• Title/Summary/Keyword: XML Labeling

Search Result 24, Processing Time 0.027 seconds

Efficient XML Twig Query Processing based on Path-summarized Labeling Schemes (경로 정보 축약 레이블링 기법을 이용한 효율적인 XML 분기 질의 처리)

  • Seo, Se-Hoon;Bae, Jin-Uk;Lee, Suk-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11b
    • /
    • pp.178-180
    • /
    • 2005
  • 지금까지 제안된 XML 문서상의 분기 질의(twig query) 처리 기법들의 중요한 흐름 중 하나는 지역 인코딩 기법을 이용하는 것이다. 하지만 이 기법에 기반한 분기 질의 처리는 분기 질의상의 단말 노드와 분기 노드의 엘리먼트를 반드시 읽어야 하는 단점이 있다. 그러나 지역 인코딩 기법과는 달리 경로 정보를 축약하는 방식의 레이블링 기법(예: 듀이 인코딩)은 지역 인코딩에 의한 레이블에 비해 더 많은 정보를 담고 있어서, 이 기법과 구조 인덱스를 이용하여 XML 문서를 인덱싱하면 질의상의 단말 태그의 엘리먼트만을 읽어도 분기 질의를 처리할 수 있다. 이를 이용하여, 본 논문에서는 경로 정보 축약 레이블링 기법과 구조 인덱스를 이용한 분기 질의 처리 기법을 제안한다. 제안된 알고리즘은 디스크 입출력을 줄일 수 있으며 불필요한 중간 결과도 생성하지 않는다.

  • PDF

Applying the Schema Matching Method to XML Semantic Model of Steelbox-bridge's Structural Calculation Reports (강박스교 구조계산서 XML 시맨틱 모델의 스키마 매칭 기법 적용)

  • Yang Yeong-Ae;Kim Bong-Geun;Lee Sang-Ho
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2005.04a
    • /
    • pp.680-687
    • /
    • 2005
  • This study presents a schema matching technique which can be applied to XML semantic model of structural calculation reports of steel-box bridges. The semantic model of structural calculation documents was developed by extracting the optimized common elements from the analyses of various existing structural calculation documents, and the standardized semantic model was schematized by using XML Schema. In addition, the similarity measure technique and the relaxation labeling technique were employed to develop the schema matching algorithm. The former takes into account the element categories and their features, and the latter considers the structural constraints in the semantic model. The standardized XML semantic model of steel-box bridge's structural calculation documents called target schema was compared with existing nonstandardized structural calculation documents called primitive schema by the developed schema matching algorithm Some application examples show the importance of the development of standardized target schema for structural calculation documents and the effectiveness and efficiency of schema matching technique in the examination of the degree of document standardization in structural calculation reports.

  • PDF

Analysis of Access Authorization Conflict for Partial Information Hiding of RDF Web Document (RDF 웹 문서의 부분적인 정보 은닉과 관련한 접근 권한 충돌 문제의 분석)

  • Kim, Jae-Hoon;Park, Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.49-63
    • /
    • 2008
  • RDF is the base ontology model which is used in Semantic Web defined by W3C. OWL expands the RDF base model by providing various vocabularies for defining much more ontology relationships. Recently Jain and Farkas have suggested an RDF access control model based on RDF triple. Their research point is to introduce an authorization conflict problem by RDF inference which must be considered in RDF ontology data. Due to the problem, we cannot adopt XML access control model for RDF, although RDF is represented by XML. However, Jain and Farkas did not define the authorization propagation over the RDF upper/lower ontology concepts when an RDF authorization is specified. The reason why the authorization specification should be defined clearly is that finally, the authorizatin conflict is the problem between the authorization propagation in specifying an authorization and the authorization propagation in inferencing authorizations. In this article, first we define an RDF access authorization specification based on RDF triple in detail. Next, based on the definition, we analyze the authoriztion conflict problem by RDF inference in detail. Next, we briefly introduce a method which can quickly find an authorization conflict by using graph labeling techniques. This method is especially related with the subsumption relationship based inference. Finally, we present a comparison analysis with Jain and Farkas' study, and some experimental results showing the efficiency of the suggested conflict detection method.