Results 21 to 30 of about 16,042 (210)
An Injection with Tree Awareness: Adding Staircase Join to PostgreSQL [PDF]
The syntactic wellformedness constraints of XML (opening and closing tags nest properly) imply that XML processors face the challenge to efficiently handle data that takes the shape of ordered, unranked trees.
Grust, Torsten +3 more
core +19 more sources
Pipelined XPath Query Based on Cost Optimization
XPath query is the key part of XML data processing, and its performance is usually critical for XML applications. In the process of XPath query, there is inherent seriality between query steps, which makes it difficult to parallelize the query ...
Rongxin Chen, Zongyue Wang, Yuling Hong
semanticscholar +1 more source
This survey gives an overview of formal results on the XML query language XPath. We identify several important fragments of XPath, focusing on subsets of XPath 1.0. We then give results on the expressiveness of XPath and its fragments compared to other formalisms for querying trees, algorithms, and complexity bounds for evaluation of XPath queries, as ...
Benedikt, M, Koch, C
openaire +2 more sources
Incremental XPath evaluation [PDF]
We study the problem of incrementally maintaining an XPath query on an XML database under updates. The updates we consider are node insertion, node deletion, and node relabeling. Our main results are that downward XPath queries can be incrementally maintained in time O(depth(D) · poly(Q)) and conjunctive forward XPath queries in time O(depth(D)· log ...
Bjorklund, Henrik +3 more
openaire +2 more sources
SCGformer: Smart contract vulnerability detection based on control flow graph and transformer
A novel vulnerability detection method based on transformer is proposed by constructing the control flow graph (CFG) of smart contracts operation codes (opcodes), which shields the difference of various versions of program language. Extensive experiments are conducted to evaluate the effectiveness of the proposed method on the authors' own collected ...
KeXin Gong +4 more
wiley +1 more source
Cross-domain DOM Pickup and Automation Scheme of RPA System Based on Browser Extension [PDF]
Robotic process automation(RPA) is one of today's research hotspots.The pickup and automation of web page elements is one of the important functions of RPA.RPA injects scripts into the web page to process web pages by using browser extensions,using web ...
YI Renke, CAI Yuhui, YANG Shenghong, WU Fan, LI Kenli
doaj +1 more source
The Broad Spectrum of TP53 Mutations in CLL: Evidence of Multiclonality and Novel Mutation Hotspots
TP53 aberrations are a major predictive factor of resistance to chemoimmunotherapy in chronic lymphocytic leukemia (CLL), and an assessment of them before each line of treatment is required for theranostic stratification. Acquisition of subclonal TP53 abnormalities underlies the evolution of CLL.
Grégory Lazarian +29 more
wiley +1 more source
XPath Node Selection over Grammar-Compressed Trees [PDF]
XML document markup is highly repetitive and therefore well compressible using grammar-based compression. Downward, navigational XPath can be executed over grammar-compressed trees in PTIME: the query is translated into an automaton which is executed in ...
Sebastian Maneth, Tom Sebastian
doaj +1 more source
A Smart Contract Vulnerability Detection Model Based on Syntactic and Semantic Fusion Learning
As a trusted decentralized application, smart contracts manage a large number of digital assets on the blockchain. Vulnerability detection of smart contracts is an important part of ensuring the security of digital assets. At present, many researchers extract features of smart contract source code for vulnerability detection based on deep learning ...
Daojun Han +4 more
wiley +1 more source
Crowdsourcing forensics: Creating a curated catalog of digital forensic artifacts
Abstract The increasing volume, variety, velocity, distribution, structural intricacy, and complexity of use of digital evidence can make it difficult for practitioners to find and understand the most forensically useful information (Casey E. Digital evidence and computer crime: Forensic science, computers, and the Internet. Academic Press; 2011. p. 31;
Eoghan Casey +3 more
wiley +1 more source

