 26 in which to generate the dependency graph comprises determining logical dependencies across rules contained in the rule set.
29. The product of claim 28 in which to generate the dependency graph further comprises instructions for causing the processor to: determine logical conflicts between rales in the rule set; and resolve the logical conflicts with override instructions.
PCT/US2003/025076 2002-08-09 2003-08-11 Rule engine WO2004015627A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU2003259744A AU2003259744A1 (en) 2002-08-09 2003-08-11 Rule engine
EP03785168A EP1543472A2 (en) 2002-08-09 2003-08-11 Rule engine

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US40216002P 2002-08-09 2002-08-09
US60/402,160 2002-08-09

Publications (2)

Publication Number Publication Date
WO2004015627A2 true WO2004015627A2 (en) 2004-02-19
WO2004015627A3 WO2004015627A3 (en) 2004-12-16

Family

ID=31715796

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2003/025076 WO2004015627A2 (en) 2002-08-09 2003-08-11 Rule engine

Country Status (4)

Country Link
US (1) US7565642B2 (en)
EP (1) EP1543472A2 (en)
AU (1) AU2003259744A1 (en)
WO (1) WO2004015627A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008009990A1 (en) * 2006-07-19 2008-01-24 Chronicle Solutions (Uk) Limited System

Families Citing this family (119)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6965889B2 (en) * 2000-05-09 2005-11-15 Fair Isaac Corporation Approach for generating rules
US7854230B2 (en) * 2001-10-22 2010-12-21 O.R. Solutions, Inc. Heated medical instrument stand with surgical drape and method of detecting fluid and leaks in the stand tray
US7689649B2 (en) * 2002-05-31 2010-03-30 Aol Inc. Rendering destination instant messaging personalization items before communicating with destination
US20040060038A1 (en) * 2002-09-25 2004-03-25 Duncan Johnston-Watt Verifiable processes in a heterogeneous distributed computing environment
US7139837B1 (en) * 2002-10-04 2006-11-21 Ipolicy Networks, Inc. Rule engine
US7454400B2 (en) * 2002-10-24 2008-11-18 Xerox Corporation System for negotiation with mirroring
US7409378B2 (en) * 2002-10-24 2008-08-05 Xerox Corporation System for negotiation using graphs
US7636755B2 (en) 2002-11-21 2009-12-22 Aol Llc Multiple avatar personalities
US8037150B2 (en) * 2002-11-21 2011-10-11 Aol Inc. System and methods for providing multiple personas in a communications environment
US7680818B1 (en) * 2002-12-18 2010-03-16 Oracle International Corporation Analyzing the dependencies between objects in a system
US7346889B1 (en) * 2003-01-16 2008-03-18 Oracle International Corporation Method and system for building message instances
US20040179037A1 (en) 2003-03-03 2004-09-16 Blattner Patrick D. Using avatars to communicate context out-of-band
US7908554B1 (en) 2003-03-03 2011-03-15 Aol Inc. Modifying avatar behavior based on user action or mood
GB0314800D0 (en) * 2003-06-25 2003-07-30 Hyfinity Ltd System and associated methods for software assembly
US7647212B2 (en) * 2003-11-14 2010-01-12 Palo Alto Research Center Incorporated Graph-based negotiation system with encapsulated constraint solver
US7464330B2 (en) * 2003-12-09 2008-12-09 Microsoft Corporation Context-free document portions with alternate formats
WO2005069861A2 (en) * 2004-01-15 2005-08-04 Resonant Software Adaptive process for managing business processes
US20050172280A1 (en) * 2004-01-29 2005-08-04 Ziegler Jeremy R. System and method for preintegration of updates to an operating system
US7549118B2 (en) * 2004-04-30 2009-06-16 Microsoft Corporation Methods and systems for defining documents with selectable and/or sequenceable parts
US8661332B2 (en) * 2004-04-30 2014-02-25 Microsoft Corporation Method and apparatus for document processing
US7359902B2 (en) * 2004-04-30 2008-04-15 Microsoft Corporation Method and apparatus for maintaining relationships between parts in a package
US7383500B2 (en) * 2004-04-30 2008-06-03 Microsoft Corporation Methods and systems for building packages that contain pre-paginated documents
