• Title/Summary/Keyword: 접근구조 트리

Search Result 172, Processing Time 0.02 seconds

The Design and Implementation of XML Tree base on Web Server for XML Schema Generation from RDBMS (RDBMS로부터 XML 스키마 생성을 위한 웹 서버 기반의 XML Tree 설계 및 구현)

  • 박영수;장덕철
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10b
    • /
    • pp.424-426
    • /
    • 2004
  • 웹 기술이 발달할수록 사회 전반의 패러다임 변화속도는 빨라지고, 사용자의 요구 사항과 웹 프로그램 내부의 복잡성은 증가한다. 또한 콘텐츠의 생명 주기는 짧아지고, 웹 프로그램의 구조 변경과 유지보수가 많아지게 된다. 따라서 동적인 변화에 빠르게 대처할 수 있는 웹 프로그램 기술이 더욱 요구되고 있다. XML은 계층적 구조를 갖고 있으면서도 구조적 변경이 가능하고, 다른 형태로의 변환이 용이하다. 본 논문에서는 이런 장점을 이용하여 개발 기간을 단축시킬 수 있는 방법의 하나로, XML을 기반으로 하는 웹 프로그램 개발 지원 서버를 이용해 쉽고 간편하게 웹 서버 프로그램을 개발하고, 유지보수 할 수 있도록 하는데 중점을 두고 웹 기반의 XML 트리를 설계하고 구현하였다. XML 트리는 파싱뿐만 아니라 계층적 구조를 이루고 있어 접근성이 우수하고, XML 스키마와 XML 스타일시트 작성에도 않은 도움을 줄 수 있을 것으로 기대된다.

  • PDF

Efficient Access Control List for XML Documents (XML 문서를 위한 효율적 접근 제어 리스트.)

  • 이용규;김신우
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2000.11a
    • /
    • pp.534-537
    • /
    • 2000
  • 지금까지 XML문서는 사용자에게 문서내의 모든 내용을 공개하였지만, 전자상거래와 같은 특정 분야의 경우에는 사용자에 따라 문서의 일부만을 공개하는 것이 필요하다. 따라서, 사용자에게 XML 문서의 권한을 부여하고 권한에 따라 접근을 관리하는 접근 관리 시스템이 요구된다. 이를 위하여 사용자 그룹을 권한 주체의 기본 단위로, XML 문서의 엘리먼트를 권한 객체의 기본 단위로 설정하여야 한다. 그러한 권한 주체의 계층 구조는 DAG(Directed Acyclic Graph) 형태로 표현되고 문서에 대한 접근 권한은 접근 제어 리스트를 이용하여 관리된다. 그러나 권한 주체마다 모든 접근 권한을 표시해야 하기 때문에 엘리먼트 단위의 접근 관리를 위해서는 접근 제어 리스트의 크기가 커지게 되는 문제점이 발생한다. 이를 해결하기 위해서 본 논문에서는 DAG를 완전 k-ary 트리로 변환하여 접근 권한을 부모와 자식 노드간에 상속받을 수 있도록 함으로써 접근 제어 리스트의 크기를 상당히 줄이면서도 권한 주체의 접근 권한이 빨리 알아낼 수 있는 새로운 방법을 제시한다. 성능 분석 결과 새로운 방안이 기존의 전관 제어 리스트에 비해 매우 효과적임을 알 수 있다.

  • PDF

Comparison of Directory Structures for SAN Based Very Large File Systems (SAN 환경 대용량 파일 시스템을 위한 디렉토리 구조 비교)

  • 김신우;이용규
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.1
    • /
    • pp.83-104
    • /
    • 2004
  • Recently, information systems that require storage and retrieval of huge amount of data are becoming used widely. Accordingly, research efforts have been made to develop Linux cluster file systems in the SAN environment in which clients themselves can manage metadata and access data directly. Also a semi-flat directory structure based on extendible hashing has been proposed to support fast retrieval of files[1]. In this research, we have designed and implemented the semi-flat extendible hash directory under the Linux system. In order to evaluate the practicality of the directory, we have also implemented the B+-tree based directory and experimented the performance. According to the performance comparisons, the extendible hash directory has the better performance at insert, delete, and search operations. On the other hand, the B+-tree directory is better at sorting files.

  • PDF

Design of General-Purpose Resource Management System with Tree Structure (트리 구조를 가진 범용 자원관리시스템의 설계)

  • Sin, Hyun-Kyu;Lee, Choong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.10
    • /
    • pp.1420-1426
    • /
    • 2008
  • The most recent programs tend to use picture or audio files which need mass storage resources. For these mass storages, the performance of automatic management decreases as the sizes of these resources increases. Moreover, the more the number of resources increases, the more the management of resources gets difficult. This paper suggests a resource management system to which the interface of tree-structure file system is applied in order to increase convenience and efficiency. The system uses the access technique based on character string path to have more compatibility, and supports tree structure which is more systematic. Further, it supports virtual nodes to show high performance. The system can be used to control resources from outside as well as inside of processes.

  • PDF

Performance Analysis and Enhancing Techniques of Kd-Tree Traversal Methods on GPU (GPU용 Kd-트리 탐색 방법의 성능 분석 및 향상 기법)

  • Chang, Byung-Joon;Ihm, In-Sung
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.2
    • /
    • pp.177-185
    • /
    • 2010
  • Ray-object intersection is an important element in ray tracing that takes up a substantial amount of computing time. In general, such spatial data structure as kd-tree has been frequently used for static scenes to accelerate the intersection computation. Recently, a few variants of kd-tree traversal have been proposed suitable for the GPU that has a relatively restricted computing architecture compared to the CPU. In this article, we propose yet another two implementation techniques that can improve those previous ones. First, we present a cached stack method that is aimed to reduce the costly global memory access time needed when the stack is allocated to global memory. Secondly, we present a rope-with-short-stack method that eases the substantial memory requirement, often necessary for the previous rope method. In order to show the effectiveness of our techniques, we compare their performances with those of the previous GPU traversal methods. The experimental results will provide prospective GPU ray tracer developers with valuable information, helping them choose a proper kd-tree traversal method.

