The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software solutions performing automatic code analysis are very important, especially for code assistance capabilities or for extracting semantic metadata from the source code. These methods gather syntactic information from the source code and then in general they provide large set of implying semantics. With the increased focus on dynamic languages the problem emerges - the whole code semantic is...
The state of the art in semi-structured data processing (and XML in particular) and Semantic Web repositories correspond to each other: the non-scalability of pilot implementations, the inability of optimizations, and the cost of the fully native implementation. Although there are successful implementations in each of the approaches, none of the methods may be considered universal. The Bobox framework...
An XML transformation, commonly specified in XSLT, is an important step during XML-based data migration. Since common XSLT processors always parse input data into DOM-like structure, processing of large data sets to be migrated represents a significant problem; all available memory can be exhausted, the trans-formation takes unacceptable long time, or even the processors can fail. In this survey we...
Most of the enormous amount of information from the internet is available just like Web pages made for a human reader. They don't have any common interface for accessing, searching or browsing the data. Hence, it's hard to extract the semantic data from the Web, categorize them and keep them updated. For this purpose we have designed and implemented a system called AgentMat. This system is designed...
The trust management in P2P networks allow to establish the trust relationships among the peers and decide whether the considered transaction will be realized. It tries to ensure safety in the extremely unsafe environments of P2P networks. In this paper we focus on the formal description of requirements of trusted P2P networks and we propose the model which is able to measure them. Our model should...
We present a buffering streaming engine for processing top-down XSLT transformations. It consists of an analyzer and a transformer.The analyzer examines given top-down XSLT and XSD, and generates fragments which identify parts of XSD need to be buffered when XSLT is applied. The fragments are passed to the transformer which processes XSLT on an input XML document conforming to XSD. It uses auxiliary...
Three-tiered information systems often use application-level authentication and authorization schemes. In these architectures, successful attacks to the application server layer offer the attacker unlimited access to the database. The proposed solution to this problem is based on a set of views employing session-scope data to determine the effective user rights. These views are generated from formal...
We have significantly enhanced the Xord framework for streaming processing of large XML data by introducing buffers for input fragments. The analyzer examines given top-down XSLT and XSD, and generates fragments which identify parts of XSD that need to be buffered during XSLT transformation. The transformer uses auxiliary memory buffers to store temporary data according to the analyzed fragments....
We present an algorithm which analyzes memory requirements of the streaming processing of a given XSLT stylesheet on the set of XML documents defined by a given XML schema. This schema-based analyzer represents an integral part of the Xord framework for the streaming processing of XSLT - it determines the most efficient streaming algorithm for a given transformation and the class of XML documents...
We present an implementation of the Xord framework for streaming processing of XSLT transformations based on .Net technologies. Within the framework, we implement an efficient streaming algorithm capable to process a significant subset of top-down XSLT transformations. We exactly characterize this class of transformations. The algorithm uses a stack of the size proportional to the depth of the input...
The P2P networkpsilas open and anonymous nature offers an almost ideal environment for malicious activities. In this paper, we categorize current reputation management schemes which offer defenses against many attacks. Our goal is to survey the present reputation management methods and propose a classification which facilitates a system analysis. We identify the main drawbacks which are common to...
The semantic Web is not widespread as it has been expected by its founders. This is partially caused by lack of standard and working infrastructure for the semantic Web. We have built a working, portable, stable, high-performance infrastructure for the semantic Web. This enables various experiments with the semantic Web in the real world.
The semantic Web is not widespread as it has been expected by its founders. This is partially caused by lack of standard and working infrastructure for the semantic Web. We have built a working, portable, stable, high-performance infrastructure for the semantic Web. This paper is focused on tasks performed by the infrastructure.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.