• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Jianwei, Hao Zhongxiao. Node Probability Query Algorithm in Probabilistic XML Document Tree[J]. Journal of Computer Research and Development, 2012, 49(4): 785-794.
Citation: Wang Jianwei, Hao Zhongxiao. Node Probability Query Algorithm in Probabilistic XML Document Tree[J]. Journal of Computer Research and Development, 2012, 49(4): 785-794.

Node Probability Query Algorithm in Probabilistic XML Document Tree

More Information
  • Published Date: April 14, 2012
  • Because probabilistic XML document is the network data exchange and representation standard of probabilistic data, query and computation method of the element or elements and the probability is a main research content. Probabilistic XML document tree is an effective data model of probabilistic XML document, so this paper presents two kinds of query algorithms based on the definitions of basic path expression and extended path expression. One is that the probabilistic XML tree is firstly decomposed into the set of ordinary XML subtrees based on possible world principle and then the probability query algorithm of a single node or some nodes is designed. The other is that the probabilistic XML tree is firstly decomposed into the set of probabilistic XML subtrees based on the path analysis principle and then the probability query algorithm is also designed. The two algorithms are compared and analyzed through the experiments and the results show that they are effective. Compared with the first method, the second one fits the larger probabilistic XML document tree, and the quering and computeation of node probability are easier.
  • Related Articles

    [1]Li Mingyue, Luo Xiangyang, Chai Lixiang, Yuan Fuxiang, GanYong. City-Level IP Geolocation Method Based on Network Node Clustering[J]. Journal of Computer Research and Development, 2019, 56(3): 467-479. DOI: 10.7544/issn1000-1239.2019.20170473
    [2]Wang Changda, Huang Lei, Liu Zhifeng. Information Hiding Algorithm of IP Covert Timing Channels and Its Performance Analysis[J]. Journal of Computer Research and Development, 2016, 53(5): 988-999. DOI: 10.7544/issn1000-1239.2016.20150063
    [3]Wang Zhiwei and Zhang Wei. ID Based Signature Scheme from Strong RSA Assumption in the Standard Model[J]. Journal of Computer Research and Development, 2013, 50(2): 302-306.
    [4]Gao Haiying. Provable Secure ID-Based Authenticated Key Agreement Protocol[J]. Journal of Computer Research and Development, 2012, 49(8): 1685-1689.
    [5]Zhou Yousheng, Sun Yanbin, Qing Sihan, Yang Yixian. An Efficient ID-Based Verifiably Encrypted Signature Scheme[J]. Journal of Computer Research and Development, 2011, 48(8): 1350-1356.
    [6]Lai Xin, Huang Xiaofang, He Dake. An ID-Based Efficient Signcryption Key Encapsulation Scheme[J]. Journal of Computer Research and Development, 2009, 46(5): 857-863.
    [7]Zhou Ling, Sun Yamin. Research on Multicast Routing Algorithm for Mobile IP Based on Bone Node Set[J]. Journal of Computer Research and Development, 2008, 45(7): 1126-1132.
    [8]Wang Li, Xu Mingwei, and Xu Ke. On the Deployment Approach of IPSec and IP Filter in Routers[J]. Journal of Computer Research and Development, 2006, 43(3): 375-380.
    [9]Qu Haipeng, Li Dequan, Su Purui, Feng Dengguo. An IP Traceback Scheme with Packet Marking in Blocks[J]. Journal of Computer Research and Development, 2005, 42(12): 2084-2092.
    [10]Wu Yichuan, Huang Kui, Zheng Jianping, Sun Limin, and Cheng Weiming. An Adaptive Robust TCP/IP Header Compression Algorithm[J]. Journal of Computer Research and Development, 2005, 42(4): 655-661.

Catalog

    Article views (669) PDF downloads (378) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return