您当前所在位置: 首页 > 学者
在线提示

恭喜!关注成功

在线提示

确认取消关注该学者?

邀请同行关闭

只需输入对方姓名和电子邮箱,就可以邀请你的同行加入中国科技论文在线。

真实姓名:

电子邮件:

尊敬的

我诚挚的邀请你加入中国科技论文在线,点击

链接,进入网站进行注册。

添加个性化留言

已为您找到该学者21条结果 成果回收站

上传时间

2005年10月31日

【期刊论文】Efficiently Mapping Integrity Constraints from Relational Database to XML Document1

于戈, Xiaochun Yang, Ge Yu, and Guoren Wang

ADBIS 2001, LNCS 2151, pp. 338-351, 2001.,-0001,():

-1年11月30日

摘要

XML is rapidly emerging as the dominant standard for exchanging data on the WWW. Most of application data are stored in relational databases due to its popularity and rich development experiences over it. Therefore, how to provide a proper mapping approach from relational data to XML documents becomes an important topic. Integrity constraints are useful for semantic specification that plays the important roles in relation schema definition. The existing XML schema language does not define general constraints and maintaining method for integrity constraints. So how to use XML to express and maintain integrity constraints especially the advanced integrity constraints, e.g., general constraints of relational data is one of challenge research issues. In this paper, a novel mapping approach is proposed to map relation data to XML document with active nodes, XMLA, and extended DTD with constraints, DTDC. The ability to maintain integrity constraints makes our approach more effective than other approaches.

上传时间

2005年10月31日

【期刊论文】An Efficient Iterative Optimization Algorithm for Image Thresholding

于戈, Liju Dong, and Ge Yu

CIS 2004, LNCS 3314, pp. 1079-1085, 2004.,-0001,():

-1年11月30日

摘要

Image thresholding is one of the main techniques for image segmentation. It has many applications in pattern recognition, computer vision, and image and video understanding. This paper formulates the thresholding as an optimization problem: finding the best thresholds that minimize a weighted sum-of-squared-error function. A fast iterative optimization algorithm is presented to reach this goal. Our algorithm is compared with a classic, most commonly-used thresholding approach. Both theoretic analysis and experiments show that the two approaches are equivalent. However, our formulation of the problem allows us to develop a much more efficient algorithm, which has more applications, especially in real-time video surveillance and tracking systems.

上传时间

2005年10月31日

【期刊论文】A Non-Blocking Locking Method and Performance Evaluation on Network of Workstations

于戈, Yu Ge, WANG Guoren and ZHENG Huaiyuan

J. Comput. Sci. & Technol. 2001, 16 (1): 25~38,-0001,():

-1年11月30日

摘要

A network of workstation (NOW) can act as a single and scal-able powerful computer by building a parallel and distributed computing platform on top of it. WAKASHI is such a platform system that supports persistent object management and makes full use of resources of NOW for high performance transac-tion processing. 0ne of the main diffculties to overcome is the bottleneck caused by concurrency control mechanism. Therefore, a non-blocking locking method is designed, by adopting several novel techniques to make it outperform the other typi-cal locking methods such as 2PL: 1)an SDG(Semantic Dependency Graph)based non-blocking locking protocol for fast transaction scheduling; 2)a massively virtual memory based backup-page undo algorithm for fast restart; and 3)a multi processor and multi-thread based transaction manager for fast execution. The new mechanismshave been implemented in WAKASHI and the performance comparison experiments with 2PL and DWDL have been done. The results show that the new method can outperform 2PL and DWDL under certain conditions.This is meaningful for choos-ing effective concurrency control mechanisms for improving transaction-processing performance in NOW environments.

distributed and parallel database, concurrency control, transaction management, locking mechanism, NOW (, network of workstation),

上传时间

2005年10月31日

【期刊论文】A New Path Expression Computing Approach for XML Data

于戈, Jianhua Lv, Guoren Wang, Jeffrey Xu Yu, Ge Yu, Hongjun Lu, and Bing Sun

EEXTT and DIWeb 2002, LNCS 2590, pp. 35-46, 2003.,-0001,():

-1年11月30日

摘要

Most query languages in XML database systems use Regular Path Expressions (RPE) to query or extract data from databases and some query processing and optimization techniques have been proposed for RPEs. Conceptually XML documents are collections of path instances. Each path instance should conform to an XML element tag sequence, called path schema. A RPE query can be written as an automaton that can represent a language, while path schemas can be seen as sentences. In this paper, a novel RPE computing approach, automaton match (AM), is proposed. AM queries the RPEs by matching the automatons with path schemas. The experimental results show AM is quite efficient for computing RPE queries.

上传时间

2005年10月31日

【期刊论文】A Hybrid Machine Learning/Statistical Model of Grid Security

于戈, Guang Xiang, Ge Yu, Xiangli Qu, Xiaomei Dong, and Lina Wang

GCC 2004, LNCS 3251, pp. 348-355, 2004.,-0001,():

-1年11月30日

摘要

Most current Grid security techniques concentrate on traditional security aspects such as authentication, authorization, etc. While they have shown their usefulness, the significance of the information hidden in the historical data corpus denoting the user-Grid interactions has been largely neglected. In fact, such information provide great insight into Grid security and if properly harnessed, will help better protect the Grid against potential attacks. To utilize these hidden information in a service-oriented Grid environment, we propose a hybrid machine learning and statistical model. The machine learning component predicts the security of a service by considering the probability distribution of the past services, while the statistical component evaluates a service's security statistically based on its own past behaviors and users' opinions. We construct an overall architecture based on this hybrid model and demonstrate through examples its effectiveness and potential too er stronger security to the Grid.

合作学者

  • 于戈 邀请

    东北大学,辽宁

    尚未开通主页