US7487448B2 (en) * 2004-04-30 2009-02-03 Microsoft Corporation Document mark up methods and systems
US7580948B2 (en) * 2004-05-03 2009-08-25 Microsoft Corporation Spooling strategies using structured job information
US7755786B2 (en) 2004-05-03 2010-07-13 Microsoft Corporation Systems and methods for support of various processing capabilities
US7519899B2 (en) 2004-05-03 2009-04-14 Microsoft Corporation Planar mapping of graphical elements
US8243317B2 (en) * 2004-05-03 2012-08-14 Microsoft Corporation Hierarchical arrangement for spooling job data
US8363232B2 (en) * 2004-05-03 2013-01-29 Microsoft Corporation Strategies for simultaneous peripheral operations on-line using hierarchically structured job information
US7617450B2 (en) 2004-09-30 2009-11-10 Microsoft Corporation Method, system, and computer-readable medium for creating, inserting, and reusing document parts in an electronic document
US9459838B2 (en) * 2004-11-15 2016-10-04 Peter Ar-Fu Lam Path driven programming method and programming tool
US7584111B2 (en) * 2004-11-19 2009-09-01 Microsoft Corporation Time polynomial Arrow-Debreu market equilibrium
US7617451B2 (en) * 2004-12-20 2009-11-10 Microsoft Corporation Structuring data for word processing documents
US20060136816A1 (en) * 2004-12-20 2006-06-22 Microsoft Corporation File formats, methods, and computer program products for representing documents
US7617229B2 (en) * 2004-12-20 2009-11-10 Microsoft Corporation Management and use of data in a computer-generated document
US7752632B2 (en) * 2004-12-21 2010-07-06 Microsoft Corporation Method and system for exposing nested data in a computer-generated document in a transparent manner
US9652809B1 (en) 2004-12-21 2017-05-16 Aol Inc. Using user profile information to determine an avatar and/or avatar characteristics
US7770180B2 (en) * 2004-12-21 2010-08-03 Microsoft Corporation Exposing embedded data in a computer-generated document
US7613671B2 (en) 2005-02-15 2009-11-03 Fair Isaac Corporation Approach for re-using business rules
US20060277452A1 (en) * 2005-06-03 2006-12-07 Microsoft Corporation Structuring data for presentation documents
US20070022128A1 (en) * 2005-06-03 2007-01-25 Microsoft Corporation Structuring data for spreadsheet documents
US7567553B2 (en) * 2005-06-10 2009-07-28 Swift Creek Systems, Llc Method, system, and data structure for providing a general request/response messaging protocol using a presence protocol
US20070005725A1 (en) * 2005-06-30 2007-01-04 Morris Robert P Method and apparatus for browsing network resources using an asynchronous communications protocol
US20070027915A1 (en) * 2005-07-29 2007-02-01 Morris Robert P Method and system for processing a workflow using a publish-subscribe protocol
US7512880B2 (en) * 2005-12-23 2009-03-31 Swift Creek Systems, Llc Method and system for presenting published information in a browser
US20070168420A1 (en) * 2005-12-30 2007-07-19 Morris Robert P Method and apparatus for providing customized subscription data
US7958077B2 (en) * 2006-01-19 2011-06-07 Paymo, Inc. Rules engine for enterprise system
US7587450B2 (en) * 2006-02-01 2009-09-08 Swift Creek Systems, Llc HTTP publish/subscribe communication protocol
US20070208702A1 (en) * 2006-03-02 2007-09-06 Morris Robert P Method and system for delivering published information associated with a tuple using a pub/sub protocol
US7562340B2 (en) * 2006-03-23 2009-07-14 International Business Machines Corporation Method for graphically building business rule conditions
CN101093493B (en) * 2006-06-23 2011-08-31 国际商业机器公司 Speech conversion method for database inquiry and converter
US20080005294A1 (en) * 2006-06-30 2008-01-03 Morris Robert P Method and system for exchanging messages using a presence service
US20080077653A1 (en) * 2006-09-26 2008-03-27 Morris Robert P Methods, systems, and computer program products for enabling dynamic content in a markup-language-based page using a dynamic markup language element
US20080120337A1 (en) * 2006-11-21 2008-05-22 Fry Jared S Method And System For Performing Data Operations Using A Publish/Subscribe Service
