Proceedings IEEE Advances in Digital Libraries 2000
DOI: 10.1109/adl.2000.848373
|View full text |Cite
|
Sign up to set email alerts
|

Using regular tree automata as XML schemas

Abstract: We address the problem of tight XML schemas and propose regular tree automata to model XML data. We show that the tree automata model is more powerful that the XML DTDs and is closed under main algebraic operations. We introduce the XML query algebra based the tree automata model, and discuss the query optimization and query pruning techniques. Finally, we show the conversion of tree automata schema into XML DTDs.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 30 publications
(32 citation statements)
references
References 17 publications
0
32
0
Order By: Relevance
“…The proposed abstraction for the data definition section of archetypes is based on labeled trees which have been extensively used for modeling XML schemas and queries [20][28][37] [38]. Archetype specialization is modeled by a subsumption relation.…”
Section: Discussionmentioning
confidence: 99%
“…The proposed abstraction for the data definition section of archetypes is based on labeled trees which have been extensively used for modeling XML schemas and queries [20][28][37] [38]. Archetype specialization is modeled by a subsumption relation.…”
Section: Discussionmentioning
confidence: 99%
“…For instance, probabilistic tree grammars have been widely used to tackle ambiguity in natural language parsing (Charniak, 1993;Sima'an et al, 1996;Stolcke, 1995;Thorup, 1996) or to process structured text (Prescod, 2000;Murata, 1997;Chidlovskii, 2000). Context-free grammars (Hopcroft and Ullman, 1979) provide a traditional formalism that handles structural information.…”
Section: Introductionmentioning
confidence: 99%
“…Now R is correct for L iff R * (L) ∩ Err = ∅, and R is normalizing for L iff L ⊆ R − * (Final), with Err and Final denoting the set of erroneous and final configurations, respectively. Starting from classical program analysis, recent applications include verification of XML transformations [3] and cryptographic protocols [10].…”
Section: Introductionmentioning
confidence: 99%