View-Based Tree-Language Rewritings
|
|
- Frederica Brooks
- 5 years ago
- Views:
Transcription
1 View-Baed Tree-Language Rewriting Lak Lakhmanan, Alex Thomo Univerity of Britih Columbia, Canada Univerity of Vitoria, Canada
2 Importane of tree XML Semi-trutured textual format are very popular. <movie> <title>houe of ard</title> <year>2013</year> <harater> <name>frani</name> <ator>kevin Spaey</ator> </harater> <harater> <name>claire</name> <ator>robin Wright</ator> </harater> </movie> XML (Multi TB) ue torie: 1. Elevier Paper and book 2. JPMorgan Chae & Co Stok reearh data 3. JetBlue Airway Doument management Soure: MarkLogi XML Impating the Enterprie Tapping into the Power of XML: Five Sue Storie
3 Importane of tree JSON Semi-trutured textual format are very popular. "movie": { "title": "Houe of ard", "year": "2013", "harater": [ { "name": "Frani", "ator": "Kevin Spaey" }, { "name": "Claire", "ator": "Robin Wright" } ] } JSON (Multi TB) ue torie: 1. CouhDB 2. MongoDB 3. Jaql and Hive JSON SerDe for Hadoop Mantra: Log firt, ak quetion later
4 Tree viually movie title year harater harater Houe of Card 2013 name ator name ator Frani Kevin Spaey Claire Robin Wright
5 Another example
6 Importane of view (example) Big databae of movie in a uper-tree, eah movie being a ub-tree Query ak for all the movie ub-tree with a MAC. mall minority; number about 50. Reult materialized into a view. Tremendou help in anwering new querie, e.g. find ator playing a MAC. Rewrite into: find ator playing a MAC in a movie having a MAC anwer it on the materialized view.
7 Regular Expreion and Automata Return all movie ator _* m _* aˆ A pattern Automaton 0 0 m ˆ 2 a 3
8 Revere Return all movie ator _* m _* aˆ A pattern Automaton a ˆ a a m m m m
9 Bottom-up Tree Automata Return all movie ator _* m _* aˆ Automaton * * * * a * * a ˆ a * m * m m m A pattern
10 Run
11 Bottom-up Tree Automata (II) Return all movie ator of MAC _* m _* MAC aˆ Automaton aˆ a aa * * ˆ * * * * aˆ * aˆ m * m m m a a A pattern
12 Bottom-up Tree Automata (IV) Return all movie having ome MAC _* mˆ _* MAC a Automaton * a * * * a * * a a * ˆ m * m m m A pattern
13 Run
14 Bottom-up Tree Automata (V) Regular tree language (RTA) the et of tree reognized by TA. loed under interetion and omplement Determiniti TA For any tree t, there an be at mot one aepting run of A on t. Power-wie, TA = DTA. Complement obtained from determiniti TA Interetion via a peial ontrution preerve determinim.
15 Querie Querie are regular et of tree over ˆ Containment Lemma Q Q Q 1 Q2 implie an 1 an 2
16 Star Operation
17 Filled Star Operation
18 Tranformation for avoiding marker overlap
19 Rewriting, and two et Maximally ontained rewriting: The bad et: The promiing et: Propoition.
20 Example with hain
21 Example with hain (II)
22 Invere of the tar operation Propoition. Compute where J and J are RTQ
23 Colored Alphabet Marker will be olor Blue for J Red for J
24 Colored Language et of all tree having one node blue et of all tree having one node red et of all tree having one node blue and another red a deendant of the blue node et of all tree having all node blak, exept root whih i red et of all tree having all node blak, exept for the root whih i blue and another node whih i red.
25 Colored Language (II)
26 Colored Language (III) over ame a p, but with blue node turned blak ame a p, but with red node turned blak over
27 Colored Language (IV) automaton for Similarly:
28 Rewriting Algorithm Compute: Theorem.
29 Rewriting Algorithm (II)
30 Complexity Propoition. polynomial time. an be omputed in Theorem. The MCR of Q uing V an be omputed in exponential time. Theorem. Computing the MCR of Q uing V i EXPTIME-hard.
