Filters








3,601 Hits in 2.7 sec

Static analysis of XML processing with data values

Luc Segoufin
2007 SIGMOD record  
We thank Michael Benedikt, Leonid Libkin and Thomas Schwentick for all their comments on an earlier version of this paper.  ...  Let L be a query language, for instance XPath, and C be a class of XML-schema, for instance DTD or DTD with integrity constraints.  ...  For instance inclusion of fragments of XPath with joins and XML-schema validation in the presence of integrity constraints.  ... 
doi:10.1145/1276301.1276308 fatcat:a6kzyaipprcybcx6wmod4tcyfu

Integrity Checking and Maintenance with Active Rules in XML Databases

Henning Christiansen, Maria Rekouts
2007 24th British National Conference on Databases (BNCOD'07)  
While specification languages for integrity constraints for XML data have been considered in the literature, actual technologies and methodologies for checking and maintaining integrity are still in their  ...  Starting from a specification of the integrity constraints plus a collection of XPath expressions describing the possible updates, the method indicates trigger conditions and correctness criteria to be  ...  ., derived from the constraint set C only) contains predicates that test whether integrity actually is broken.  ... 
doi:10.1109/bncod.2007.13 dblp:conf/bncod/ChristiansenR07 fatcat:qy5drshurvfpncqqamkfrw625i

Using semantics for XPath query transformation

Dung Xuan Thi Le, Stephane Bressan, David Taniar, Wenny Rahayu, Eric Pardede
2010 International Journal of Web and Grid Services  
The first is structural transformation for XPath query, which can be semantically contracted, expanded or complemented using structural constraints.  ...  In this paper, we propose a typology of the semantic transformations for XPath queries. We focus on two main areas.  ...  To overcome the problem of integrity constraints limitation in the minimisation of TPQ (Chen and Chan, 2008) explored the minimisation problem of TPQ further for a class of FBST-constraints including  ... 
doi:10.1504/ijwgs.2010.032191 fatcat:ratvrgfw7rgjpixkebhh2epni4

An XQuery Specification for Requests with Preferences on XML Databases [chapter]

Maurice Tchoupé Tchendji, Patrik Joslin Kenfack
2020 IFIP Advances in Information and Communication Technology  
To achieve this goal, requests with preferences generally consist of two parts: the first part is used to express strict constraints and the second part to express preferences or wishes.  ...  Integration of the proposed language in open source implementations of XQuery like BaseX, Berkeley DB XML, eXist-db, Galax and much more, will allow users to get much more relevant responses to their concerns  ...  [13] for expressing preferences in an XPath (sub)path. For example, in the path Q 1 = /a/b!/c, the subpaths /a and /c represent the constraints, while /b represents a preference.  ... 
doi:10.1007/978-3-030-47240-5_12 fatcat:ifr2dceohja5dggaryrhnausim

XPath query containment

Thomas Schwentick
2004 SIGMOD record  
Acknowledgement The author thanks Frank Neven for many useful comments on an early draft of this article.  ...  A very general class of constraints, simple XPath Integrity Constraints (SXICs) were introduced in [9] . They are reminiscent of embedded dependencies in relational databases (cf. [1] ).  ...  Containment under constraints In general, p 2 ⊆ 0 q 2 does not hold for the expressions p 2 = /a/b//d and q 2 = /a//c.  ... 
doi:10.1145/974121.974140 fatcat:pw4sjceaxncsncxgethqu6kwve

Inconsistent path detection for XML IDEs

Pierre Genevès, Nabil Layaïda
2011 Proceeding of the 33rd international conference on Software engineering - ICSE '11  
We present the first IDE augmented with static detection of inconsistent paths for simplifying the development and debugging of any application involving XPath expressions.  ...  XML Schema provides several XPath-based features for describing uniqueness constraints and corresponding references constraints.  ...  In this paper, we consider the XPath fragment whose syntax is shown in Figure 1 , and that contains all XPath features for navigating forward, backward and recursively through nodes of the document.  ... 
doi:10.1145/1985793.1985967 dblp:conf/icse/GenevesL11 fatcat:7xdugbd5xnbcfp5n23o2xdac74

XML queries and constraints, containment and reformulation

Alin Deutsch, Val Tannen
2005 Theoretical Computer Science  
Our results on containment and reformulation depend on certain restrictions on the query and constraint languages.  ...  We identify a fragment of XBind for which containment is decidable, in fact p 2 -complete, and a further fragment for which containment is NP-complete.  ...  We also thank Dan Suciu, Mary Fernandez, Susan Davidson, Peter Buneman, Yi Chen and Yifeng Zheng for their useful suggestions.  ... 
doi:10.1016/j.tcs.2004.10.032 fatcat:o344trzilvfnbofijl6edmvnti

Filtering unsatisfiable XPath queries

Jinghua Groppe, Sven Groppe
2008 Data & Knowledge Engineering  
XPath XPath (see [29] and [30]) is a query language for XML data.  ...  an XPath query conforms to the constraints in a given schema.  ...  constraints checking Figure 12 : 12 The function L: XPath x schema_path x XPath → Set(schema_path) for integrating fixed value checking nodes, and creates at most O((N!  ... 
doi:10.1016/j.datak.2007.06.018 fatcat:fcsp5k4ajvek3eles4oe5wlete

