A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2014; you can also visit the original URL.
The file type is application/pdf
.
Filters
Static analysis of XML processing with data values
2007
SIGMOD record
We thank Michael Benedikt, Leonid Libkin and Thomas Schwentick for all their comments on an earlier version of this paper. ...
Let L be a query language, for instance XPath, and C be a class of XML-schema, for instance DTD or DTD with integrity constraints. ...
For instance inclusion of fragments of XPath with joins and XML-schema validation in the presence of integrity constraints. ...
doi:10.1145/1276301.1276308
fatcat:a6kzyaipprcybcx6wmod4tcyfu
Integrity Checking and Maintenance with Active Rules in XML Databases
2007
24th British National Conference on Databases (BNCOD'07)
While specification languages for integrity constraints for XML data have been considered in the literature, actual technologies and methodologies for checking and maintaining integrity are still in their ...
Starting from a specification of the integrity constraints plus a collection of XPath expressions describing the possible updates, the method indicates trigger conditions and correctness criteria to be ...
., derived from the constraint set C only) contains predicates that test whether integrity actually is broken. ...
doi:10.1109/bncod.2007.13
dblp:conf/bncod/ChristiansenR07
fatcat:qy5drshurvfpncqqamkfrw625i
Using semantics for XPath query transformation
2010
International Journal of Web and Grid Services
The first is structural transformation for XPath query, which can be semantically contracted, expanded or complemented using structural constraints. ...
In this paper, we propose a typology of the semantic transformations for XPath queries. We focus on two main areas. ...
To overcome the problem of integrity constraints limitation in the minimisation of TPQ (Chen and Chan, 2008) explored the minimisation problem of TPQ further for a class of FBST-constraints including ...
doi:10.1504/ijwgs.2010.032191
fatcat:ratvrgfw7rgjpixkebhh2epni4
An XQuery Specification for Requests with Preferences on XML Databases
[chapter]
2020
IFIP Advances in Information and Communication Technology
To achieve this goal, requests with preferences generally consist of two parts: the first part is used to express strict constraints and the second part to express preferences or wishes. ...
Integration of the proposed language in open source implementations of XQuery like BaseX, Berkeley DB XML, eXist-db, Galax and much more, will allow users to get much more relevant responses to their concerns ...
[13] for expressing preferences in an XPath (sub)path. For example, in the path Q 1 = /a/b!/c, the subpaths /a and /c represent the constraints, while /b represents a preference. ...
doi:10.1007/978-3-030-47240-5_12
fatcat:ifr2dceohja5dggaryrhnausim
XPath query containment
2004
SIGMOD record
Acknowledgement The author thanks Frank Neven for many useful comments on an early draft of this article. ...
A very general class of constraints, simple XPath Integrity Constraints (SXICs) were introduced in [9] . They are reminiscent of embedded dependencies in relational databases (cf. [1] ). ...
Containment under constraints In general, p 2 ⊆ 0 q 2 does not hold for the expressions p 2 = /a/b//d and q 2 = /a//c. ...
doi:10.1145/974121.974140
fatcat:pw4sjceaxncsncxgethqu6kwve
Inconsistent path detection for XML IDEs
2011
Proceeding of the 33rd international conference on Software engineering - ICSE '11
We present the first IDE augmented with static detection of inconsistent paths for simplifying the development and debugging of any application involving XPath expressions. ...
XML Schema provides several XPath-based features for describing uniqueness constraints and corresponding references constraints. ...
In this paper, we consider the XPath fragment whose syntax is shown in Figure 1 , and that contains all XPath features for navigating forward, backward and recursively through nodes of the document. ...
doi:10.1145/1985793.1985967
dblp:conf/icse/GenevesL11
fatcat:7xdugbd5xnbcfp5n23o2xdac74
XML queries and constraints, containment and reformulation
2005
Theoretical Computer Science
Our results on containment and reformulation depend on certain restrictions on the query and constraint languages. ...
We identify a fragment of XBind for which containment is decidable, in fact p 2 -complete, and a further fragment for which containment is NP-complete. ...
We also thank Dan Suciu, Mary Fernandez, Susan Davidson, Peter Buneman, Yi Chen and Yifeng Zheng for their useful suggestions. ...
doi:10.1016/j.tcs.2004.10.032
fatcat:o344trzilvfnbofijl6edmvnti
Filtering unsatisfiable XPath queries
2008
Data & Knowledge Engineering
XPath XPath (see [29] and [30]) is a query language for XML data. ...
an XPath query conforms to the constraints in a given schema. ...
constraints checking
Figure 12 : 12 The function L: XPath x schema_path x XPath → Set(schema_path) for integrating fixed value checking
nodes, and creates at most O((N! ...
doi:10.1016/j.datak.2007.06.018
fatcat:fcsp5k4ajvek3eles4oe5wlete
Stream firewalling of xml constraints
2008
Proceedings of the 2008 ACM SIGMOD international conference on Management of data - SIGMOD '08
We isolate a class of DTDs and XPath constraints which support the generation of low-space filters, and provide algorithms for generating firewalls with low per-input-character time and per-stream space ...