31 Final Note Query automata formalim ued i equivalent in power to MSO (golden tandard) For peifying node-eleting querie. Color orrepond to Boolean marking J. Niehren, L. Planque, J.-M. Talbot, and S. Tion. N-ary querie by tree automata. DBPL, 2005 XPath rewriting i NP-hard. XPath i a ubla of our formalim. Our automata-baed algorithm an be ued a well for rewriting XPath querie.
32 K-ary querie Example: Find the 2-foret of ator tree pair for ator who have played the ame harater together in ome movie. Automaton * aˆ aˆ * * * * * * aˆ m * aˆ m m m A pattern
33 Run
34 Why i rewriting K-ary querie hallenging It ha been hown that k-ary querie an be enoded by unary querie T. Shwentik. On diving in tree. In MFCS, Done by going through MSO formula. Going from a k-ary query to an MSO enoding and then bak to automata inur non elementary omplexity. Therefore we need a another algorithm for rewriting k-ary querie that doen t go via MSO formula
35 Conluion Charaterized view-baed rewriting a olving a lang. equation Defined appropriate tree operator Defined olored language Gave automata ontrution Computed rewriting a a erie of operation on automata Charaterized the omplexity of omputing rewriting Tight lower bound provided Extended the reult to k-ary querie Common in XQuery
36 Thank You
Minimum congestion spanning trees in bipartite and random graphs
Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu
More informationQ1:Choose the correct answer:
Q:Chooe the orret anwer:. Purpoe of an OS i a. Create abtration b. Multiple proee ompete for ue of proeor. Coordination. Sheduler deide a. whih proee get to ue the proeor b. when proee get to ue the proeor.
More informationXML Data Streams. XML Stream Processing. XML Stream Processing. Yanlei Diao. University of Massachusetts Amherst
XML Stream Proessing Yanlei Diao University of Massahusetts Amherst XML Data Streams XML is the wire format for data exhanged online. Purhase orders http://www.oasis-open.org/ommittees/t_home.php?wg_abbrev=ubl
More informationInverse Kinematics 1 1/29/2018
Invere Kinemati 1 Invere Kinemati 2 given the poe of the end effetor, find the joint variable that produe the end effetor poe for a -joint robot, given find 1 o R T 3 2 1,,,,, q q q q q q RPP + Spherial
More informationSelect Operation (σ) It selects tuples that satisfy the given predicate from a relation (choose rows). Review : RELATIONAL ALGEBRA
Review : RELATIONAL ALGEBRA Relational databae ytem are expected to be equipped with a query language that can ait it uer to query the databae intance. There are two kind of query language relational algebra
More informationLogic as a Query Language: from Frege to XML. Victor Vianu U.C. San Diego
Logic as a Query Language: from Frege to XML Victor Vianu U.C. San Diego Logic and Databases: a success story FO lies at the core of modern database systems Relational query languages are based on FO:
More informationKINEMATIC ANALYSIS OF VARIOUS ROBOT CONFIGURATIONS
International Reearh Journal of Engineering and Tehnology (IRJET) e-in: 39-6 Volume: 4 Iue: May -7 www.irjet.net p-in: 39-7 KINEMATI ANALYI OF VARIOU ROBOT ONFIGURATION Game R. U., Davkhare A. A., Pakhale..
More informationMacrohomogenous Li-Ion-Battery Modeling - Strengths and Limitations
Marohomogenou Li-Ion-Battery Modeling - Strength and Limitation Marku Lindner Chritian Wieer Adam Opel AG Sope Purpoe of the reearh: undertand and quantify impat of implifiation in marohomogeneou model
More informationThe Crank-Nicholson method for a nonlinear diffusion equation
> retart; with(plot): with(linearalgebra): with(arraytool): The Crank-Nicholon method for a nonlinear diffuion equation The purpoe of thi workheet i to olve a diffuion equation involving nonlinearitie
More information1. Introduction. Abstract
Automati Ontology Derivation Uing Clutering for Image Claifiation 1 Latifur Khan and Lei Wang Department of Computer Siene Univerity of Texa at Dalla, TX 75083-0688 Email: [lkhan, leiwang]@utdalla.edu
More information1 The secretary problem
Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.