Stream firewalling of xml constraints

Michael Benedikt, Alan Jeffrey, Ruy Ley-Wild
2008 Proceedings of the 2008 ACM SIGMOD international conference on Management of data - SIGMOD '08  
We isolate a class of DTDs and XPath constraints which support the generation of low-space filters, and provide algorithms for generating firewalls with low per-input-character time and per-stream space  ...  This leads to the XML stream firewalling problem; that of applying integrity constraints against a large number of simultaneous streams.  ...  In our work we will consider firewalls that enforce integrity constraints given in a subset of XPath that includes filters, boolean operations, and both vertical (parent/child) and horizontal (sibling)  ... 
doi:10.1145/1376616.1376667 dblp:conf/sigmod/BenediktJL08 fatcat:uvhwc533bjgsvb3diaew7mlrbu

XPath-Wrapper Induction for Data Extraction

Nam-Khanh Tran, Kim-Cuong Pham, Quang-Thuy Ha
2010 2010 International Conference on Asian Language Processing  
This paper presents an XPath-wrapper induction algorithm which leverages user queries and template-based sites for extracting structured information. Our experiments show average accuracy of 94%.  ...  The Web contains an enormous amount of information which is formatted for human beings. This makes it difficult for computer to extract relevant content from various sources.  ...  Acknowledgement This work was partly supported by the research project VNU QG. 10 .38 Research on model and solution development for Vietnamese Entity Search Engine and implementation.  ... 
doi:10.1109/ialp.2010.33 dblp:conf/ialp/TranPH10 fatcat:mlmh3w2ld5aydmjbxlcjplwg2u

Equipping IDEs with XML-Path Reasoning Capabilities

Pierre Genevès, Nabil Layaïda
2014 ACM Transactions on Internet Technology  
We present the first IDE augmented with static detection of inconsistent XPath expressions that assists the programmer for simplifying the development and debugging of any application involving XPath expressions  ...  We further develop this idea in the context of XQuery for which we introduce an analysis for identifying and eliminating dead code automatically.  ...  The tool integrates a formal prover of properties on schemas and XPath expressions for assisting programmers in the writing and updating of XQuery code against complex XML schemas.  ... 
doi:10.1145/2602573 fatcat:pdef2e2cqbablmnobiys4o7kti

xlinkit: a consistency checking and smart link generation service

Christian Nentwich, Licia Capra, Wolfgang Emmerich, Anthony Finkelstein
2002 ACM Transactions on Internet Technology  
In this article we show how consistency constraints can be expressed and checked.  ...  We present the architecture of our service and the results of two substantial case studies that use xlinkit for checking course syllabus information and for validating UML models supplied by industrial  ...  We would also like to thank the Apache Software Foundation and its volunteers for its continued and free provision of high-quality tools such as Xerces and Xalan, which have greatly simplified our work  ... 
doi:10.1145/514183.514186 fatcat:x54o5qcpdzb3lcmgumdezocb5i

XPath filename expansion in a Unix shell

Kaspar Giger, Erik Wilde
2006 Proceedings of the 15th international conference on World Wide Web - WWW '06  
We present a concept for integrating an XPath view of the file system into a shell, the XPath Shell (XPsh), which can be used to find files based on file attributes and contents in a very flexible way.  ...  The syntax of the command line language is backwards compatible with traditional shells, and the new XPath-based expressions can be easily mastered with a little bit of XPath knowledge.  ...  For example, predicates allow to select files depending on their attributes (like *.txt[@size < 100]) or other more complex constraints.  ... 
doi:10.1145/1135777.1135916 dblp:conf/www/GigerW06 fatcat:a4e2vun45rb2fltdnpluo7c32a

An Approach of XML Query Evaluation Based Model Checking

Li Yan-Mei, Huang Shao-Bin, Li Ya, Xu Li
2016 Cybernetics and Information Technologies  
For the purpose of supporting the generation of the formal specifications and reducing the mapping processing, the XMLquery constraint can be converted toaspecification of SPS (Specification Pattern System  ...  We investigate the potential ofatechnique based on CTL (Computation Tree Logic) model checking for evaluating queries expressed in (a subset of) XPath.  ...  XML and query constraint For the sake of understanding the constraint about Xpath, we model the XML data with the new introduce definition in the view of temporal logic description. Definition 3.1.  ... 
doi:10.1515/cait-2016-0066 fatcat:kfnd2r4p55dvdjctj47brtyzni

Maintaining XML Data Integrity in Programs [chapter]

Patrick Michel, Arnd Poetzsch-Heffter
2010 Lecture Notes in Computer Science  
constraints: range constraints value comparisons contain aggregates like sum, count, etc. contain references (e.g. an item could reference a type) 4 start = element bin { attribute capacity { xs:integer  ...  [. > 0] [ sum(//size) <= . ] }, element item * { attribute size { xs:integer [. > 0] } } } Integrity Constraints structural and base types are not enough e.g. tax declaration forms value consistence,  ...  . > 0] } } } Integrity Constraints structural and base types are not enough e.g. tax declaration forms value consistence, value relations integrity constraints are inherent to datatypes failures  ... 
doi:10.1007/978-3-642-11266-9_50 fatcat:rm2lnzaefzfpbgxgaumua5d2zm
« Previous Showing results 1 — 15 out of 3,601 results