• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Xianmin and Li Jianzhong. Key-Based Method for Extracting Entities from XML Data[J]. Journal of Computer Research and Development, 2014, 51(1): 64-75.
Citation: Liu Xianmin and Li Jianzhong. Key-Based Method for Extracting Entities from XML Data[J]. Journal of Computer Research and Development, 2014, 51(1): 64-75.

Key-Based Method for Extracting Entities from XML Data

More Information
  • Published Date: January 14, 2014
  • This paper proposes a method KEE for evaluating entity extraction problem over XML data, which is an important step for identifying entities in XML data. Directed by the XML Key, utilizing the relaxation and verification techniques, KEE provides a rule-based solution for entity extraction problem, which has following characteristics. Firstly, using XML query language, KEE provides a condensed presentation for the entity whose size may get very large when scaling up the data size. Secondly, requiring only one location example to indicate the interests, using relaxation technique, KEE can discover other similar locations automatically. Thirdly, by adjusting the example given to KEE, users can specify their own interesting entity locations and control the locations discovered by KEE. Besides, utilizing the idea of sharing computations, by extending previous automaton techniques for XML query evaluation, an efficient implementation of KEE is provided. Experimental results on both synthetic and real data show that KEE can provide an effective and efficient solution to the entity extraction problem.
  • Related Articles

    [1]Li Xiaowei, Chen Benhui, Yang Dengqi, Wu Gaofei. Review of Security Protocols in Edge Computing Environments[J]. Journal of Computer Research and Development, 2022, 59(4): 765-780. DOI: 10.7544/issn1000-1239.20210644
    [2]Li Jie, Zhang Jing, Li Weidong, Zhang Xuejie. A Fair Distribution Strategy Based on Shared Fair and Time-Varying Resource Demand[J]. Journal of Computer Research and Development, 2019, 56(7): 1534-1544. DOI: 10.7544/issn1000-1239.2019.20180798
    [3]Liu Zhixiang, Fang Yong, Song Anping, Xu Lei, Wang Xiaowei, Zhou Liping, Zhang Wu. Large-Scale Scalable Parallel Computing Based on LBM with Multiple-Relaxation-Time Model[J]. Journal of Computer Research and Development, 2016, 53(5): 1156-1165. DOI: 10.7544/issn1000-1239.2016.20148441
    [4]Liu Hai, Li Xinghua, Ma Jianfeng. Rational Secret Sharing Scheme Based on Reconstruction Order Adjustment Mechanism[J]. Journal of Computer Research and Development, 2015, 52(10): 2332-2340. DOI: 10.7544/issn1000-1239.2015.20150511
    [5]Zhou Enqiang, Zhang Wei, Lu Yutong, Hou Hongjun, Dong Yong. A Cache Approach for Large Scale Data-Intensive Computing[J]. Journal of Computer Research and Development, 2015, 52(7): 1522-1530. DOI: 10.7544/issn1000-1239.2015.20148073
    [6]Wang Zhonghua, Han Zhen, Liu Jiqiang. File Sharing Scheme for Multi-User in Cloud Environment[J]. Journal of Computer Research and Development, 2014, 51(12): 2614-2622. DOI: 10.7544/issn1000-1239.2014.20131178
    [7]Yu Si, Gui Xiaolin, Zhang Xuejun, Lin Jiancai, Wang Junfei. Co-residency Detection Scheme based on Shared Cache in the Cloud[J]. Journal of Computer Research and Development, 2013, 50(12): 2651-2660.
    [8]Xun Changqing, Yang Qianming, Wu Nan, Wen Mei, and Zhang Chunyuan. Optimized Software-Hardware Communications for Shared Memory Reconfigurable Computer[J]. Journal of Computer Research and Development, 2013, 50(8): 1637-1646.
    [9]Zhu Xia, Luo Junzhou, Song Aibo, and Dong Fang. A Multi-Dimensional Indexing for Complex Query in Cloud Computing[J]. Journal of Computer Research and Development, 2013, 50(8): 1592-1603.
    [10]Huang Dongping, Liu Duo, and Dai Yiqi. Weighted Threshold Secret Sharing[J]. Journal of Computer Research and Development, 2007, 44(8): 1378-1382.

Catalog

    Article views (848) PDF downloads (515) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return