The role of XML in data exchange is evolving from one of merely conveying the structure of data to one that also con-veys its semantics. In particular, several proposals for key and foreign key constraints have recently appeared, and as-pects of these proposals have been adopted within XMLSchema. In this paper, we examine the problem of checking keys and foreign keys in XML documents using a validator based on SAX. The algorithm relies on an indexing technique based on the paths found in key denitions, and can be used for checking the correctness of an entire document (bulk check-ing) as well as for checking updates as they are made to the document (incremental checking). The asymptotic perfor-mance of the algorithm is linear in the size of...
When updating a valid XML Data or Schema, an efcient yet light-weight mechanism is needed to determi...
A great deal of research into the learning of schemas from XML data has been conducted in recent yea...
Abstract. We review key constraints in the context of XML as intro-duced by Buneman et al. We show t...
The role of XML in data exchange is evolving from one of merely conveying the structure of data to o...
The role of XML in data exchange is evolving from one of merely conveying the structure of data to o...
The role of XML in data exchange is evolving from one of merely conveying the structure of data to o...
Although key definitions are adopted by XML Schema, validating hierarchical key constraints over XML...
Abstract. Ongoing efforts in academia and industry to advance the management of XML data have create...
The most important integrity constraints in XML are primary keys and foreign keys. In general, keys ...
The increasing popularity of XML for persistent data storage, processing and exchange has triggered ...
The eXtensible Markup Language (XML) is the defacto industry standard for exchanging data on the W...
We consider a data-exchange environment where an XML document should respect some integrity constrai...
Constraints are important for a variety of XML recommen-dations and applications. Consequently, ther...
Abstract. Keys are fundamental for database management, indepen-dently of the particular data model ...
A great deal of research into the learning of schemas from XML data has been conducted in recent yea...
When updating a valid XML Data or Schema, an efcient yet light-weight mechanism is needed to determi...
A great deal of research into the learning of schemas from XML data has been conducted in recent yea...
Abstract. We review key constraints in the context of XML as intro-duced by Buneman et al. We show t...
The role of XML in data exchange is evolving from one of merely conveying the structure of data to o...
The role of XML in data exchange is evolving from one of merely conveying the structure of data to o...
The role of XML in data exchange is evolving from one of merely conveying the structure of data to o...
Although key definitions are adopted by XML Schema, validating hierarchical key constraints over XML...
Abstract. Ongoing efforts in academia and industry to advance the management of XML data have create...
The most important integrity constraints in XML are primary keys and foreign keys. In general, keys ...
The increasing popularity of XML for persistent data storage, processing and exchange has triggered ...
The eXtensible Markup Language (XML) is the defacto industry standard for exchanging data on the W...
We consider a data-exchange environment where an XML document should respect some integrity constrai...
Constraints are important for a variety of XML recommen-dations and applications. Consequently, ther...
Abstract. Keys are fundamental for database management, indepen-dently of the particular data model ...
A great deal of research into the learning of schemas from XML data has been conducted in recent yea...
When updating a valid XML Data or Schema, an efcient yet light-weight mechanism is needed to determi...
A great deal of research into the learning of schemas from XML data has been conducted in recent yea...
Abstract. We review key constraints in the context of XML as intro-duced by Buneman et al. We show t...