This leads to the XML stream firewalling problem; that of applying integrity constraints against a large number of simultaneous streams. ...
In our work we will consider firewalls that enforce integrity constraints given in a subset of XPath that includes filters, boolean operations, and both vertical (parent/child) and horizontal (sibling) ...
doi:10.1145/1376616.1376667
dblp:conf/sigmod/BenediktJL08
fatcat:uvhwc533bjgsvb3diaew7mlrbu
XPath-Wrapper Induction for Data Extraction
2010
2010 International Conference on Asian Language Processing
This paper presents an XPath-wrapper induction algorithm which leverages user queries and template-based sites for extracting structured information. Our experiments show average accuracy of 94%. ...
The Web contains an enormous amount of information which is formatted for human beings. This makes it difficult for computer to extract relevant content from various sources. ...
Acknowledgement This work was partly supported by the research project VNU QG. 10 .38 Research on model and solution development for Vietnamese Entity Search Engine and implementation. ...
doi:10.1109/ialp.2010.33
dblp:conf/ialp/TranPH10
fatcat:mlmh3w2ld5aydmjbxlcjplwg2u
Equipping IDEs with XML-Path Reasoning Capabilities
2014
ACM Transactions on Internet Technology
We present the first IDE augmented with static detection of inconsistent XPath expressions that assists the programmer for simplifying the development and debugging of any application involving XPath expressions ...
We further develop this idea in the context of XQuery for which we introduce an analysis for identifying and eliminating dead code automatically. ...
The tool integrates a formal prover of properties on schemas and XPath expressions for assisting programmers in the writing and updating of XQuery code against complex XML schemas. ...
doi:10.1145/2602573
fatcat:pdef2e2cqbablmnobiys4o7kti
xlinkit: a consistency checking and smart link generation service
2002
ACM Transactions on Internet Technology
In this article we show how consistency constraints can be expressed and checked. ...
We present the architecture of our service and the results of two substantial case studies that use xlinkit for checking course syllabus information and for validating UML models supplied by industrial ...
We would also like to thank the Apache Software Foundation and its volunteers for its continued and free provision of high-quality tools such as Xerces and Xalan, which have greatly simplified our work ...
doi:10.1145/514183.514186
fatcat:x54o5qcpdzb3lcmgumdezocb5i
XPath filename expansion in a Unix shell
2006
Proceedings of the 15th international conference on World Wide Web - WWW '06
We present a concept for integrating an XPath view of the file system into a shell, the XPath Shell (XPsh), which can be used to find files based on file attributes and contents in a very flexible way. ...
The syntax of the command line language is backwards compatible with traditional shells, and the new XPath-based expressions can be easily mastered with a little bit of XPath knowledge. ...
For example, predicates allow to select files depending on their attributes (like *.txt[@size < 100]) or other more complex constraints. ...
doi:10.1145/1135777.1135916
dblp:conf/www/GigerW06
fatcat:a4e2vun45rb2fltdnpluo7c32a
An Approach of XML Query Evaluation Based Model Checking
2016
Cybernetics and Information Technologies
For the purpose of supporting the generation of the formal specifications and reducing the mapping processing, the XMLquery constraint can be converted toaspecification of SPS (Specification Pattern System ...
We investigate the potential ofatechnique based on CTL (Computation Tree Logic) model checking for evaluating queries expressed in (a subset of) XPath. ...
XML and query constraint For the sake of understanding the constraint about Xpath, we model the XML data with the new introduce definition in the view of temporal logic description. Definition 3.1. ...
doi:10.1515/cait-2016-0066
fatcat:kfnd2r4p55dvdjctj47brtyzni
Maintaining XML Data Integrity in Programs
[chapter]
2010
Lecture Notes in Computer Science
constraints: range constraints value comparisons contain aggregates like sum, count, etc. contain references (e.g. an item could reference a type) 4 start = element bin { attribute capacity { xs:integer ...
[. > 0] [ sum(//size) <= . ] }, element item * { attribute size { xs:integer [. > 0] } } } Integrity Constraints structural and base types are not enough e.g. tax declaration forms value consistence, ...
. > 0] }
} }
Integrity Constraints
structural and base types are not enough
e.g. tax declaration forms
value consistence, value relations
integrity constraints are inherent to datatypes
failures ...
doi:10.1007/978-3-642-11266-9_50
fatcat:rm2lnzaefzfpbgxgaumua5d2zm
« Previous
Showing results 1 — 15 out of 3,601 results