More informationCalculations for multiple mixers are based on a formalism that uses sideband information and LO frequencies: ( ) sb
Setting frequeny parameter in the WASP databae A. Harri 24 Aug 2003 Calulation for multiple mixer are baed on a formalim that ue ideband information and LO frequenie: b b := ign f ig f LO f IF := f ig
More informationProcessing Regular Path Queries Using Views or What Do We Need for Integrating Semistructured Data?
Processing Regular Path Queries Using Views or What Do We Need for Integrating Semistructured Data? Diego Calvanese University of Rome La Sapienza joint work with G. De Giacomo, M. Lenzerini, M.Y. Vardi
More informationShortest Paths in Directed Graphs
Shortet Path in Direted Graph Jonathan Turner January, 0 Thi note i adapted from Data Struture and Network Algorithm y Tarjan. Let G = (V, E) e a direted graph and let length e a real-valued funtion on
More informationXPath with transitive closure
XPath with transitive closure Logic and Databases Feb 2006 1 XPath with transitive closure Logic and Databases Feb 2006 2 Navigating XML trees XPath with transitive closure Newton Institute: Logic and
More informationExercises Computational Complexity
Exercises Computational Complexity March 22, 2017 Exercises marked with a are more difficult. 1 Chapter 7, P and NP Exercise 1. Suppose some pancakes are stacked on a surface such that no two pancakes
More informationXML and Databases. Lecture 9 Properties of XPath. Sebastian Maneth NICTA and UNSW
XML and Databases Lecture 9 Properties of XPath Sebastian Maneth NICTA and UNSW CSE@UNSW -- Semester 1, 2009 Outline 1. XPath Equivalence 2. No Looking Back: How to Remove Backward Axes 3. Containment
More informationKaren L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract
Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial
More informationXML Research for Formal Language Theorists
XML Research for Formal Language Theorists Wim Martens TU Dortmund Wim Martens (TU Dortmund) XML for Formal Language Theorists May 14, 2008 1 / 65 Goal of this talk XML Research vs Formal Languages Wim
More informationTowards Schema-Guided XML Query Induction
Towards Schema-Guided XML Query Induction Jérôme Champavère Rémi Gilleron Aurélien Lemay Joachim Niehren Université de Lille INRIA, France ICML-2007 Workshop on Challenges and Applications of Grammar Induction
More informationHOMEWORK #3 BME 473 ~ Applied Biomechanics Due during Week #10
HOMEWORK #3 BME 473 ~ Applied Biomechanic Due during Week #1 1. We dicued different angle et convention in cla. One common convention i a Bod-fied X-Y-Z rotation equence. With thi convention, the B frame
More informationTouring a Sequence of Polygons
Touring a Sequence of Polygon Mohe Dror (1) Alon Efrat (1) Anna Lubiw (2) Joe Mitchell (3) (1) Univerity of Arizona (2) Univerity of Waterloo (3) Stony Brook Univerity Problem: Given a equence of k polygon
More informationTopics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X
Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term
More informationTouring a Sequence of Polygons
Touring a Sequence of Polygon Mohe Dror (1) Alon Efrat (1) Anna Lubiw (2) Joe Mitchell (3) (1) Univerity of Arizona (2) Univerity of Waterloo (3) Stony Brook Univerity Problem: Given a equence of k polygon
More informationA SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS
A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt
More informationMore on Polynomial Time and Space
CpSc 8390 Goddard Fall15 More on Polynomial Time and Space 20.1 The Original NP-Completeness Proof A configuration/snapshot of a machine is a representation of its current state (what info would be needed
More informationGeneric Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline
Generic Travere CS 62, Lecture 9 Jared Saia Univerity of New Mexico Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v) from the bag if (v i unmarked) mark v; parent(v) = p;
More informationUsing Bayesian Networks for Cleansing Trauma Data
Uing Bayeian Network for Cleaning Trauma Data Prahant J. Dohi pdohi@.ui.edu Dept. of Computer Siene Univ of Illinoi, Chiago, IL 60607 Lloyd G. Greenwald lgreenwa@.drexel.edu Dept. of Computer Siene Drexel
More informationCombined Radix-10 and Radix-16 Division Unit
Combined adix- and adix-6 Diviion Unit Tomá ang and Alberto Nannarelli Dept. of Eletrial Engineering and Computer Siene, Univerity of California, Irvine, USA Dept. of Informati & Math. Modelling, Tehnial
More informationAdvanced Encryption Standard and Modes of Operation
Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES
More informationRepresentations and Transformations. Objectives