Exploiting Spatial Reuse Opportunity with Power Control in loco parentis Tree Topology of Low-power and Wide-area Networks (대부모 트리 구조의 저 전력 광역 네트워크를 위한 전력 제어 기반의 공간 재사용 기회 향상 기법)

  • Byeon, Seunggyu;Kim, Jong Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.239-250
    • /
    • 2022
  • LoRa is a physical layer technology designed to secure highly reliable long-range communication with introducing loco parentis tree network and chirp spreading spectrum. Since since a leaf can send message to more than one parents simultaneously with a single transmission in a region, packet delivery ratio increases logarithmically as the number of gateways increases. The delivery ratio, however, dramatically collapses even under loco parentis tree topology due to the limitations of ALOHA-like primitive MAC, . The proposed method is intended to exploit SDMA approach to reuse frequency in an area. With the view, TxPower of each sender for each message in a concurrent transmission is elaborately controlled to survive the collision at different gateway. Thus, the gain from the capture effect improves the capacity of resource-hungry Low Power and Wide Area Networks.

Design of a Secret Sharing Scheme in a Tree-structured Hierarchy (트리 형태의 계층 구조에 적용 가능한 비밀분산법의 설계)

  • Song, Yeong-Won;Park, So-Young;Lee, Sang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.3
    • /
    • pp.161-168
    • /
    • 2002
  • A secret sharing scheme is a cryptographic protocol to share a secret among a set of participants P in the way that only qualified subsets of P can reconstruct the secret whereas any other subset of P, non-qualified to know the secret, cannot determine anything about the secret. In this paper, we propose a new secret sharing scheme in hierarchical groups, whose hierarchy can be represented as a tree structure. In the tree structure, participants of higher levels have priorities to reconstruct the secret over participants of lower levels. In the absence of the participant of a higher level, it is possible for this participant to delegate the ability to reconstruct the secret to the child nodes of the next lower level through the transfer of his delegation ticket. This scheme has a dynamic access structure through the recursive delegation process from the root to lower levels where participants aren't absent.

A Main Memory-resident Multi-dimensional Index Structure Employing Partial-key and Compression Schemes (부분키 기법과 압축 기법을 혼용한 주기억장치 상주형 다차원 색인 구조)

  • 심정민;민영수;송석일;유재수
    • Journal of KIISE:Databases
    • /
    • v.31 no.4
    • /
    • pp.384-394
    • /
    • 2004
  • Recently, to relieve the performance degradation caused by the bottleneck between CPU and main memory, cache conscious multi-dimensional index structures have been proposed. The ultimate goal of them is to reduce the space for entries so as to widen index trees and minimize the number of cache misses. The existing index structures can be classified into two approaches according to their entry reduction methods. One approach is to compress MBR keys by quantizing coordinate values to the fixed number of bits. The other approach is to store only the sides of minimum bounding regions (MBRs) that are different from their parents partially. In this paper, we propose a new index structure that exploits the properties of the both techniques. Then, we investigate the existing multi-dimensional index structures for main memory database system through experiments under the various work loads. We perform various experiments to show that our approach outperforms others.

Improving Classification Accuracy in Hierarchical Trees via Greedy Node Expansion

  • Byungjin Lim;Jong Wook Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.113-120
    • /
    • 2024
  • With the advancement of information and communication technology, we can easily generate various forms of data in our daily lives. To efficiently manage such a large amount of data, systematic classification into categories is essential. For effective search and navigation, data is organized into a tree-like hierarchical structure known as a category tree, which is commonly seen in news websites and Wikipedia. As a result, various techniques have been proposed to classify large volumes of documents into the terminal nodes of category trees. However, document classification methods using category trees face a problem: as the height of the tree increases, the number of terminal nodes multiplies exponentially, which increases the probability of misclassification and ultimately leads to a reduction in classification accuracy. Therefore, in this paper, we propose a new node expansion-based classification algorithm that satisfies the classification accuracy required by the application, while enabling detailed categorization. The proposed method uses a greedy approach to prioritize the expansion of nodes with high classification accuracy, thereby maximizing the overall classification accuracy of the category tree. Experimental results on real data show that the proposed technique provides improved performance over naive methods.

A Balanced Binary Search Tree for Huffman Decoding (허프만 복호화를 위한 균형이진 검색 트리)

  • Kim Hyeran;Jung Yeojin;Yim Changhun;Lim Hyesook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.5C
    • /
    • pp.382-390
    • /
    • 2005
  • Huffman codes are widely used for image and video data transmission. As the increase of real-time data, a lot of studies on effective decoding algorithms and architectures have been done. In this paper, we proposed a balanced binary search tree for Huffman decoding and compared the performance of the proposed architecture with that of previous works. Based on definitions of the comparison of codewords with different lengths, the proposed architecture constructs a balanced binary tree which does not include empty internal nodes, and hence it is very efficient in the memory requirement. Performance evaluation results using actual image data show that the proposed architecture requires small number of table entries, and the decoding time is 1, 5, and 2.41 memory accesses in minimum, maximum, and average, respectively.