已为您找到该学者21条结果 成果回收站
【期刊论文】Efficiently Mapping Integrity Constraints from Relational Database to XML Document1
于戈, Xiaochun Yang, Ge Yu, and Guoren Wang
ADBIS 2001, LNCS 2151, pp. 338-351, 2001.,-0001,():
-1年11月30日
XML is rapidly emerging as the dominant standard for exchanging data on the WWW. Most of application data are stored in relational databases due to its popularity and rich development experiences over it. Therefore, how to provide a proper mapping approach from relational data to XML documents becomes an important topic. Integrity constraints are useful for semantic specification that plays the important roles in relation schema definition. The existing XML schema language does not define general constraints and maintaining method for integrity constraints. So how to use XML to express and maintain integrity constraints especially the advanced integrity constraints, e.g., general constraints of relational data is one of challenge research issues. In this paper, a novel mapping approach is proposed to map relation data to XML document with active nodes, XMLA, and extended DTD with constraints, DTDC. The ability to maintain integrity constraints makes our approach more effective than other approaches.
-
123浏览
-
0点赞
-
0收藏
-
0分享
-
293下载
-
0
-
引用
【期刊论文】An Efficient Iterative Optimization Algorithm for Image Thresholding
于戈, Liju Dong, and Ge Yu
CIS 2004, LNCS 3314, pp. 1079-1085, 2004.,-0001,():
-1年11月30日
Image thresholding is one of the main techniques for image segmentation. It has many applications in pattern recognition, computer vision, and image and video understanding. This paper formulates the thresholding as an optimization problem: finding the best thresholds that minimize a weighted sum-of-squared-error function. A fast iterative optimization algorithm is presented to reach this goal. Our algorithm is compared with a classic, most commonly-used thresholding approach. Both theoretic analysis and experiments show that the two approaches are equivalent. However, our formulation of the problem allows us to develop a much more efficient algorithm, which has more applications, especially in real-time video surveillance and tracking systems.
-
75浏览
-
0点赞
-
0收藏
-
0分享
-
234下载
-
0
-
引用
【期刊论文】A Non-Blocking Locking Method and Performance Evaluation on Network of Workstations
于戈, Yu Ge, WANG Guoren and ZHENG Huaiyuan
J. Comput. Sci. & Technol. 2001, 16 (1): 25~38,-0001,():
-1年11月30日
A network of workstation (NOW) can act as a single and scal-able powerful computer by building a parallel and distributed computing platform on top of it. WAKASHI is such a platform system that supports persistent object management and makes full use of resources of NOW for high performance transac-tion processing. 0ne of the main diffculties to overcome is the bottleneck caused by concurrency control mechanism. Therefore, a non-blocking locking method is designed, by adopting several novel techniques to make it outperform the other typi-cal locking methods such as 2PL: 1)an SDG(Semantic Dependency Graph)based non-blocking locking protocol for fast transaction scheduling; 2)a massively virtual memory based backup-page undo algorithm for fast restart; and 3)a multi processor and multi-thread based transaction manager for fast execution. The new mechanismshave been implemented in WAKASHI and the performance comparison experiments with 2PL and DWDL have been done. The results show that the new method can outperform 2PL and DWDL under certain conditions.This is meaningful for choos-ing effective concurrency control mechanisms for improving transaction-processing performance in NOW environments.
distributed and parallel database, concurrency control, transaction management, locking mechanism, NOW (, network of workstation),
-
73浏览
-
0点赞
-
0收藏
-
0分享
-
56下载
-
0
-
引用
【期刊论文】A New Path Expression Computing Approach for XML Data
于戈, Jianhua Lv, Guoren Wang, Jeffrey Xu Yu, Ge Yu, Hongjun Lu, and Bing Sun
EEXTT and DIWeb 2002, LNCS 2590, pp. 35-46, 2003.,-0001,():
-1年11月30日
Most query languages in XML database systems use Regular Path Expressions (RPE) to query or extract data from databases and some query processing and optimization techniques have been proposed for RPEs. Conceptually XML documents are collections of path instances. Each path instance should conform to an XML element tag sequence, called path schema. A RPE query can be written as an automaton that can represent a language, while path schemas can be seen as sentences. In this paper, a novel RPE computing approach, automaton match (AM), is proposed. AM queries the RPEs by matching the automatons with path schemas. The experimental results show AM is quite efficient for computing RPE queries.
-
61浏览
-
0点赞
-
0收藏
-
0分享
-
80下载
-
0
-
引用
【期刊论文】A Hybrid Machine Learning/Statistical Model of Grid Security
于戈, Guang Xiang, Ge Yu, Xiangli Qu, Xiaomei Dong, and Lina Wang
GCC 2004, LNCS 3251, pp. 348-355, 2004.,-0001,():
-1年11月30日
Most current Grid security techniques concentrate on traditional security aspects such as authentication, authorization, etc. While they have shown their usefulness, the significance of the information hidden in the historical data corpus denoting the user-Grid interactions has been largely neglected. In fact, such information provide great insight into Grid security and if properly harnessed, will help better protect the Grid against potential attacks. To utilize these hidden information in a service-oriented Grid environment, we propose a hybrid machine learning and statistical model. The machine learning component predicts the security of a service by considering the probability distribution of the past services, while the statistical component evaluates a service's security statistically based on its own past behaviors and users' opinions. We construct an overall architecture based on this hybrid model and demonstrate through examples its effectiveness and potential too er stronger security to the Grid.
-
46浏览
-
0点赞
-
0收藏
-
0分享
-
89下载
-
0
-
引用