Repreentation and Tranformation Objective Derive homogeneou coordinate tranformation matrice Introduce tandard tranformation - Rotation - Tranlation - Scaling - Shear Scalar, Point, Vector Three baic element
More informationPolygon Side Lengths NAME DATE TIME
Home Link 5- Polygon Side Length Find any miing coordinate. Plot and label the point on the coordinate grid. Draw the polygon by connecting the point. y a. Rectangle ABCD A: (, ) B: (-, ) The length of
More informationDescription of Traffic in ATM Networks by the First Erlang Formula
5th International Conferene on Information Tehnology and Appliation (ICITA 8) Deription of Traffi in ATM Network by the Firt Erlang Formula Erik Chromý, Matej Kavaký and Ivan Baroňák Abtrat In the paper
More informationISSN (Online), Volume 1, Special Issue 2(ICITET 15), March 2015 International Journal of Innovative Trends and Emerging Technologies
International Journal of Innovative Trend and Emerging Tehnologie ROBUST SCAN TECHNIQUE FOR SECURED AES AGAINST DIFFERENTIAL CRYPTANALYSIS BASED SIDE CHANNEL ATTACK A.TAMILARASAN 1, MR.A.ANBARASAN 2 1
More informationShortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights
Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two
More informationAn Intro to LP and the Simplex Algorithm. Primal Simplex
An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n
More information1.3 Functions and Equivalence Relations 1.4 Languages
CSC4510 AUTOMATA 1.3 Functions and Equivalence Relations 1.4 Languages Functions and Equivalence Relations f : A B means that f is a function from A to B To each element of A, one element of B is assigned
More informationDAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications
DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu
More informationEdits in Xylia Validity Preserving Editing of XML Documents
dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,
More informationMidterm 2 March 10, 2014 Name: NetID: # Total Score
CS 3 : Algorithm and Model of Computation, Spring 0 Midterm March 0, 0 Name: NetID: # 3 Total Score Max 0 0 0 0 Grader Don t panic! Pleae print your name and your NetID in the boxe above. Thi i a cloed-book,
More informationToday s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is
Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -
More informationCOMP9319 Web Data Compression & Search. Cloud and data optimization XPath containment Distributed path expression processing
COMP9319 Web Data Compression & Search Cloud and data optimization XPath containment Distributed path expression processing DATA OPTIMIZATION ON CLOUD Cloud Virtualization Cloud layers Cloud computing
More informationRepair of XML documents
Repair of XML documents (w.r.t. given T) Robert Surówka 1 Outline of the problem onvert given xml such that it will be valid w.r.t to given T? Should the conversion have some other features? Should it
More informationAN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM
RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt
More informationA note on degenerate and spectrally degenerate graphs
A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove
More informationInfinite transducers on terms denoting graphs
Infinite transducers on terms denoting graphs Irène Durand and Bruno Courcelle LaBRI, Université de Bordeaux June, 2013 European Lisp Symposium, ELS2013 2/30 Objectives What : Compute information about
More informationCourse Updates. Reminders: 1) Assignment #13 due Monday. 2) Mirrors & Lenses. 3) Review for Final: Wednesday, May 5th
Coure Update http://www.phy.hawaii.edu/~varner/phys272-spr0/phyic272.html Reminder: ) Aignment #3 due Monday 2) Mirror & Lene 3) Review for Final: Wedneday, May 5th h R- R θ θ -R h Spherical Mirror Infinite
More informationDatum Transformations of NAV420 Reference Frames
NA4CA Appliation Note Datum ranformation of NA4 Referene Frame Giri Baleri, Sr. Appliation Engineer Crobow ehnology, In. http://www.xbow.om hi appliation note explain how to onvert variou referene frame
More informationAVL Tree. The height of the BST be as small as possible
1 AVL Tree re and Algorithm The height of the BST be a mall a poible The firt balanced BST. Alo called height-balanced tree. Introduced by Adel on-vel kii and Landi in 1962. BST with the following condition:
More informationModeling of underwater vehicle s dynamics
Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation
More informationCounting multiplicity over infinite alphabets
Counting multiplicity over infinite alphabets Amal Dev Manuel and R. Ramanujam The Institute of Mathematical Sciences, Chennai, India {amal,jam}@imsc.res.in Summary Motivation for infinite data. We need
More informationNP-Completeness. Algorithms