US9330190B2 (en) 2006-12-11 2016-05-03 Swift Creek Systems, Llc Method and system for providing data handling information for use by a publish/subscribe client
US20080147799A1 (en) * 2006-12-13 2008-06-19 Morris Robert P Methods, Systems, And Computer Program Products For Providing Access To A Secure Service Via A Link In A Message
US20080183816A1 (en) * 2007-01-31 2008-07-31 Morris Robert P Method and system for associating a tag with a status value of a principal associated with a presence client
WO2008124156A1 (en) * 2007-04-09 2008-10-16 Enterra Strategies, Llc Creating deployable software for implementing a business process using a library of preconfigured processes
US8069129B2 (en) * 2007-04-10 2011-11-29 Ab Initio Technology Llc Editing and compiling business rules
AU2013202388A1 (en) * 2007-04-10 2013-05-02 Ab Initio Technology Llc Editing and compiling business rules
US8312417B2 (en) 2007-05-18 2012-11-13 International Business Machines Corporation Using dynamic call graphs for creating state machines
US8521501B2 (en) * 2007-06-27 2013-08-27 International Business Machines Corporation Real-time performance modeling of application in distributed environment and method of use
US20090037582A1 (en) * 2007-07-31 2009-02-05 Morris Robert P Method And System For Managing Access To A Resource Over A Network Using Status Information Of A Principal
US8315967B2 (en) * 2007-08-31 2012-11-20 Red Hat, Inc. Sequential mode in a Rete rule engine
US8464207B2 (en) * 2007-10-12 2013-06-11 Novell Intellectual Property Holdings, Inc. System and method for tracking software changes
US20100174648A1 (en) * 2007-10-29 2010-07-08 IndustrySuite, LLC Secure real-time business processing systems
US8001070B2 (en) * 2007-12-17 2011-08-16 Honeywell International Inc. Object oriented rule-based system and method
US20090182689A1 (en) * 2008-01-15 2009-07-16 Microsoft Corporation Rule-based dynamic operation evaluation
US8165984B2 (en) * 2008-03-28 2012-04-24 Microsoft Corporation Decision service for applications
US8387001B2 (en) * 2008-04-17 2013-02-26 Infosys Technologies Limited Method for finding an impact on a computer generated code
CN104679807B (en) * 2008-06-30 2018-06-05 起元技术有限责任公司 Data log record in calculating based on figure
US8332870B2 (en) * 2008-09-30 2012-12-11 Accenture Global Services Limited Adapter services
JP5651121B2 (en) 2008-11-12 2015-01-07 アビニシオ テクノロジー エルエルシー Data object management and automatic linking
AU2010208112B2 (en) * 2009-01-30 2015-05-28 Ab Initio Technology Llc Processing data using vector fields
KR101693229B1 (en) * 2009-02-13 2017-01-05 아브 이니티오 테크놀로지 엘엘시 Communicating with data storage systems
US8214316B2 (en) 2009-03-23 2012-07-03 Microsoft Corporation Notification-based forward chaining
US8676737B2 (en) * 2009-10-05 2014-03-18 International Business Machines Corporation Detecting missing cases in business rules
CA2782414C (en) * 2009-12-14 2021-08-03 Ab Initio Technology Llc Specifying user interface elements
US8494997B2 (en) * 2010-07-20 2013-07-23 Samuel W. Bellamy, III System and method for validation of transaction data
US9009682B2 (en) * 2010-12-13 2015-04-14 Sap Se Enhanced unit test framework
US9020872B2 (en) * 2010-12-21 2015-04-28 International Business Machines Corporation Detecting missing rules with most general conditions
JP5928344B2 (en) * 2011-01-27 2016-06-01 日本電気株式会社 UI (UserInterface) creation support apparatus, UI creation support method, and program
US8515883B2 (en) * 2011-02-03 2013-08-20 International Business Machines Corporation Systems and methods for generating missing rules matching a minimal set of objects
US8887125B1 (en) * 2011-04-19 2014-11-11 Misys Ireland Limited Systems and methods for dynamic artefact substitution
US8806430B1 (en) * 2011-06-08 2014-08-12 The Mathworks, Inc. Renaming instances of an entity in a coding environment
US8510142B2 (en) 2011-07-20 2013-08-13 Fluor Technologies Corporation Conflicting expert systems
US8869105B2 (en) * 2011-11-17 2014-10-21 Sap Ag Extensibility integrated development environment for business object extension development
