Ajax is an important approach for improving rich interactivity between Web server and end users during Web 2.0 eras. At the same time, the structured data in AJAX Web pages can not be extracted easily due to its async...
详细信息
Ajax is an important approach for improving rich interactivity between Web server and end users during Web 2.0 eras. At the same time, the structured data in AJAX Web pages can not be extracted easily due to its asynchronous loading. In this paper, we propose a technique for extracting the structured data from the AJAX based Web pages. Firstly, an AjaxFetcher component is created to fetch the dynamic page content by using an embedded browser. Secondly, two different strategies are used to extract the structured data from the obtained page contents. Especially for the page that contains multi-records, an automatic approach to determine each possible record is proposed. Experimental results show that fetching Ajax pages and extracting the structured data from them is feasible.
Facing limitations of existing systems for process integrity measurement, we put forward a method with its prototype system PDIMS to measure process runtime integrity. Based on structure of process and format of execu...
详细信息
Facing limitations of existing systems for process integrity measurement, we put forward a method with its prototype system PDIMS to measure process runtime integrity. Based on structure of process and format of executable file, PDIMS anatomizes the codepage layout of runtime process. Combining OS mechanisms and modern CPU's support for code execution, PDIMS catches and measures code page in the kernel when it executes. PDIMS depends on CPU's non-executable bit to detect code execution and on the binary format of executables of the process as criterion to verify code modifications in kernel. PDIMS provides trustworthy information about whether a running process is modified. PDIMS introduces less than 4% overhead to OS.
Traditional Web database cache techniques have a major disadvantage, namely poor data freshness, because they employ an asynchronous data refresh strategy. A novel Web database cache, DB Facade, is proposed in this pa...
详细信息
Traditional Web database cache techniques have a major disadvantage, namely poor data freshness, because they employ an asynchronous data refresh strategy. A novel Web database cache, DB Facade, is proposed in this paper. DB Facade uses a main memory database to cache result sets of previous queries for subsequent reusing. Updates on backend database system are managed by delta tables, and then propagated to Web database cache in a near real-time manner, hence guarantee the freshness of data. DB Facade off loads query burden from backend database systems, and exploits the power of main memory database system to boost query performance. TPC-W testing result shows that the system's performance increases by about 17 percent.
Nowadays mainstream RDF Repository Systems are based on RDBMS. The SPARQL query engine translates a SPARQL query into a SQL one, and then the RDBMS executes the SQL query. However the RDBMS optimizers, which usually a...
详细信息
Nowadays mainstream RDF Repository Systems are based on RDBMS. The SPARQL query engine translates a SPARQL query into a SQL one, and then the RDBMS executes the SQL query. However the RDBMS optimizers, which usually assume that columns are statistically independent, often underestimate the selectivity of conjunctive predicates and choose a bad query execution plan. It is important for query optimizers to detect correlations among properties. We propose a way of computing property correlations based on ontology itself in order to improve the execution performance of the SQL translated from SPARQL statement queries.
Broadcasting/Multicasting problems have been well studied in wireless ad hoc networks. However, only a few approaches take into account the low interference and energy efficiency as the optimization objective simultan...
详细信息
ISBN:
(纸本)9781424451142
Broadcasting/Multicasting problems have been well studied in wireless ad hoc networks. However, only a few approaches take into account the low interference and energy efficiency as the optimization objective simultaneously. In this paper, we study the interference and power constrained broadcast/multicast and the delay-bounded interference and power constrained broadcast/multicast routing problems in wireless ad hoc networks using directional antennas. We propose an approximation and a heuristic algorithm for the two problems, respectively. Importantly, motivated by the study of above optimization problems, we propose approximation schemes for two multi-constrained directed Steiner tree problems, respectively. Broadcast/Multicast message by using the trees found by our algorithms tend to have less channel collisions and higher network throughput. The theoretical results are corroborated by simulation studies.
One of the major limitations of current search engines is that users could not quickly locate what they want if the input query is too general. Some existing techniques try to cluster web search results into groups so...
详细信息
One of the major limitations of current search engines is that users could not quickly locate what they want if the input query is too general. Some existing techniques try to cluster web search results into groups so as to user's quick browsing. In this paper, we present a new approach to categorize the web search results by using YAGO ontology. It utilizes the YAGO ontology to automatically generate categories for the user's specific query and classify the search results into appropriate categories. Our experimental results indicate that our method is feasible and effectiveness.
Ajax is an important approach for improving rich interactivity between web server and end users during Web 2.0 eras. At the same time, AJAX web pages can not be indexed by search engines due to its asynchronous loadin...
详细信息
What-if analysis is an important type of DSS analysis processing procedure. It analyzes hypothetical scenarios based on historical data. The data cube view must be updated when the what-if condition is changed. Since ...
详细信息
With our society more information-driven, we have begun to distribute data in wide-area storage systems. At the same time, both physical failure and logic error have made it difficult to bring the necessary recovery t...
详细信息
ISBN:
(纸本)9780769537474
With our society more information-driven, we have begun to distribute data in wide-area storage systems. At the same time, both physical failure and logic error have made it difficult to bring the necessary recovery to bear on remote data disaster, and understanding this proceeding. We describe ARRAY, a system architecture for data disaster recovery that combines reliability, storage space, and security to improve performance for data recovery applications. The paper presents an exhaustive analysis of the design space of ARRAY systems, focusing on the trade-offs between reliability, storage space, security, and performance that ARRAY must make. We present RSRAII (Replication-based Snapshot Redundant Array of Independent Imagefiles) which is a configurable RAIDlike data erasure-coding, and also others benefits come from consolidation both erasure-coding and replication strategies. A novel algorithm is proposed to improve snapshot performance referred to as SMPDP (Snapshot based on Multi-Parallel Degree Pipeline).
What-if analysis is an important method to analyze the hypothetical scenarios based on the historical data. It provides useful information for the decision- maker. Multiple versions are critical to what-if analysis. I...
详细信息
暂无评论