They are pretty handy little flash "screens" actually ! It looks like it is from the Jess In Action book, with some animation.
On 2/24/06, 宋宇彬 <[EMAIL PROTECTED]> wrote: > > > here are three flash demostrate how the rete works,hope they will give u a > hand to understand how the rete network work better > > http://www.ers.com/Graphics/TheReteNetwork.html > http://www.ers.com/Graphics/TheReteNetwork2.html > http://www.ers.com/Graphics/TheReteNetwork3.html > > -----邮件原件----- > 发件人: sol myr [mailto:[EMAIL PROTECTED] > 发送时间: 2006年2月24日 14:54 > 收件人: [email protected] > 主题: [drools-user] drools and Rete-oo > > Hi, > > The Drools website refers to "Rete-oo", but I'm not sure I understand it > correctly ... especailly the "Extract Node" (mentioned in the > documentation). > > Suppose I have a class "Stock" which encapsulates some data > (for simplicity, I use only Objects, eg "java.lang.Double" ): > > class Stock{ > Double price; > Double expectedProfit; > Double risk; > } > > Now, suppose I want to do > "assertObject(someStock)" > But I was the stock to enter the Rete as a Tuple of length 3 (price, > profit, risk) , rather than Tuple of length 1 (just 1 Stock encapsulating > everything). > I understand the 3-tuple approach might give better performance, > especially if you're about to play around with just one of the attributes ( > e.g. run the same simulation over and over again, each time with just a > different "risk", while everything else remains fixed). > > Is that what the Extract Node does ? > If so, how do you cause it to work - what exactly should you put in the > < parameter > part of the rule ? > > Thanks very much. > > > --------------------------------- > Yahoo! Mail > Use Photomail to share photos without annoying attachments. > > > > ******************************************************************************************************************************** > The information in this email is confidential and may be legally > privileged. If you have received this email in error or are > not the intended recipient, please immediately notify the sender and > delete this message from your computer. Any use, distribution, > or copying of this email other than by the intended recipient is strictly > prohibited. All messages sent to and from us may be > monitored to ensure compliance with internal policies and to protect our > business. > Emails are not secure and cannot be guaranteed to be error free as they > can be intercepted, amended, lost or destroyed, > or contain viruses. Anyone who communicates with us by email is taken to > accept these risks. > > 收发邮件者请注意: > 本邮件含保密信息,若误收本邮件,请务必通知发送人并直接删去,不得使用、传播或复制本邮件。 > 进出邮件均受到本公司合规监控。邮件可能发生被截留、被修改、丢失、被破坏或包含计算机病毒等不安全情况。 > > ******************************************************************************************************************************** >