NP-Completeness Algorithms The NP-Completeness Theory Objective: Identify a class of problems that are hard to solve. Exponential time is hard. Polynomial time is easy. Why: Do not try to find efficient
More informationRegular Expressions for Data Words
Regular Expressions for Data Words Leonid Libkin and Domagoj Vrgoč School of Informatics, University of Edinburgh Abstract. In data words, each position carries not only a letter form a finite alphabet,
More informationGraph algorithms based on infinite automata: logical descriptions and usable constructions
Graph algorithms based on infinite automata: logical descriptions and usable constructions Bruno Courcelle (joint work with Irène Durand) Bordeaux-1 University, LaBRI (CNRS laboratory) 1 Overview Algorithmic
More informationMonadic Datalog Containment on Trees
Monadic Datalog Containment on Trees André Frochaux 1, Martin Grohe 2, and Nicole Schweikardt 1 1 Goethe-Universität Frankfurt am Main, {afrochaux,schweika}@informatik.uni-frankfurt.de 2 RWTH Aachen University,
More informationNew Rewritings and Optimizations for Regular Path Queries
New Rewritings and Optimizations for Regular Path Queries Gösta Grahne and Alex Thomo Concordia University, Montreal, Canada {grahne, thomo}@cs.concordia.ca Abstract. All the languages for querying semistructured
More informationKS3 Maths Assessment Objectives
KS3 Math Aement Objective Tranition Stage 9 Ratio & Proportion Probabilit y & Statitic Appreciate the infinite nature of the et of integer, real and rational number Can interpret fraction and percentage
More informationIncorporating Speculative Execution into Scheduling of Control-flow Intensive Behavioral Descriptions
Inorporating Speulative Exeution into Sheduling of Control-flow Intenive Behavioral Deription Ganeh Lakhminarayana, Anand Raghunathan, and Niraj K. Jha Dept. of Eletrial Engineering C&C Reearh Laboratorie
More informationPruning Game Tree by Rollouts
Pruning Game Tree by Rollout Bojun Huang Mirooft Reearh bojhuang@mirooft.om Abtrat In thi paper we how that the α-β algorithm and it ueor MT-SSS*, a two lai minimax earh algorithm, an be implemented a
More informationWeb Science and additionality
Admin tuff... Lecture 1: EITN01 Web Intelligence and Information Retrieval Meage, lide, handout, lab manual and link: http://www.eit.lth.e/coure/eitn01 Contact: Ander Ardö, Ander.Ardo@eit.lth.e, room:
More informationIntroduction to Database Systems CSE 414
Introduction to Database Systems CSE 414 Lecture 14-15: XML CSE 414 - Spring 2013 1 Announcements Homework 4 solution will be posted tomorrow Midterm: Monday in class Open books, no notes beyond one hand-written
More informationLecture 14: Minimum Spanning Tree I
COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce
More information1 The Knuth-Morris-Pratt Algorithm
5-45/65: Design & Analysis of Algorithms September 26, 26 Leture #9: String Mathing last hanged: September 26, 27 There s an entire field dediated to solving problems on strings. The book Algorithms on
More informationAnnouncements. CSE332: Data Abstractions Lecture 19: Parallel Prefix and Sorting. The prefix-sum problem. Outline. Parallel prefix-sum
Announcement Homework 6 due Friday Feb 25 th at the BEGINNING o lecture CSE332: Data Abtraction Lecture 19: Parallel Preix and Sorting Project 3 the lat programming project! Verion 1 & 2 - Tue March 1,
More informationOperational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz
Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,
More informationDefinitions Homework. Quine McCluskey Optimal solutions are possible for some large functions Espresso heuristic. Definitions Homework
EECS 33 There be Dragons here http://ziyang.ees.northwestern.edu/ees33/ Teaher: Offie: Email: Phone: L477 Teh dikrp@northwestern.edu 847 467 2298 Today s material might at first appear diffiult Perhaps
More informationAn Improved Implementation of Elliptic Curve Digital Signature by Using Sparse Elements
The International Arab Journal of Information Technology, Vol. 1, No., July 004 0 An Improved Implementation of Elliptic Curve Digital Signature by Uing Spare Element Eam Al-Daoud Computer Science Department,
More informationComparison of XPath Containment Algorithms
Comparison of XPath Containment Algorithms Jorge Guerra 1, Luis Useche 1, Miguel Rivero 1, Imtiaz Syed 1, Hussein Orelus 1, Malek Adjouadi 1, Armando Barreto 1, Bradley Stoute 2, Scott Graham 1, Naphtali
More information1 Introduction... 1 1.1 A Database Example... 1 1.2 An Example from Complexity Theory...................... 4 1.3 An Example from Formal Language Theory................. 6 1.4 An Overview of the Book.................................
