会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • Extensible Decimal Identification System for Ordered Nodes
    • 有序节点的可扩展十进制识别系统
    • US20060173927A1
    • 2006-08-03
    • US10605448
    • 2003-09-30
    • Kevin BeyerRobert LyleEdison Ting
    • Kevin BeyerRobert LyleEdison Ting
    • G06F17/30
    • G06F17/30961
    • An extensible identification system for nodes in a hierarchy is described wherein each node is assigned a concatenation of decimal based values. The values assigned uniquely identify the node, provides an order for the node, and identifies its parent, child, and sibling relationships with other nodes Furthermore, the IDs assigned can be encoded to be byte comparable. Furthermore, the ID's assigned to nodes need not be modified when changes (adding/deleting a child node or a subtree of nodes) are made in the hierarchy. Additionally, in the event of such a change, the order and relationships between the parent, child, and sibling nodes are retained.
    • 描述了用于分层结构中的节点的可扩展识别系统,其中每个节点被分配为基于十进制的值的级联。 分配的值唯一标识节点,提供节点的顺序,并识别其与其他节点的父,子节点和兄弟关系。此外,分配的ID可以编码为字节可比。 此外,在层次结构中进行更改(添加/删除子节点或节点子树)时,不需要修改分配给节点的ID。 另外,如果发生这种变化,则保留父,子和兄弟节点之间的顺序和关系。
    • 2. 发明申请
    • Match graphs for query evaluation
    • 匹配图表进行查询评估
    • US20070174241A1
    • 2007-07-26
    • US11336022
    • 2006-01-20
    • Kevin BeyerVanja JosifovskiEdison Ting
    • Kevin BeyerVanja JosifovskiEdison Ting
    • G06F17/30
    • G06F17/2247G06F16/8365G06F17/2241
    • Provided are techniques for processing a query. The query is received, and the query is formed by one or more paths, where each path includes one or more steps. A hierarchical document is received that includes one or more document nodes. While processing the query and traversing the hierarchical document to find document nodes described by at least one of the one or more steps of the query, a match graph is constructed that includes one or more match nodes. Each of the match nodes identifies a step instance and is associated with step instances that are ancestors and descendants of the identified step instance. Also, each of the match nodes is associated with a level. In addition, the match graph includes zero or more edges between the match nodes indicating relationships between the match nodes. The match nodes in the match graph are traversed from lower levels to higher levels to construct results for the query.
    • 提供了用于处理查询的技术。 接收到查询,并且查询由一个或多个路径形成,其中每个路径包括一个或多个步骤。 收到包含一个或多个文档节点的分层文档。 在处理查询并遍历分层文档以查找由查询的一个或多个步骤中的至少一个描述的文档节点时,构建包括一个或多个匹配节点的匹配图。 每个匹配节点标识步骤实例,并且与作为所识别的步骤实例的祖先和后代的步骤实例相关联。 此外,每个匹配节点与一个级别相关联。 此外,匹配图包括指示匹配节点之间的关系的匹配节点之间的零个或多个边缘。 匹配图中的匹配节点从较低级别遍历到更高级别,以构造查询的结果。
    • 3. 发明申请
    • Hierarchical storage architecture using node ID ranges
    • 使用节点ID范围的分层存储架构
    • US20060004792A1
    • 2006-01-05
    • US10870924
    • 2004-06-21
    • Robert LyleEdison Ting
    • Robert LyleEdison Ting
    • G06F17/00
    • G06F17/30911
    • A system and method for managing and storing logically grouped hierarchical data via physical block storage is provided. Logical groups of parsed XML node data forming node ID ranges are indexed by creating and inserting an index entry into a node ID range. Index entries indicate node ID range bounds for blocks in which nodes are stored. Consulting a node ID range index facilitates XML node traversal via logical links between nodes in different blocks. Additionally, physical links between nodes within a block allow for fast node traversal. Node update including insertion and deletion as well as document order based pre-fetch and XML document re-organization is also facilitated by this architecture.
    • 提供了一种用于通过物理块存储管理和存储逻辑分组的分层数据的系统和方法。 通过创建索引条目并将其插入到节点ID范围内,对生成节点ID范围的已解析XML节点数据的逻辑组进行索引。 索引条目指示节点ID存储节点的范围界限。 咨询节点ID范围索引便于通过不同块中的节点之间的逻辑链路遍历XML节点。 另外,块内的节点之间的物理链路允许快速节点遍历。 此架构也促进了包括插入和删除以及基于文档顺序的预取和XML文档重新组织的节点更新。
    • 5. 发明申请
    • Query evaluation using ancestor information
    • 使用祖先信息进行查询评估
    • US20070174242A1
    • 2007-07-26
    • US11336140
    • 2006-01-20
    • Vanja JosifovskiEdison Ting
    • Vanja JosifovskiEdison Ting
    • G06F17/30
    • G06F17/272G06F17/30424G06F17/30433G06F17/30929G06F17/30938Y10S707/99933
    • Provided are techniques for processing a query. A query is received, wherein the query is formed by one or more paths, and wherein each path includes one or more steps. A hierarchical document including one or more document nodes is received. While processing the query and traversing the hierarchical document, one or more extraction entries are constructed, wherein each extraction entry includes a step instance match candidate identifying a document node and a step instance ancestor path for the document node, and one or more tuples are constructed using the one or more extraction entries by associating the step instance match candidate from one of the one or more extraction entries with the step instance match candidate from at least one of the one or more other extraction entries.
