Patent classifications
G06F16/8373
Evaluating XML Full Text Search
Techniques are described to improve query evaluation in computer systems. In an embodiment, a system receives a full text query for evaluation against a collection of hierarchically marked data object sets. The query specifies token(s) and context(s) which indicate hierarchical location(s) to match within a queried hierarchical data structure. To evaluate the query, the system determines a) data object set(s) that contain the query specified token(s) using token list(s), and/or b) data object set(s) that contain the query specified context(s) using label list(s).
Method and device for preventing server from being attacked
A page request is received from a browser. A page script corresponding to the page request is allocated from a plurality of page scripts corresponding to the page request. The page script is transmitted to the browser for generation of a script execution parameter by execution of the page script by the browser. A page verification request is received from the browser, where the page verification request includes the script execution parameter. Whether a page verification request is expired is determined, where if the page verification request is expired, generating error prompt information indicating a page expiration. If the page verification request is not expired, whether the script execution parameter is valid, is determined. If the script execution parameter is valid, the validity is indicated, otherwise the page request is rejected.
Evaluating XML full text search
Methods and systems for improved query evaluation in computer systems are provided. A system receives a full text query for evaluation against a collection of XML documents. The query comprises specifies one or more tokens and one or more contexts. The contexts each represent a path within an XML expression. The query is used to make multiple determinations. First, determining, using token lists, first documents that contain the tokens included in the query. Second, determining, using tag lists, second documents that contain the contexts included in the query. Third, determining third documents by comparing the first documents and the second documents to determine which documents contain both the tokens and the contexts. The query is then evaluated in view of the third documents.
Method and device for preventing server from being attacked
A page request is received from a browser. A page script corresponding to the page request is allocated from a plurality of page scripts corresponding to the page request. The page script is transmitted to the browser for generation of a script execution parameter by execution of the page script by the browser. A page verification request is received from the browser, where the page verification request includes the script execution parameter. Whether a page verification request is expired is determined, where if the page verification request is expired, generating error prompt information indicating a page expiration. If the page verification request is not expired, whether the script execution parameter is valid, is determined. If the script execution parameter is valid, the validity is indicated, otherwise the page request is rejected.
Systems and methods for retrieving data utilizing a social intelligence fusion toolkit (SIFT)
Some embodiments are directed to a method for exchanging data between a user terminal, and a first data source and a second data source, the method including configuring a user-defined XML configuration file stored on a portal server. The method further includes retrieving data periodically from the first data source via a periodically executed application and retrieving data aperiodically from the second data source via an aperiodically executed application. The method further includes storing a combined data retrieved from the first data source and the second data sources in a database. The method further includes displaying the combined data on the user terminal in accordance with at least one option specified in the user-defined XML configuration file.
MICRO SERVICES TESTS PRIORITIZATION
One example method includes identifying a changed microservice whose code has been changed, mapping, for each microservice in a group of microservices that includes the changed microservice, microservice dependencies associated with the changed microservice, determining, for each microservice in the group, a relative risk that the microservice will be adversely affected by the change to the code of the changed microservice, and based on the respective relative risks, generating a test order indicating an order in which the microservices in the group will be tested.
Manipulating a table with an XML column in a database
Embodiments of the disclosure provide methods, systems, computer program products for manipulating a table with an XML column in database. According to the method, a SQL statement for a table is received first, wherein the table comprises an XML column which is a representation of a plurality of logical columns of the table, there is at least one XML element in at least one row and in the XML column of the table, and each of the at least one XML element corresponds to a non-null value in a specific row and in a logical column of the plurality of logical columns of the table. Then the SQL statement is parsed. And then the SQL statement is transformed into a hybrid statement being able to process the XML column in response to the parsing result indicating that the SQL statement relates to at least one logical column of the plurality of logical columns. At last the hybrid statement is executed.
METHOD FOR PREPARING DOCUMENTS WRITTEN IN MARKUP LANGUAGES WHILE IMPLEMENTING A USER INTERFACE FOR DEALING WITH DATA OF AN INFORMATION SYSTEM
The present technical solution relates to user interfaces in general and more specifically to user interfaces related to dealing with data in computer information systems. A method of preparing documents written in markup languages during implementing a user interface for dealing with data of an information system, wherein: forming metadata for at least one operation; forming a template for representing said operation, the template including at least one document written in at least one markup language; forming and storing a link between the template and at least one operation; displaying the template, forming and storing links between the template elements and operations, wherein selecting a template element and displaying information about operations available for links forming; selecting an operation; forming and storing the link comprising the identifier for the template element selected previously and the identifier for the operation selected previously. The technical result is increasing the efficiency of preparing documents written in markup languages while implementing a user interface for dealing with data of an information system, optimizing time for preparing the documents and simplifying their further maintenance.
Distinct value estimation for query planning
The problem of distinct value estimation has many applications, but is particularly important in the field of database technology where such information is utilized by query planners to generate and optimize query plans. Introduced is a novel technique for estimating the number of distinct values in a given dataset without scanning all of the values in the dataset. In an example embodiment, the introduced technique includes gathering multiple intermediate probabilistic estimates based on varying samples of the dataset, 2) plotting the multiple intermediate probabilistic estimates against indications of sample size, 3) fitting a function to the plotted data points, and 4) determining an overall distinct value estimate by extrapolating the objective function to an estimated or known total number of values in the dataset.
MANIPULATING A TABLE WITH AN XML COLUMN IN A DATABASE
Embodiments of the disclosure provide methods, systems, computer program products for manipulating a table with an XML column in database. According to the method, a SQL statement for a table is received first, wherein the table comprises an XML column which is a representation of a plurality of logical columns of the table, there is at least one XML element in at least one row and in the XML column of the table, and each of the at least one XML element corresponds to a non-null value in a specific row and in a logical column of the plurality of logical columns of the table. Then the SQL statement is parsed. And then the SQL statement is transformed into a hybrid statement being able to process the XML column in response to the parsing result indicating that the SQL statement relates to at least one logical column of the plurality of logical columns. At last the hybrid statement is executed.