More informationView-based query processing: On the relationship between rewriting, answering and losslessness
Theoretical Computer Science 371 (2007) 169 182 www.elsevier.com/locate/tcs View-based query processing: On the relationship between rewriting, answering and losslessness Diego Calvanese a,, Giuseppe De
More informationJ. Carme, R. Gilleron, A. Lemay, J. Niehren. INRIA FUTURS, University of Lille 3
Interactive Learning o Node Selection Queries in Web Documents J. Carme, R. Gilleron, A. Lemay, J. Niehren INRIA FUTURS, University o Lille 3 Web Inormation Extraction Data organisation is : adapted to
More informationApplications of Tree Automata Theory Lecture I: Tree Automata
Applications of Tree Automata Theory Lecture I: Tree Automata Andreas Maletti Institute of Computer Science Universität Leipzig, Germany on leave from: Institute for Natural Language Processing Universität
More informationWhere have all the cars gone? A model for determining traffic flow throughout a road network
A model for determining traffic flow throughout a road network Harvey Mudd College Presentation Days 7 May 2008 Traffic monitoring Important Equations Lots of Traffic + Small Roads = Congestion Congestion
More informationXPath evaluation in linear time with polynomial combined complexity
XPath evaluation in linear time with polynomial combined complexity Paweł Parys (Common work with Mikołaj Bojańczyk) XPath is a query language: XPath queries select nodes in a XML document tree. We consider
More informationEnhanced Regular Path Queries on Semistructured Databases
Enhanced Regular Path Queries on Semistructured Databases Dan Stefanescu 1 and Alex Thomo 2 1 Suffolk University, Boston, USA, dan@mcs.suffolk.edu 2 University of Victoria, Victoria, Canada, thomo@cs.uvic.ca
More informationMAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc
MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic
More informationInterface Tracking in Eulerian and MMALE Calculations
Interface Tracking in Eulerian and MMALE Calculation Gabi Luttwak Rafael P.O.Box 2250, Haifa 31021,Irael Interface Tracking in Eulerian and MMALE Calculation 3D Volume of Fluid (VOF) baed recontruction
More informationSchema-Guided Query Induction
Schema-Guided Query Induction Jérôme Champavère Ph.D. Defense September 10, 2010 Supervisors: Joachim Niehren and Rémi Gilleron Advisor: Aurélien Lemay Introduction Big Picture XML: Standard language for
More informationTrees, Automata and XML
A Mini Course on Trees, Automata and XML Paris June 2004 Thomas Schwentick PODS 2004 Thomas Schwentick Trees, Automata & XML 1 Intro Three Questions Question 1 Why XML? Answer Have a look into the 20 XML
More information8 : Learning Fully Observed Undirected Graphical Models
10-708: Probabilisti Graphial Models 10-708, Spring 2018 8 : Learning Fully Observed Undireted Graphial Models Leturer: Kayhan Batmanghelih Sribes: Chenghui Zhou, Cheng Ran (Harvey) Zhang When learning
More informationSimple strategy Computes shortest paths from the start note
Leture Notes for I500 Fall 2009 Fundamental Computer Conepts of Informatis by Xiaoqian Zhang (Instrutor: Predrag Radivoja) Last time: dynami programming Today: Elementary graph algorithm (textbook Chapter
More informationDeterministic automata for extended regular expressions
Open Comput. Sci. 2017; 7:24 28 Research Article Mirzakhmet Syzdykov* Deterministic automata for extended regular expressions https://doi.org/10.1515/comp-2017-0004 Received Nov 18, 2016; accepted Oct
More informationAutomata Theory for Reasoning about Actions
Automata Theory for Reasoning about Actions Eugenia Ternovskaia Department of Computer Science, University of Toronto Toronto, ON, Canada, M5S 3G4 eugenia@cs.toronto.edu Abstract In this paper, we show