CN102929646B (en) * 2011-12-09 2016-03-02 江西省电力公司信息通信中心 Application program generation method and device
US8806425B1 (en) * 2012-05-25 2014-08-12 The Boeing Company Method and apparatus for generating infrastructure code
US9489642B2 (en) * 2012-06-19 2016-11-08 Sap Se Flow based visualization of business rule processing traces
US9703822B2 (en) 2012-12-10 2017-07-11 Ab Initio Technology Llc System for transform generation
US9286570B2 (en) 2013-01-11 2016-03-15 Red Hat, Inc. Property reactive modifications in a rete network
US9811233B2 (en) 2013-02-12 2017-11-07 Ab Initio Technology Llc Building applications for configuring processes
US20140310069A1 (en) * 2013-04-12 2014-10-16 International Business Machines Corporation Coordinated business rules management and mixed integer programming
US10776965B2 (en) * 2013-07-26 2020-09-15 Drisk, Inc. Systems and methods for visualizing and manipulating graph databases
KR102349573B1 (en) 2013-09-27 2022-01-10 아브 이니티오 테크놀로지 엘엘시 Evaluating rules applied to data
GB2521406A (en) 2013-12-18 2015-06-24 Ibm Transforming rules into generalised rules in a rule management system
US9965723B2 (en) * 2014-04-04 2018-05-08 Ca, Inc. Leveraging unique object references to enhance performance of RETE-based rule engines
US9729383B2 (en) * 2014-10-15 2017-08-08 Ayla Networks, Inc. Flexible rules engine for managing connected consumer devices
EP3251032A4 (en) * 2015-01-29 2018-08-08 Able World International Limited Interactive operation method, and transmitter machine, receiver machine and interactive operation system using the same
US10127264B1 (en) 2015-09-17 2018-11-13 Ab Initio Technology Llc Techniques for automated data analysis
US10540628B2 (en) * 2015-09-17 2020-01-21 International Business Machines Corporation Hierarchical business rule model
US9880863B2 (en) * 2015-11-13 2018-01-30 The Boeing Company Methods and systems for increasing processor speed by creating rule engine rules from unstructured text
US9760344B1 (en) * 2016-02-23 2017-09-12 Bank Of America Corporation Rules engine having an interactive, dual, side-by-side display
US10339032B2 (en) 2016-03-29 2019-07-02 Microsoft Technology Licensing, LLD System for monitoring and reporting performance and correctness issues across design, compile and runtime
US10409834B2 (en) 2016-07-11 2019-09-10 Al-Elm Information Security Co. Methods and systems for multi-dynamic data retrieval and data disbursement
US10339480B2 (en) * 2016-08-15 2019-07-02 International Business Machines Corporation Executing a set of business rules on incomplete data
FR3061337A1 (en) 2016-12-23 2018-06-29 Dhatim UNIVERSAL AND OPTIMIZED RULES ENGINE FOR THE PROCESSING OF MANAGEMENT DOCUMENTS
US11423083B2 (en) 2017-10-27 2022-08-23 Ab Initio Technology Llc Transforming a specification into a persistent computer program
US11080266B2 (en) * 2018-07-30 2021-08-03 Futurewei Technologies, Inc. Graph functional dependency checking
CN109445797A (en) * 2018-10-24 2019-03-08 北京奇虎科技有限公司 Handle task executing method and device
US11106861B2 (en) 2019-02-01 2021-08-31 Sap Se Logical, recursive definition of data transformations
EP3938924A4 (en) 2019-03-14 2022-11-30 Yadong Li Distributed system generating rule compiler engine apparatuses, methods, systems and media
US11487721B2 (en) 2019-04-30 2022-11-01 Sap Se Matching metastructure for data modeling
WO2021046105A1 (en) * 2019-09-03 2021-03-11 Linen Software Inc. Systems and methods for assigning attribution weights to nodes
US20210073655A1 (en) * 2019-09-11 2021-03-11 Sap Se Rule mining for rule and logic statement development
CN110865804A (en) * 2019-09-30 2020-03-06 天阳宏业科技股份有限公司 Rule engine optimization method, device, system and storage medium
US11526782B2 (en) * 2020-01-30 2022-12-13 Red Hat, Inc. Inferring dependencies, requirements, and productions from spreadsheet-based loosely-coupled decision tables
US11727283B2 (en) 2020-05-19 2023-08-15 International Business Machines Corporation Rule distribution across instances of rules engine
CN113689173B (en) * 2021-05-11 2023-11-03 鼎捷软件股份有限公司 Modeling device and modeling method of business logic representation model

