Results 61 to 70 of about 16,602 (259)

MSmart: Smart Contract Vulnerability Analysis and Improved Strategies Based on Smartcheck

open access: yesApplied Sciences, 2023
As is well known, smart contracts on the blockchain store plenty of digital assets, and these contracts deployed on the blockchain are difficult to be modified.
Jiajia Fei, Xiaohan Chen, Xiangfu Zhao
doaj   +1 more source

Intelligent Self-Repairable Web Wrappers [PDF]

open access: yes, 2011
The amount of information available on the Web grows at an incredible high rate. Systems and procedures devised to extract these data from Web sources already exist, and different approaches and techniques have been investigated during the last years. On
A. Laender   +11 more
core   +2 more sources

Semantic characterizations of navigational XPath [PDF]

open access: yesACM SIGMOD Record, 2005
We give semantic characterizations of the expressive power of navigational XPath (a.k.a. Core XPath) in terms of first order logic. XPath can be used to specify sets of nodes and sets of paths in an XML document tree. We consider both uses. For sets of nodes, XPath is equally expressive as first order logic in two variables.
Marx, M.J., de Rijke, M.
openaire   +4 more sources

Containment for Conditional Tree Patterns [PDF]

open access: yesLogical Methods in Computer Science, 2015
A Conditional Tree Pattern (CTP) expands an XML tree pattern with labels attached to the descendant edges. These labels can be XML element names or Boolean CTPs.
Alessandro Facchini   +3 more
doaj   +1 more source

Classification of index partitions to boost XML query performance [PDF]

open access: yes, 2010
XML query optimization continues to occupy considerable research effort due to the increasing usage of XML data. Despite many innovations over recent years, XML databases struggle to compete with more traditional database systems. Rather than using node
Marks, Gerard, Roantree, Mark
core   +1 more source

Deciding XPath containment with MSO [PDF]

open access: yesData & Knowledge Engineering, 2007
XPath is the standard language for addressing parts of an XML document. We present a sound and complete decision procedure for containment of XPath queries. The considered XPath fragment covers most of the language features used in practice. Specifically, we show how XPath queries can be translated into equivalent formulas in monadic second-order logic.
Genevès, Pierre, Layaïda, Nabil
openaire   +2 more sources

Type-Based Detection of XML Query-Update Independence [PDF]

open access: yes, 2012
This paper presents a novel static analysis technique to detect XML query-update independence, in the presence of a schema. Rather than types, our system infers chains of types.
Bidoit-Tollu, Nicole   +2 more
core   +5 more sources

Design and Implementation of a Hardware Versatile Publish-Subscribe Architecture for the Internet of Things

open access: yesIEEE Access, 2018
A variety of contemporary technologies are being framed within the Internet of Things (IoT) architecture, including publish/subscribe (pub/sub) systems.
Fadi T. El-Hassan, Dan Ionescu
doaj   +1 more source

Efficient XPath Evaluation

open access: green, 2005
Inspired by the best querying performance of ViST among the rest of the approaches in the literature, and meanwhile to overcome its shortcomings, in this paper, we present another efficient and novel geometric sequence mechanism, which transforms XML documents and XPath queries into the corresponding geometric data/query sequences. XML querying is thus
Bing Wang, Ling Feng, Yun Shen
openalex   +4 more sources

Rewriting XPath queries using materialized XPath views

open access: yesJournal of Computer and System Sciences, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +2 more sources

Home - About - Disclaimer - Privacy