More informationAutomata for XML A survey
Journal of Computer and System Sciences 73 (2007) 289 315 www.elsevier.com/locate/jcss Automata for XML A survey Thomas Schwentick University of Dortmund, Department of Computer Science, 44221 Dortmund,
More informationCORRECTNESS ISSUES AND LOOP INVARIANTS
The next everal lecture 2 Study algorithm for earching and orting array. Invetigate their complexity how much time and pace they take Formalize the notion of average-cae and wort-cae complexity CORRECTNESS
More informationRouting Definition 4.1
4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing
More informationInterconnection Styles
Interonnetion tyles oftware Design Following the Export (erver) tyle 2 M1 M4 M5 4 M3 M6 1 3 oftware Design Following the Export (Client) tyle e 2 e M1 M4 M5 4 M3 M6 1 e 3 oftware Design Following the Export
More informationDelaunay Triangulation: Incremental Construction
Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )
More informationSemantic Characterizations of XPath
Semantic Characterizations of XPath Maarten Marx Informatics Institute, University of Amsterdam, The Netherlands CWI, April, 2004 1 Overview Navigational XPath is a language to specify sets and paths in
More informationUniversität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.
Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut
More informationContents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course:
Content Shortet path Algorithm and Network 21/211 The hortet path problem: Statement Verion Application Algorithm (for ingle ource p problem) Reminder: relaxation, Dijktra, Variant of Dijktra, Bellman-Ford,
More informationDrawing Lines in 2 Dimensions
Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional
More informationRewriting Ontology-Mediated Queries. Carsten Lutz University of Bremen
Rewriting Ontology-Mediated Queries Carsten Lutz University of Bremen Data Access and Ontologies Today, data is often highly incomplete and very heterogeneous Examples include web data and large-scale
More informationxy-monotone path existence queries in a rectilinear environment
CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of
More informationBrief Announcement: Distributed 3/2-Approximation of the Diameter
Brief Announcement: Ditributed /2-Approximation of the Diameter Preliminary verion of a brief announcement to appear at DISC 14 Stephan Holzer MIT holzer@mit.edu David Peleg Weizmann Intitute david.peleg@weizmann.ac.il
More informationData Formats and APIs
Data Formats and APIs Mike Carey mjcarey@ics.uci.edu 0 Announcements Keep watching the course wiki page (especially its attachments): https://grape.ics.uci.edu/wiki/asterix/wiki/stats170ab-2018 Ditto for
More informationCS 598CSC: Approximation Algorithms Lecture date: March 2, 2011 Instructor: Chandra Chekuri
CS 598CSC: Approximation Algorithms Lecture date: March, 011 Instructor: Chandra Chekuri Scribe: CC Local search is a powerful and widely used heuristic method (with various extensions). In this lecture
More information( ) ( ) Completing the Square. Alg 3 1 Rational Roots Solving Polynomial Equations. A Perfect Square Trinomials
Alg Completing the Square A Perfect Square Trinomials (± ) ± (± ) ± 4 4 (± ) ± 6 9 (± 4) ± 8 6 (± 5) ± 5 What is the relationship between the red term and the blue term? B. Creating perfect squares.. 6
More informationPerformance Evaluation of an Advanced Local Search Evolutionary Algorithm
Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation
More informationQuadrilaterals. Learning Objectives. Pre-Activity
Section 3.4 Pre-Activity Preparation Quadrilateral Intereting geometric hape and pattern are all around u when we tart looking for them. Examine a row of fencing or the tiling deign at the wimming pool.
More information