    • 提供了用于处理查询的技术。 接收到查询,其中查询由一个或多个路径形成,并且其中每个路径包括一个或多个步骤。 接收包括一个或多个文档节点的分层文档。 在处理查询并遍历分层文档时,构建一个或多个提取条目,其中每个提取条目包括标识文档节点的步骤实例匹配候选和文档节点的步骤实例祖先路径,并且构造一个或多个元组 通过将所述一个或多个提取条目中的一个提取条目的所述步骤实例匹配候选与所述一个或多个其他提取条目中的至少一个提取条目与所述步骤实例匹配候选相关联来使用所述一个或多个提取条目。
    • 6. 发明申请
    • Transient Range Versioning Based on Redirection
    • 基于重定向的瞬态范围版本控制
    • US20060075000A1
    • 2006-04-06
    • US10711808
    • 2004-10-06
    • James KleeweinEdison Ting
    • James KleeweinEdison Ting
    • G06F17/30
    • G06F17/30309
    • A mechanism is described for transient versioning in architectures that manage node ranges, wherein each node is assigned a node ID value and a set of nodes form a range of node IDs called a node range. Each entry in the index describes one range and points to where the range is located. Individual nodes are located by finding the correct range in the index. When nodes are added to or deleted from a node range, the range of nodes are versioned by copying the nodes before changes, to transient storage, and then the original nodes are modified. Different versions are tracked by assigning timestamps to each copy of the node range. Each entry in the node ID range index points to the location of the nodes in a range called the range identifier or RID. Before changes are made in a range, the nodes in a range are copied to a Version Hash Table based on the RID. Copies of the range including the current one is assigned a timestamp or LSN. New readers after a change, access the current nodes through RID, while old readers access the old nodes through the same RID, but hashing it to find the shadowed copy in the Version Hash Table. If changes causes nodes in the range to be moved to a new RID, previous readers need to be redirected from the new RID to the old RID.
    • 描述了用于管理节点范围的架构中的瞬态版本化的机制,其中每个节点被分配有节点ID值,并且一组节点形成称为节点范围的节点ID的范围。 索引中的每个条目都描述一个范围,并指出范围所在的位置。 通过在索引中找到正确的范围来定位各个节点。 当节点被添加到或从节点范围中删除时,节点的范围通过将更改之前的节点复制到临时存储,然后修改原始节点进行版本控制。 通过为节点范围的每个副本分配时间戳来跟踪不同的版本。 节点ID范围索引中的每个条目指向称为范围标识符或RID的范围内的节点的位置。 在范围内进行更改之前,将范围内的节点根据RID复制到版本散列表中。 分配包括当前范围的范围的副本被分配了时间戳或LSN。 新读者在更改后,通过RID访问当前节点,而旧读者通过相同的RID访问旧节点,但是可以在“版本哈希表”中查找阴影副本。 如果更改导致该范围内的节点移动到新的RID,则以前的读者需要从新的RID重定向到旧的RID。
    • 7. 发明申请
    • Use of pseudo keys in node ID range based storage architecture
    • 在基于节点ID范围的存储架构中使用伪密钥
    • US20060004791A1
    • 2006-01-05
    • US10870923
    • 2004-06-21
    • James KleeweinEdison Ting
    • James KleeweinEdison Ting
    • G06F17/00
    • G06F16/9027
    • A method of computing pseudo keys facilitates the bounding of node ID ranges. Pseudo keys are computed to facilitate node location in node ID ranges that have been split. A pseudo previous high key is computed by decrementing the last digit of the lowest node ID value in a newly formed node ID range by one and by appending ‘x’.‘x’. A computed pseudo key has no previous siblings or descendants of previous sibling having a node ID higher in value than a computed pseudo previous high key. Pseudo keys are also computed to define boundaries of a sub-tree. The range determined by a pseudo previous high key for a highest valued root node and a pseudo sub-tree high key bounds a sub-tree. Sub-tree pseudo keys are also comprised of a pseudo sub-tree low key and a pseudo end of document key.
    • 计算伪密钥的方法有助于节点ID范围的界限。 计算伪密钥以便于已经拆分的节点ID范围内的节点位置。 通过将新形成的节点ID范围中的最低节点ID值的最后一位递减1并通过追加“x”。x'来计算伪先前高密钥。 计算的伪密钥没有先前兄弟姐妹的先前兄弟姐妹或后代,其节点ID的值高于计算的伪先前高密钥。 还计算伪密钥以定义子树的边界。 由用于最高值根节点的伪先前高密钥确定的范围和伪子树高密钥限制子树。 子树伪密钥也由伪子树低密钥和文档密钥的伪尾组成。