The exemplary embodiment relates to processing in n-ary trees. It finds particular application in connection with an apparatus and method for representing the structure of an XML document, allowing large tree structures to be stored using less memory than other approaches.
The Extensible Markup Language (XML) is a widely used extensible language which aids information systems in sharing structured data, encoding documents, and serializing data. XML provides a basic syntax for sharing information between different computers, different applications, and different organizations without needing to pass through many layers of conversion. XML documents are stored in the form of a tree where each of a set of nodes is connected directly or indirectly to a root node and each node can have at most one parent node. Data, such as lines of text, is associated with at least some of these nodes. In the case of, for example, books such as manuals, the tree structure can be very large.
It is often desirable to store large XML trees in memory for manipulation (e.g., swapping the position of two sibling nodes, adding nodes, or deleting nodes). If the representation of the tree structure is larger than the available physical memory, then only a portion of the tree can be loaded in memory. Should a user wish to work on a portion of the tree not currently in memory, then the user will have to wait while the portion of the tree not stored in memory is loaded into memory. Therefore, it would be advantageous to have as efficient a representation of the XML tree in memory as possible while still being able to manipulate the tree. Any efficiency in the representation of the XML tree in memory would allow a larger XML tree to be manipulated in memory for a given amount of memory. In addition, a more efficient representation of XML could take up less space in non-volatile storage, for example on a hard disk.
The following references, the disclosures of which are incorporated herein in their entireties by reference, are mentioned:
U.S. Pub. No. 2010/0241950, filed Mar. 20, 2009, entitled XPATH-BASED DISPLAY OF A PAGINATED XML DOCUMENT, by Meunier; U.S. application Ser. No. 13/090,378, filed Apr. 20, 2011, entitled LEARNING STRUCTURED PREDICTION MODELS FOR INTERACTIVE IMAGE LABELING, by Mensink, et al.; U.S. application Ser. No. 13/103,216, filed May 9, 2011, entitled METHOD AND SYSTEM FOR SECURED MANAGEMENT OF ONLINE XML DOCUMENT SERVICES THROUGH STRUCTURE-PRESERVING ASYMMETRIC ENCRYPTION, by Vion-Dury; U.S. Pub. No. 2007/0150443, filed Dec. 22, 2005, entitled DOCUMENT ALIGNMENT SYSTEMS FOR LEGACY DOCUMENT CONVERSIONS, by Bergholz, et al.; and U.S. Pat. No. 7,769,781, filed May 23, 2007, entitled METHOD FOR LABELING DATA STORED IN SEQUENTIAL DATA STRUCTURES WITH PARAMETERS WHICH DESCRIBE POSITION IN A HIERARCHY, by Huntley.
In accordance with one aspect of the exemplary embodiment, a computer-implemented method for encoding nodes of a tree structure is provided. The method includes receiving nodes of a tree structure into memory. With a processor, for each node of at least one node in the tree structure, a numeric encoding is created. This includes assigning an encoding value to the node, a root node N0 having a fixed encoding value and any other node Nj having an encoding value which is a function of an encoding value of its parent node and an integer k, where Nj is the kth child of the parent node. The encoding is output.
In accordance with another aspect of the exemplary embodiment, a system for encoding a tree structure includes a processor and memory which stores instructions which are executed by the processor. The instructions include an encoding component for encoding each node of at least one node of a tree structure, the encoding of a root node N0 having a fixed value and the encoding of any other node Nj having a value which is a function of a value of its parent node and a value k, where Nj is the kth child of the parent node.
In accordance with another aspect of the exemplary embodiment, a computer-implemented method for representing a tree structure includes receiving a tree structure representing an extensible markup language document and, with a processor, for each node to be encoded of at least one node in the tree structure, creating a numeric encoding. This includes assigning an encoding to the node to be encoded, the encoding of a root node N0 being [[N0]]=0 and the encoding of any other node Nj being [[Nj]]=2k[[Ni]]+2k−1 where Nj is the kth child of Ni, k being 1 if Nj is a first child. A counter is assigned to the node to be encoded, the counter counting a number of steps from the root node to the node to be encoded along a path which includes for each node in the path, any earlier siblings of the node. An index into a data structure storing a set of indicative set nodes is assigned. The index indicates which node of an indicative set of nodes corresponds to the node to be encoded. The counter and the index are output as a key pair for the node.
In accordance with another aspect of the exemplary embodiment, a decomposition method includes receiving a user selected node of a tree structure and retrieving an encoding for the node from memory, each node of the tree having a unique numerical encoding, a root node N0 of the tree structure having a fixed encoding value and any other node Nj of the tree structure having an encoding value which is a function of an encoding value of its parent node and an integer k, where Nj is the kth child of the parent node. The encoding is decomposed with a decomposition function which identifies a path from the node to a root node of the tree.
Aspects of the exemplary embodiment relate to a system and method for arithmetically encoding nodes of a tree structure, such as of an XML document. Aspects also relate to a tree structure whose nodes are encoded by the method, and to a system and method for using the encoding, for example, to manipulate the tree structure, and for decoding a path of a node to its root node, based on the encoding.
Some introductory terminology and notation will help more clearly describe the embodiments.
An ordinal tree T will be syntactically denoted with the following grammar in which Ni stands for any node having unique index i≧0 and k represents any integer such that k≧1:
T::=Ni[T1 . . . Tk] node having k ranked children
T::=Ni terminal node
Ranking means that the child nodes are ordered as they appear in the input document. An “earlier” child node thus refers to a node which appears before a “later” one of its siblings in the document. Using this grammar, the ranked tree of
N0[N1N2[N3N4]N5] Example 1
With reference to
Each node is given an index, which can be shown as subscripts. In the example tree, the first node (or root) N0 (100), has 3 children: N1 (101), N2 (102), and N5 (105). The open bracket before N1 and the closed bracket after N5 show that they are children of N0. Nodes N3 (103) and N4 (104) are children of node N2 (102). Nodes N1 (101), N3 (103), N4 (104), and N5 (105) are all terminal nodes.
A ranked child relation, written as
indicates that node Nk is the jth child of node Ni. Without any indicated rank, Ni→Nk indicates that Nk is a child of Ni. For example,
(N1 is the first child of N0) and
(N4 is the second child of N2) both hold for the tree of Example 1 and
Similarly, the descendant relation N0N4 indicates that node N4 is a descendant of N0. A path can also be indicated using this notation, with
being shorthand for
Path structures without reference to a node can be written as X/Y to indicate the Yth child of the Xth child. For example, 2/3 indicates the third child of the second child. In
In addition to ranked child and descendant relations, there is also a following sibling relation denoted NiNj, which indicates that Ni and Nj have a common father and that Ni is a later child than Ni. Similarly, the n-following sibling function,
means that node Nj is the nth node after Ni. Syntactically, this function can be represented as:
The Encoding Method
In one aspect of the exemplary embodiment, a method of computing the encoding of nodes of a tree structure is a recursive method, as shown in
In the exemplary embodiment, the encoding method assigns a unique integer to each node of the tree using a recursively defined encoding function 306:
Briefly, this means that the root node is assigned a value of 0 and for all other nodes Nj, the value is dependent on the value of k (which indicates which child this is of the parent) and the value which has been assigned to its parent node Ni. As will be appreciated, the root node could be assigned a fixed value other than 0.
For example, given the tree in
[[N2]]=22[[0]]+22−1=2
Knowing the value for N2, the value of its children can be computed. For example, for node N4 (k=2):
[[N4]]=22[[2]]+22−1=10
As will be appreciated, the encodings may be stored as binary numbers. It may be observed that the first child of a parent node (e.g., N1 (101) or N3 (103) in
N00[N11N22[N35N410]N54] Encoding of Example 1
This encoding is unique. For proof, it can be noted that, for all k>0, k′>0, α>0, and β>0:
2kα+2k−1=2k′β+2k′−1α=βΛk=k′
This can be demonstrated by case analysis on k and k′ (k=1, k≧2; k′=1, k′≧2) and using the fact that an odd number cannot equate to an even number.
In another embodiment, the encoding function may be used in an event-based encoding system where a parsing engine 310 (
+N0+N1−N1+N2+N3−N3+N4−N4−N2+N5−N5−N0 Example 2
Pseudo-code of a method to process this event stream using two encoding functions is presented in Algorithm 1.
Referring to
If there was a first tag, the method tests to see if the tag is an open or close tag at S411. If the tag is an open tag, then the node data is stored and the encoding E is appended to an array corresponding to the tree at S412. Step S412 in
If at S411, the tag is a close tag rather than an open tag, the method decrements level, which corresponds to the first line of the −X function in the pseudocode. Continuing with the pseudocode and step S424, the method checks if level equals pLevel and, if so, at S426 the method trims bitwise the trailing zeros of E (while (E mod 2==0) do {E:=E/2}) to get the encoding of the parent. Since the encodings are stored as binary numbers, trimming the binary number 100 (corresponding to 4) results in the binary encoding of 10 (corresponding to 2 in decimal numbers). The variable pLevel is also decremented at S426. This is the end of the pseudocode function X. The method then attempts to get the next tag. If level was not equal to pLevel, the method proceeds directly to attempting to get the next tag and the method returns to S408, and the method is repeated, until there are no more tags to process.
As will be appreciated the method of
The values of the variables from executing the method shown in
Compression
In one embodiment, the encoding [[N]] disclosed above may be stored in a compressed manner (at S224,
The representation (encoding) of the tree can be compressed using indicative sets, which is advantageous because the encoding of nodes of the tree can grow quickly. As an example, using 32 bit unsigned integers to encode a node at a depth of 16 levels, the maximum number of sibling nodes that could be encoded is 16.
Because the indicative set captures the whole topology of a tree, nodes occurring along the path from the root to an indicative set member node do not need their entire encoding stored. For any node, it is sufficient to store the encoding for the nearest indicative set member node and a number of unfolding steps from the indicative set member node to the node along a zigzag (stepped) path defined by a decomposition function, discussed later. Briefly, each unfolding step is either a step to a previous sibling or, for first siblings, a step up to the parent. The zigzag path thus includes, for each node on the path, any earlier siblings that the node may have. This zigzag path is labeled 110 in
While an array is exemplified, it is to be appreciated that the node encodings can be stored in any suitable data structure 308 (
Encoding with Compression
In one embodiment, the compression may be performed as part of the encoding step.
The method starts at S500. In step S502, the tree structure is loaded by a parsing engine 310 (
If the tag is an open tag, the method proceeds to the open tag procedure shown in
If the tag is a close tag, the method proceeds to the close tag procedure, also depicted in
Turning now to
At step S514, the method tests whether level is greater than pLevel, indicating that this node is a first child. If level is greater than pLevel, then at step S516, E and pLevel are incremented. Processing then proceeds to step S518, where sibling is set to 1, level is incremented, and zzCpt is incremented. This corresponds to the end of the “+X” function. Processing then proceeds to step S520 (
It should be noted that in this method it is advantageous to calculate the number of unfolding steps (zzCpt) from the root rather than from the leaf. If the total number of unfolding steps to an indicative set member is stored with the indicative set element's encoding, the number of unfolding steps can be calculated by subtracting the unfoldings zzCpt to the node from unfoldings to the indicative set element.
In the exemplary embodiment, the index to the member of the indicative set is assigned to corresponding nodes before the encoding of the member of the indicative set has been calculated. This can be done because the next index into the indicative set array will correspond to the nodes currently being parsed. For example, if node N4 of
Continuing with
As those skilled in the art will understand, the methods of
The values of the variables from executing the pseudocode over the tree of Example 2 and
Once the encoding 304 of a tree structure 10 (e.g., generated according to any of the methods shown in FIGS. 2 and 4-6), and any associated hash table or array 308 have been stored, the encoding can be used in a method of use, as illustrated in
The method begins at S700. At S702, an encoding for a tree structure 10 is retrieved. At S704, the hash table or array 308, if any, may also be retrieved. At S706, a node N may be selected by a user. At S708, the encoding E of node N is retrieved. At S710, data corresponding to node N may be retrieved by looking up E in the hash table or by retrieving the Eth element of the array. At S712, E is decoded using decomposition functions 307 stored in memory 324 or 302 (
Decodinq the Relative Path (S712)
The encoding of a particular node contains the relative path from the node to its root. The decoding of this encoding may be performed with a decoding function 307 to reconstruct the path. The decoding function may be a sequence decomposition function S defined as:
The above function returns the encodings of the nodes going from a node encoded by β to the root along a path going from a node to its preceding sibling, repeating this until the first sibling is reached, then to the parent of that sibling, and then repeating the process until the root node, encoded by 0, is reached. For example, for the tree of
The sequence decomposition of the unique encoding of the node allows the recursive enumeration of all preceding sibling nodes and parent nodes along the path to the root node.
Properties of Encodings
If two nodes of two different trees have the same path to their respective root nodes, they will have the same encoding. To illustrate this, let “≈” define equivalence between an encoding and the path described by the sequence decomposition. This equivalence relation can be defined:
In the above equivalence relation, A is an encoding, β is the encoding after a decomposition, and k is the last element of the path. That is, if X is the path 2/2/2, and Y is the path 2/2, and k is 2, X can be written as Y/k.
Applying the equivalence relation to 10≈1/2/2 shows that 10 is equivalent to the path 1/2/2:
The node encoding allows checking of useful topological properties over nodes of the tree arithmetically. The sibling relation can be verified by computing the greatest common divisor (gcd). The gcd of two sibling nodes must be a power of 2:
Additionally, the earlier sibling will have the lower encoding value. Hence, the following sibling function NiNj can be checked directly through successive integer divisions by two. This is computationally efficient in base two systems because it is only a bitwise right shift.
followingSibling(Nix,Njy)∃n>0|y/x=2n
followingSibling(Nix,Njy,n)y/x=2n
Because the following sibling always has a higher encoding, this can be used to optimize algorithms when many nodes are to be checked. By construction, a node Nj is a child of node Ni if [[Nj]] is a multiple of [[Ni]]+1. Moreover, the multiple must be a power of 2:
The descendant relation can be recursively built upon on the child relation:
desc(Nix,Njy)∃Nkz|child(Nix,Nkz)∇desc(Nkz,Njy)
desc(Nix,Njy,1)child(Nix,Njy)
desc(Nix,Njy,n+1)∃Nkz|child(Nix,Nkz)∇desc(Nzz,Njy,n)
Conversely, the ascendant relation can be recursively built on the parent relation:
asc(Nix,Niy)∃|parent(Nix,Nkz)∇asc(Nkz,Njy)
asc(Nix,Njy,1)parent(Nix,Njy)
asc(Nix,Njy,n+1)∃|parent(Nix,Nkz)∇asc(Nkz,Njy,n)
As shown, all major relations can be translated as arithmetic operations over the numerical code. These operations are highly suitable to sustain fast computation algorithms over n-ary tree structures, such as XML documents.
The methods illustrated in any of FIGS. 2 and 4-7 and Algorithms 1 and 2 may be implemented in a computer program product that may be executed on a computer. The computer program product may comprise a non-transitory computer-readable recording medium on which a control program is recorded, such as a disk, hard drive, or the like. Common forms of non-transitory computer-readable media include, for example, floppy disks, flexible disks, hard disks, magnetic tape, or any other magnetic storage medium, CD-ROM, DVD, or any other optical medium, a RAM, a PROM, an EPROM, a FLASH-EPROM, or other memory chip or cartridge, or any other tangible medium from which a computer can read and use.
Alternatively, the method may be implemented in transitory media, such as a transmittable carrier wave in which the control program is embodied as a data signal using transmission media, such as acoustic or light waves, such as those generated during radio wave and infrared data communications, and the like.
The exemplary method may be implemented on one or more general purpose computers, special purpose computer(s), a programmed microprocessor or microcontroller and peripheral integrated circuit elements, an ASIC or other integrated circuit, a digital signal processor, a hardwired electronic or logic circuit such as a discrete element circuit, a programmable logic device such as a PLD, PLA, FPGA, Graphical card CPU (GPU), or PAL, or the like. In general, any device, capable of implementing a finite state machine that is in turn capable of implementing any of the flowcharts shown in FIGS. 2 and 4-7, can be used to implement the method for encoding and/or decoding a tree structure.
System for Encoding/Decoding Tree Structures
With reference once more to
The various components of the computer 300 may all be connected by the bus 316. The processor 312 executes instructions stored in memory 324 for performing the method outlined in one or more of FIGS. 2 and 4-7. These may include a parsing engine 310 (discussed above) such as a SAX compliant parser, event handler functions 330 for reacting to events generated by the parser, a node encoding component 306 to generate the encoding 304 for at least one node of the tree 10, and a node decoding component 307, for decoding the encoding of a selected node. These software components may be stored in memory storage unit 324, which is communicatively connected with the processor 312 by the bus 316.
The computer system 300 may be a PC, such as a desktop, a laptop, palmtop computer, portable digital assistant (PDA), server computer, cellular telephone, pager, or other computing device or devices capable of executing instructions for performing the exemplary method or methods described herein.
The storage unit 302 may be removable or fixed. The storage unit may store an input tree structure 10, for example a linearized XML document. The storage unit 302 may also store a data structure 304 representing the generated encodings and a data structure 308 such as a hash table for identifying the indicative set member for a node and the number of unfoldings, in the case of compression.
The memory 324 and storage 302 may be separate or combined and may represent any type of tangible computer readable medium such as random access memory (RAM), read only memory (ROM), magnetic disk or tape, optical disk, flash memory, or holographic memory. In one embodiment, the memory 324, 302 comprises a combination of random access memory and read only memory. In some embodiments, the processor 312 and memory 324 may be combined in a single chip. The I/O interface 318 of the computer system 300 may include a network interface to communicate with other devices via a computer network, such as a local area network (LAN), a wide area network (WAN), or the internet, and may comprise a modulator/demodulator (MODEM). The digital processor 312 can be variously embodied, such as by a single-core processor, a dual-core processor (or more generally by a multiple-core processor), a digital processor and cooperating math coprocessor, a digital controller, or the like.
The term “software” as used herein is intended to encompass any collection or set of instructions executable by a computer or other digital system so as to configure the computer or other digital system to perform the task that is the intent of the software. The term “software” as used herein is intended to encompass such instructions stored in storage medium such as RAM, a hard disk, optical disk, or so forth, and is also intended to encompass so-called “firmware” that is software stored on a ROM or so forth. Such software may be organized in various ways, and may include software components organized as libraries, Internet-based programs stored on a remote server or so forth, source code, interpretive code, object code, directly executable code, and so forth. It is contemplated that the software may invoke system-level code or calls to other software residing on the server or other location to perform certain functions.
While the system and method have been described with particular reference to an XML document, it will be appreciated that the methods disclosed herein are also applicable to other tree-based document models, such as, for example, SGML (of which XML is a document type or subset) and HTML (XHTML being a subset of XML). The method would also be useful for general tree structures other than document models.
Storage Requirements with Compression
In one embodiment, the above encoding and compression methods are applied to an XML document, allowing the XML document to be stored using less memory and allow larger trees for a given amount of memory. As a general guideline, if a tree has a depth of G levels and the maximum number of children at each (non-terminal) node is D (degree), the maximum number of nodes of the tree can be computed as:
On such trees, the cardinality of the indicative set is |I|=DG−1, and the size of the code to store each node element of the indicative set is log(D+G) bits. This provides a worst case estimate, as it assumes that the nodes at the maximum depth also have the maximum degree. In order to store the topology of the tree with N nodes and the data associated with each node, the memory stores a table of N node pointers, a table of N index pairs for storing the indicative set and number of unfoldings corresponding to each node, and the indicative set itself.
Assuming a 32 bit computing system, summing these together yields (in bytes):
Conventionally, an array of N elements can be used to store a tree structure of N nodes. Each element of the array will have at least 2 pointers, one for the node data and one for a data structure to capture the tree structure. If the data structure to capture the tree structure is itself an array, those arrays will contain an element to indicate the size of the array, generally also the size of a pointer. The total elements in all the children-storing arrays will be N−1, so the total space used by the pointers, size element, and children arrays will be 2N+N+(N−1)=4N−1. Using linked lists to store the children nodes utilizes two pointers per child node but avoids the size pointer, yielding a size of 2N+2*(N−1), but if doubly linked lists are used the size becomes 6N−3. Of these implementations, only doubly linked lists provide sibling relationship predicates. The memory requirements of a doubly linked list implementation can be compared to the current embodiment using encodings. The calculated memory requirements in megabytes of a linked list implementation and the exemplary encoding embodiment are shown in the Table 3 for trees of maximum depth G and maximum degree D. Table 3 includes a column showing the ratio of the memory consumed by the encoding to the memory consumed by a linked list method. As can be seen, the memory advantage of the encoding is stable as the depth and degree increases, using about 40% of the memory of the linked list implementation.
It will be appreciated that variants of the above-disclosed and other features and functions, or alternatives thereof, may be combined into many other different systems or applications. Various presently unforeseen or unanticipated alternatives, modifications, variations or improvements therein may be subsequently made by those skilled in the art which are also intended to be encompassed by the following claims.
Number | Name | Date | Kind |
---|---|---|---|
6334125 | Johnson et al. | Dec 2001 | B1 |
7769781 | Huntley | Aug 2010 | B1 |
20040107402 | Seyrat et al. | Jun 2004 | A1 |
20070150443 | Bergholz et al. | Jun 2007 | A1 |
20080133583 | Artan et al. | Jun 2008 | A1 |
20090222419 | Lam et al. | Sep 2009 | A1 |
20090222473 | Chowdhury | Sep 2009 | A1 |
20100241950 | Meunier | Sep 2010 | A1 |
Entry |
---|
Benoit, et al., “Representing Trees of Higher Degree”, 1999, Algorithmica, pp. 1-24. |
Jacobson, G., “Space-efficient static trees and graphs”. IEEE, 1989, pp. 549-554. |
Katajainen, et al., “Tree compression and optimization with applications”, International Journal of Foundations of Computer Science, 1990, vol. 1, No. 4, pp. 425-447. |
Makinen, E., “A survey on binary tree codings”, 1991, The Computer Journal, vol. 34, No. 5, pp. 438-443. |
U.S. Appl. No. 13/103,216, filed May 9, 2011, Vion-Dury. |
U.S. Appl. No. 13/090,378, filed Apr. 20, 2011, Mensink, et al. |
Vion-Dury, J., “Diffing, Patching and Merging XML Documents: toward a Generic Calculus of Editing Deltas”, Sep. 2010, ACM Symposium on Document Engineering 2010: pp. 1-11. |
Vion-Dury. “A Generic Calculus of XML Editing Deltas”, DocEng'11, Sep. 19-22, 2011, pp. 1-8. |
Number | Date | Country | |
---|---|---|---|
20130151565 A1 | Jun 2013 | US |