摘要:
Systems and methods are disclosed for providing view maintenance by buffering one or more search results in a cache; and incrementally maintaining the search results by analyzing a source data update and updating the cache based on a relevance of the update to the search results.
摘要:
Disclosed is a method and apparatus for providing range based queries over distributed network nodes. Each of a plurality of distributed network nodes stores at least a portion of a logical index tree. The nodes of the logical index tree are mapped to the network nodes based on a hash function. Load balancing is addressed by replicating the logical index tree nodes in the distributed physical nodes in the network. In one embodiment the logical index tree comprises a plurality of logical nodes for indexing available resources in a grid computing system. The distributed network nodes are broker nodes for assigning grid computing resources to requesting users. Each of the distributed broker nodes stores at least a portion of the logical index tree.
摘要:
Systems and methods to provide two bottom up path matching solutions and one post processing solution for evaluating value predicates and tree pattern queries. The first path matching method triggers the matching whenever a leaf query step is seen and stores the prefix sub-matches in a cache for reuse. The second path matching method is an NFA (non-deterministic finite state automata) based solution through a post-order traversal of the XML document tree. The post processing method relies on a compact encoding the path results, which avoids redundant value predicate, join evaluations and any duplicate elimination, sort and grouping operations.
摘要:
Various systems and methods are describe for determining dynamically generated content to be invalidated as a result of changes to underlying data. In one method, invalidation processing is performed using a delayed version of the database that reflects the state of the database at the beginning of a preceding processing cycle, and an update log that reflects all updates since the beginning of the preceding processing cycle. In another method, invalidation processing is performed by locking a database which is locked during processing so as to reflect the state of the database at the beginning of processing, and an update log that reflects all updates to the database since the beginning of the preceding processing cycle. In another method, invalidation processing uses the database while it is freely updated during said processing, and the update log of the database.
摘要:
Systems and methods are disclosed to guarantee the safety of a continuous join query (CJQ) over one or more punctuated data streams by constructing a punctuation graph; checking whether the punctuation graph is strongly connected and if so, indicating that the CJQ is safe to execute. The system uses a generalized punctuation graph and its transformation to support arbitrary punctuation schemes. The system also provides an efficient shared purge algorithm for multi-way join operator.
摘要:
Systems and methods process generalized-tree-pattern queries by processing a twig query with a bottom-up computation to generate a generalized tree pattern result; encoding the generalized tree pattern results using hierarchical stacks; enumerating the generalized tree pattern result with a top-down computation; a hybrid of top-down and bottom-up computation for early result enumeration before reaching the end of document; and a more succinct encoding scheme that replaces the hierarchical stacks to further improve the performance.
摘要:
Systems and methods for selecting content from a plurality of channels in response to a received query are described. The systems and methods optimize content selection based on received queries and an identification of the user together with analysis of historical data.
摘要:
Various systems and methods are describe for determining dynamically generated content to be invalidated as a result of changes to underlying data. In one method, invalidation processing is performed using a delayed version of the database that reflects the state of the database at the beginning of a preceding processing cycle, and an update log that reflects all updates since the beginning of the preceding processing cycle. In another method, invalidation processing is performed by locking a database which is locked during processing so as to reflect the state of the database at the beginning of processing, and an update log that reflects all updates to the database since the beginning of the preceding processing cycle. In another method, invalidation processing uses the database while it is freely updated during said processing, and the update log of the database.
摘要:
Preferred embodiments of the invention include systems and methods for selecting content from a plurality of channels in response to a received query are described. The invention embodiments include systems and methods that optimize content selection based on received queries and an identification of the user together with analysis of historical data. Embodiments of the invention also include methods for storing historical data including a plurality of queries and user data from a plurality of user databases, analyzing the stored historical data to classify the relevancy of a channel to each of the plurality of queries and user data, storing the classification, and displaying content to user based on such factors as user habits, queries, timing of searches, and content preferences.
摘要:
Various systems and methods are describe for determining dynamically generated content to be invalidated as a result of changes to underlying data. In one method, invalidation processing is performed using a delayed version of the database that reflects the state of the database at the beginning of a preceding processing cycle, and an update log that reflects all updates since the beginning of the preceding processing cycle. In another method, invalidation processing is performed by locking a database which is locked during processing so as to reflect the state of the database at the beginning of processing, and an update log that reflects all updates to the database since the beginning of the preceding processing cycle. In another method, invalidation processing uses the database while it is freely updated during said processing, and the update log of the database.