首页 > 最新文献

18th International Workshop on Database and Expert Systems Applications (DEXA 2007)最新文献

英文 中文
Using Received Signal Strength Variation for Energy Efficient Data Dissemination in Wireless Sensor Networks 利用接收信号强度变化实现无线传感器网络的高能效数据传播
S. Erdogan, S. Hussain
In this paper, the values of received signal strength indicator (RSSI) are studied for various deployment environments in wireless sensor networks. The accurate RSSI estimation can improve the accuracy of several algorithms used in localization, mobility, and routing. The experiments are conducted to investigate the variation in RSSI values with respect to: a) distance between transmitter and receiver, b) non-circular radio communication, and c) alignment of transmitter and receiver. The results show that because of a non-circular radio communication model and proper alignment techniques, the overall energy consumption of a sensor network can be reduced by 43%.
本文研究了无线传感器网络中不同部署环境下接收信号强度指标(RSSI)的取值。准确的RSSI估计可以提高定位、移动和路由中使用的几种算法的准确性。实验研究了RSSI值在以下方面的变化:a)发射机和接收机之间的距离,b)非圆形无线电通信,以及c)发射机和接收机的对准。结果表明,由于采用非圆形无线电通信模型和适当的对准技术,传感器网络的总能耗可降低43%。
{"title":"Using Received Signal Strength Variation for Energy Efficient Data Dissemination in Wireless Sensor Networks","authors":"S. Erdogan, S. Hussain","doi":"10.1109/DEXA.2007.70","DOIUrl":"https://doi.org/10.1109/DEXA.2007.70","url":null,"abstract":"In this paper, the values of received signal strength indicator (RSSI) are studied for various deployment environments in wireless sensor networks. The accurate RSSI estimation can improve the accuracy of several algorithms used in localization, mobility, and routing. The experiments are conducted to investigate the variation in RSSI values with respect to: a) distance between transmitter and receiver, b) non-circular radio communication, and c) alignment of transmitter and receiver. The results show that because of a non-circular radio communication model and proper alignment techniques, the overall energy consumption of a sensor network can be reduced by 43%.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121957040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
The Design and Verification of RFID Authentication Protocol for Ubiquitous Computing 面向普适计算的RFID认证协议设计与验证
Hyun Seok Kim, Jin-Young Choi
The growing use of radio frequency identification (RFID) technology to enhance ubiquitous computing environments has only begun to be realized. It allows for the identification of objects and/or subjects remotely using attached RFID tags via a radio frequency channel, hence identification is achieved in a contactless manner. This paper presents issues concerning security and privacy of RFID systems which are heavily discussed in public and introduces authentication protocol for a RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology, that is, Casper (a compiler for security protocol), CSP (communicating sequential processes) and then verify security properties such as secrecy and authentication using FDR (failure divergence refinement) tool.
越来越多地使用射频识别(RFID)技术来增强泛在计算环境才刚刚开始实现。它允许通过无线射频通道使用附加的RFID标签远程识别物体和/或对象,因此以非接触方式实现识别。本文提出了公众广泛讨论的RFID系统的安全性和隐私性问题,并介绍了RFID安全协议的认证协议,该协议使用vernam和标准加密作为加密原语,作为对阅读器设备的RFID标签认证的概念证明。为了验证我们的协议,我们使用模型检查方法,即Casper(安全协议的编译器)、CSP(通信顺序过程),然后使用FDR(故障散度细化)工具验证安全性属性,如保密性和身份验证。
{"title":"The Design and Verification of RFID Authentication Protocol for Ubiquitous Computing","authors":"Hyun Seok Kim, Jin-Young Choi","doi":"10.1109/DEXA.2007.6","DOIUrl":"https://doi.org/10.1109/DEXA.2007.6","url":null,"abstract":"The growing use of radio frequency identification (RFID) technology to enhance ubiquitous computing environments has only begun to be realized. It allows for the identification of objects and/or subjects remotely using attached RFID tags via a radio frequency channel, hence identification is achieved in a contactless manner. This paper presents issues concerning security and privacy of RFID systems which are heavily discussed in public and introduces authentication protocol for a RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify our protocol, we use model checking methodology, that is, Casper (a compiler for security protocol), CSP (communicating sequential processes) and then verify security properties such as secrecy and authentication using FDR (failure divergence refinement) tool.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116588888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards a definition of an Image Ontology 探讨图像本体的定义
Antonio Penta, A. Picariello, L. Tanca
Archiving, organizing, and searching multimedia data in an appropriate fashion is a task of increasing importance. The ontology theory may be appropriately extended in order to face this challenging issue. In this paper we propose an extension of an Image Database model based on NF2 with an Ontology model. We first describe NF2 and the main concepts of Image Ontologies, then we propose a general architecture for supporting creation and management of multimedia objects.
以适当的方式对多媒体数据进行归档、组织和搜索是一项日益重要的任务。为了应对这一具有挑战性的问题,本体论可以得到适当的扩展。本文提出了一种基于NF2的图像数据库模型的本体模型扩展。我们首先描述了NF2和图像本体的主要概念,然后提出了一个支持多媒体对象创建和管理的通用架构。
{"title":"Towards a definition of an Image Ontology","authors":"Antonio Penta, A. Picariello, L. Tanca","doi":"10.1109/DEXA.2007.83","DOIUrl":"https://doi.org/10.1109/DEXA.2007.83","url":null,"abstract":"Archiving, organizing, and searching multimedia data in an appropriate fashion is a task of increasing importance. The ontology theory may be appropriately extended in order to face this challenging issue. In this paper we propose an extension of an Image Database model based on NF2 with an Ontology model. We first describe NF2 and the main concepts of Image Ontologies, then we propose a general architecture for supporting creation and management of multimedia objects.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121515987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Security analysis of a new multi-party payment protocol with intermediary service. 一种具有中介服务的新型多方支付协议的安全性分析。
Mildrey Carbonell Castro, J. M. Sierra, J. Márquez, Antonio Izquierdo Manzanares
Most of the electronic payment proposals found in the scientific literature are focused on a traditional two-domain business model: customer and merchant. However, an enhanced payment model with an intermediary entity could be considered, with the goal of providing additional advantages for the parties in the e-commerce scenario. In this article, we will show the utility of intermediary inside the payment process describing a service of centralization of the payment system (different to a gateway, IIP or connection broker) in a multi-party payment scenario. We illustrate how this service improves Internet selling applications security, which currently need an effort for facing the weaknesses of the different payments models.
在科学文献中发现的大多数电子支付建议都集中在传统的两域业务模型上:客户和商家。但是,可以考虑使用中介实体的增强支付模型,其目标是为电子商务场景中的各方提供额外的优势。在本文中,我们将展示支付过程中的中介工具,它描述了多方支付场景中支付系统(不同于网关、IIP或连接代理)的集中化服务。我们将说明此服务如何提高Internet销售应用程序的安全性,目前需要努力面对不同支付模式的弱点。
{"title":"Security analysis of a new multi-party payment protocol with intermediary service.","authors":"Mildrey Carbonell Castro, J. M. Sierra, J. Márquez, Antonio Izquierdo Manzanares","doi":"10.1109/DEXA.2007.130","DOIUrl":"https://doi.org/10.1109/DEXA.2007.130","url":null,"abstract":"Most of the electronic payment proposals found in the scientific literature are focused on a traditional two-domain business model: customer and merchant. However, an enhanced payment model with an intermediary entity could be considered, with the goal of providing additional advantages for the parties in the e-commerce scenario. In this article, we will show the utility of intermediary inside the payment process describing a service of centralization of the payment system (different to a gateway, IIP or connection broker) in a multi-party payment scenario. We illustrate how this service improves Internet selling applications security, which currently need an effort for facing the weaknesses of the different payments models.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122743372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Intensive Use of Bayesian Belief Networks for the Unified, Flexible and Adaptable Analysis of Misuses and Anomalies in Network Intrusion Detection and Prevention Systems 贝叶斯信念网络在网络入侵检测和防御系统误用和异常的统一、灵活和自适应分析中的广泛应用
P. G. Bringas
This paper describes the ESIDE-Depian intrusion detection and prevention system, which uses Bayesian structural and parametric learning and also evidence propagation and adaptation, in order to improve the accuracy and manageability of network intrusion detection systems (NIDS). Current NIDS do not consider the two main detection paradigms, i.e. misuse detection and anomaly detection, in an unified style, so the analysis is not inherently complete. Besides, historical data are not generally used, neither for analysis nor for sequential adaptation of the knowledge representation models used for detection; hence this wealthy information about the essence and the potential trends of the target system is not commonly considered. Thus, by the generalized use of Bayesian belief networks, ESIDE-Depian achieves the main goal of detecting and preventing both well-known and also zero-day attacks with excellent results, by means of unified real-time analysis of network traffic.
为了提高网络入侵检测系统的准确性和可管理性,本文提出了一种基于贝叶斯结构学习和参数学习的入侵检测与防御系统——ESIDE-Depian。目前的NIDS没有统一考虑误用检测和异常检测这两种主要的检测范式,因此分析本身并不完整。此外,历史数据通常不用于分析或用于检测的知识表示模型的顺序适应;因此,这些关于目标系统的本质和潜在趋势的丰富信息通常不被考虑。因此,通过对贝叶斯信念网络的推广使用,通过对网络流量的统一实时分析,side - depian达到了检测和预防知名攻击和零日攻击的主要目标,并取得了良好的效果。
{"title":"Intensive Use of Bayesian Belief Networks for the Unified, Flexible and Adaptable Analysis of Misuses and Anomalies in Network Intrusion Detection and Prevention Systems","authors":"P. G. Bringas","doi":"10.1109/DEXA.2007.38","DOIUrl":"https://doi.org/10.1109/DEXA.2007.38","url":null,"abstract":"This paper describes the ESIDE-Depian intrusion detection and prevention system, which uses Bayesian structural and parametric learning and also evidence propagation and adaptation, in order to improve the accuracy and manageability of network intrusion detection systems (NIDS). Current NIDS do not consider the two main detection paradigms, i.e. misuse detection and anomaly detection, in an unified style, so the analysis is not inherently complete. Besides, historical data are not generally used, neither for analysis nor for sequential adaptation of the knowledge representation models used for detection; hence this wealthy information about the essence and the potential trends of the target system is not commonly considered. Thus, by the generalized use of Bayesian belief networks, ESIDE-Depian achieves the main goal of detecting and preventing both well-known and also zero-day attacks with excellent results, by means of unified real-time analysis of network traffic.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130793623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An Index Structure To Retrieve Documents With Geographic Information 检索具有地理信息的文档的索引结构
M. R. Luaces, J. Paramá, Oscar Pedreira, Diego Seco, J. Viqueira
Both geographic information systems and information retrieval have been very active research fields in the last decades. Lately, a new research field called geographic information retrieval has appeared from the intersection of these two fields. The main goal of this field is to define index structures and techniques to efficiently store and retrieve documents using both the text and the geographic references contained within the text. We present in this paper the architecture of a system for geographic information retrieval. It defines a workflow for the extraction of the geographic references in the document. In addition, a new index structure is defined that combines an inverted index, a spatial index, and an ontology. This structure improves the query capabilities of other proposals.
地理信息系统和信息检索是近几十年来非常活跃的研究领域。近年来,在这两个领域的交叉中出现了一个新的研究领域——地理信息检索。该领域的主要目标是定义索引结构和技术,以便使用文本和文本中包含的地理参考来有效地存储和检索文档。本文提出了一个地理信息检索系统的体系结构。它定义了一个工作流,用于提取文档中的地理参考。此外,还定义了一个新的索引结构,该结构结合了倒排索引、空间索引和本体。这种结构提高了其他提案的查询能力。
{"title":"An Index Structure To Retrieve Documents With Geographic Information","authors":"M. R. Luaces, J. Paramá, Oscar Pedreira, Diego Seco, J. Viqueira","doi":"10.1109/DEXA.2007.35","DOIUrl":"https://doi.org/10.1109/DEXA.2007.35","url":null,"abstract":"Both geographic information systems and information retrieval have been very active research fields in the last decades. Lately, a new research field called geographic information retrieval has appeared from the intersection of these two fields. The main goal of this field is to define index structures and techniques to efficiently store and retrieve documents using both the text and the geographic references contained within the text. We present in this paper the architecture of a system for geographic information retrieval. It defines a workflow for the extraction of the geographic references in the document. In addition, a new index structure is defined that combines an inverted index, a spatial index, and an ontology. This structure improves the query capabilities of other proposals.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130343176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Using patterns paradigm to refine workflow policies 使用模式范例来细化工作流策略
T. Rochaeli, C. Eckert
We propose an approach to formalize the patterns and to automatically apply the formalized patterns. In our case, we use the pattern paradigm to refine security policies of a workflow. A policy refinement process derives low- level workflow policies from high-level and abstract policies specified by stakeholders. Such refinement process requires domain-specific expertise knowledge, which will be captured by using the pattern paradigm. These refinement patterns are formalized by using both description logic and temporal logic formalisms.
我们提出了一种形式化模式并自动应用形式化模式的方法。在我们的案例中,我们使用模式范例来细化工作流的安全策略。策略细化过程从涉众指定的高级抽象策略派生低级工作流策略。这样的细化过程需要特定于领域的专业知识,这些知识将通过使用模式范例获得。通过使用描述逻辑和时间逻辑形式化来形式化这些细化模式。
{"title":"Using patterns paradigm to refine workflow policies","authors":"T. Rochaeli, C. Eckert","doi":"10.1109/DEXA.2007.63","DOIUrl":"https://doi.org/10.1109/DEXA.2007.63","url":null,"abstract":"We propose an approach to formalize the patterns and to automatically apply the formalized patterns. In our case, we use the pattern paradigm to refine security policies of a workflow. A policy refinement process derives low- level workflow policies from high-level and abstract policies specified by stakeholders. Such refinement process requires domain-specific expertise knowledge, which will be captured by using the pattern paradigm. These refinement patterns are formalized by using both description logic and temporal logic formalisms.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127097221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
E-learning: Coupling Course Management Systems and Dynamic Taxonomies 电子学习:耦合课程管理系统和动态分类法
B. Demo, Alessio Angius
Dynamic taxonomies integrated into e-learning tools play a double role: on the one hand they are a powerful retrieval system in the usually large content base of an e-learning environment, on the other hand they allow and strongly encourage orthogonal visits of available learning resources by exploiting associations the user would not have thought of (and which are the specific contribution of dynamic taxonomies). These two roles are of interest both for teachers, who may use the search engine to retrieve hints for presentations, assignments, etc., and for students, who may explore the whole learning environment in a new profitable way, which makes, for example, immediately available for a same subject different aspects dealt with in different courses. In the paper we describe the integration of dynamic taxonomies into Moodle, a course management system for cooperative learning.
集成到电子学习工具中的动态分类法起着双重作用:一方面,它们是电子学习环境中通常很大的内容库中的强大检索系统,另一方面,它们允许并强烈鼓励对可用学习资源的正交访问,通过利用用户不会想到的关联(这是动态分类法的具体贡献)。教师和学生都对这两个角色感兴趣,他们可以使用搜索引擎来检索演示、作业等的提示,而学生则可以以一种新的有益的方式探索整个学习环境,例如,这使得同一主题在不同课程中涉及的不同方面立即可用。本文描述了动态分类法在Moodle课程管理系统中的集成,Moodle是一个用于合作学习的课程管理系统。
{"title":"E-learning: Coupling Course Management Systems and Dynamic Taxonomies","authors":"B. Demo, Alessio Angius","doi":"10.1109/DEXA.2007.89","DOIUrl":"https://doi.org/10.1109/DEXA.2007.89","url":null,"abstract":"Dynamic taxonomies integrated into e-learning tools play a double role: on the one hand they are a powerful retrieval system in the usually large content base of an e-learning environment, on the other hand they allow and strongly encourage orthogonal visits of available learning resources by exploiting associations the user would not have thought of (and which are the specific contribution of dynamic taxonomies). These two roles are of interest both for teachers, who may use the search engine to retrieve hints for presentations, assignments, etc., and for students, who may explore the whole learning environment in a new profitable way, which makes, for example, immediately available for a same subject different aspects dealt with in different courses. In the paper we describe the integration of dynamic taxonomies into Moodle, a course management system for cooperative learning.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134038475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
XML Query Optimisation: Specify your Selectivity XML查询优化:指定您的选择性
Sven Hartmann, Sebastian Link
The problem of efficiently evaluating XPath and XQuery queries has become increasingly significant since more and more XML data is stored in its native form. We propose a novel optimisation technique for XML queries that is based on the semantic properties exhibited by XML data. In sharp contrast to previous studies on selectivity estimation we propose to specify bounds on the number of element nodes in an XML tree that form the root of isomorphic subtrees. It turns out that efficient reasoning about these constraints provides effective means to predict the number of XPath and XQuery query answers, to predict the number of updates using the XQuery update facility, to predict the number of en(de)cryptions using XML encryption, and to optimise XML queries.
由于越来越多的XML数据以原生形式存储,因此高效地计算XPath和XQuery查询的问题变得越来越重要。我们提出了一种新的基于XML数据所显示的语义属性的XML查询优化技术。与之前关于选择性估计的研究形成鲜明对比的是,我们建议指定XML树中构成同构子树根的元素节点的数目界限。事实证明,对这些约束的有效推理提供了有效的方法来预测XPath和XQuery查询答案的数量、使用XQuery更新功能预测更新的数量、使用XML加密预测加密的数量以及优化XML查询。
{"title":"XML Query Optimisation: Specify your Selectivity","authors":"Sven Hartmann, Sebastian Link","doi":"10.1109/DEXA.2007.19","DOIUrl":"https://doi.org/10.1109/DEXA.2007.19","url":null,"abstract":"The problem of efficiently evaluating XPath and XQuery queries has become increasingly significant since more and more XML data is stored in its native form. We propose a novel optimisation technique for XML queries that is based on the semantic properties exhibited by XML data. In sharp contrast to previous studies on selectivity estimation we propose to specify bounds on the number of element nodes in an XML tree that form the root of isomorphic subtrees. It turns out that efficient reasoning about these constraints provides effective means to predict the number of XPath and XQuery query answers, to predict the number of updates using the XQuery update facility, to predict the number of en(de)cryptions using XML encryption, and to optimise XML queries.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122492474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A New Approach for Document Indexing UsingWavelet Trees 一种基于小波树的文档索引方法
N. Brisaboa, Yolanda Cillero, A. Fariña, Susana Ladra, Oscar Pedreira
The development of applications that manage large text collections needs indexing methods which allow efficient retrieval over text. Several indexes have been proposed which try to reach a good trade-off between the space needed to store both the text and the index, and its search efficiency. Self-indexes are becoming more and more popular. Not only they index the text, but they keep enough information to recover any portion of it without the need of keeping it explicitly. Therefore, they actually replace the text. In this paper, we focus in a self-index known as wavelet tree. Being originally organized as a binary tree, it was designed to index the characters from a text. We present three variants of this method that aim at reducing its size, while keeping a good trade-off between space and performance, as well as making it well-suited for indexing natural language texts. The first approach we describe joins Huffman compression and wavelet trees. The other two new variants index words instead of characters and use two different word-based compressors.
管理大型文本集合的应用程序的开发需要允许对文本进行有效检索的索引方法。已经提出了几种索引,它们试图在存储文本和索引所需的空间及其搜索效率之间取得良好的平衡。自我指数正变得越来越流行。它们不仅对文本进行索引,而且还保留了足够的信息来恢复文本的任何部分,而不需要明确地保留文本。因此,它们实际上取代了文本。在本文中,我们主要讨论一种称为小波树的自索引。最初被组织为二叉树,它被设计用于索引文本中的字符。我们提出了该方法的三种变体,旨在减小其大小,同时在空间和性能之间保持良好的权衡,并使其非常适合索引自然语言文本。我们描述的第一种方法结合了霍夫曼压缩和小波树。另外两个新变体索引单词而不是字符,并使用两个不同的基于单词的压缩器。
{"title":"A New Approach for Document Indexing UsingWavelet Trees","authors":"N. Brisaboa, Yolanda Cillero, A. Fariña, Susana Ladra, Oscar Pedreira","doi":"10.1109/DEXA.2007.118","DOIUrl":"https://doi.org/10.1109/DEXA.2007.118","url":null,"abstract":"The development of applications that manage large text collections needs indexing methods which allow efficient retrieval over text. Several indexes have been proposed which try to reach a good trade-off between the space needed to store both the text and the index, and its search efficiency. Self-indexes are becoming more and more popular. Not only they index the text, but they keep enough information to recover any portion of it without the need of keeping it explicitly. Therefore, they actually replace the text. In this paper, we focus in a self-index known as wavelet tree. Being originally organized as a binary tree, it was designed to index the characters from a text. We present three variants of this method that aim at reducing its size, while keeping a good trade-off between space and performance, as well as making it well-suited for indexing natural language texts. The first approach we describe joins Huffman compression and wavelet trees. The other two new variants index words instead of characters and use two different word-based compressors.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122884166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
18th International Workshop on Database and Expert Systems Applications (DEXA 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1