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0355287A2 (en) * 1988-08-19 1990-02-28 International Business Machines Corporation Method for producing a knowledge based system
US5423041A (en) * 1990-09-28 1995-06-06 Texas Instruments Incorporated Coupling rules to an object-oriented program

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5442792A (en) * 1992-08-07 1995-08-15 Hughes Aircraft Company Expert system compilation method
US20020107754A1 (en) * 2000-06-27 2002-08-08 Donald Stone Rule-based system and apparatus for rating transactions
US6965887B2 (en) * 2001-03-21 2005-11-15 Resolutionebs, Inc. Rule processing methods for automating a decision and assessing satisfiability of rule-based decision diagrams
US20050043965A1 (en) * 2001-11-28 2005-02-24 Gabriel Heller Methods and apparatus for automated interactive medical management

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0355287A2 (en) * 1988-08-19 1990-02-28 International Business Machines Corporation Method for producing a knowledge based system
US5423041A (en) * 1990-09-28 1995-06-06 Texas Instruments Incorporated Coupling rules to an object-oriented program

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
KIERNAN G ET AL: "COMPILING A RULE DATABASE PROGRAM INTO A C/SQL APPLICATION" PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA ENGINEERING. KOBE, JP, APRIL 8 - 12, 1991, LOS ALAMITOS, IEEE COMP. SOC. PRESS, US, vol. CONF. 7, 8 April 1991 (1991-04-08), pages 388-395, XP000325900 ISBN: 0-8186-2138-9 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008009990A1 (en) * 2006-07-19 2008-01-24 Chronicle Solutions (Uk) Limited System

Also Published As

Publication number Publication date
WO2004015627A3 (en) 2004-12-16
US7565642B2 (en) 2009-07-21
US20040034848A1 (en) 2004-02-19
EP1543472A2 (en) 2005-06-22
AU2003259744A1 (en) 2004-02-25
AU2003259744A8 (en) 2004-02-25

Similar Documents

Publication Publication Date Title
US7565642B2 (en) Rule engine
De Raedt et al. Probabilistic (logic) programming concepts
Fensel et al. The unified problem-solving method development language UPML
Pellier et al. PDDL4J: a planning domain description library for java
US8676737B2 (en) Detecting missing cases in business rules
Avanzini et al. TcT: Tyrolean complexity tool
Bracciali et al. The KGP model of agency for global computing: Computational model and prototype implementation
Mylopoulos et al. A generic integration architecture for cooperative information systems
Belle et al. Design and implementation of distributed expert systems: On a control strategy to manage the execution flow of rule activation
Asici et al. On the use of the analytic hierarchy process in the evaluation of domain-specific modeling languages for multi-agent systems
Pfeffer Creating and Manipulating Probabilistic Programs with Figaro.
Vidal et al. OPENET: Ontology-based engine for high-level Petri nets
Lotzmann et al. DRAMS-A Declarative Rule-Based Agent Modelling System.
Potter et al. Extending decision support systems: the integration of data, knowledge, and model management
Holze et al. System models for goal-driven self-management in autonomic databases
Eiter et al. Using methods of declarative logic programming for intelligent information agents
Finthammer et al. An integrated development environment for probabilistic relational reasoning
AKŞİT The 7 C's for creating living software: A research perspective for quality-oriented software engineering
Rilling et al. Story-driven approach to software evolution
Azadbakht et al. Deadlock detection for actor-based coroutines
Claßen et al. Situation calculus meets description logics
Roblot et al. Possibilistic cardinality constraints and functional dependencies
Monte-Alto et al. Argumentation-Based Multi-Agent Distributed Reasoning in Dynamic and Open Environments
Yao et al. GenGPT: A Systematic Way to Generate Synthetic Goal-Plan Trees
Lepadat Rule-based recommender for feature engineering in big data

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2003785168

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2003785168

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP