An Empirical Study on XML Schema Idiosyncrasies in Big Data Processing
Journal Title: International Journal on Computer Science and Engineering - Year 2015, Vol 7, Issue 10
Abstract
The design and maintenance of the XML schemas for the enterprise, if done incorrectly, can be difficult and frustrating experience. The applications that use XML data binding or participate in the processing of large and complex XML have to quickly adapt to support changing and evolving requirements without forcing each application that exchanges XML data or uses value-objects to upgrade in lock-step. While not ideally suited for the Big Data processing, XML remains the widely accepted data format of choice. This paper provides an overview of the practical techniques and approaches that can help an XML schema author to make intelligent design decisions.
Authors and Affiliations
Dmitry Vasilenko , Mahesh Kurapati
Optimized design of BCD adder and Carry skip BCD adder using reversible logic gates
Reversible logic is very essential for the construction of low power, low loss computational structures which are very essential for the construction of arithmetic circuits used in quantum computation, nano technology an...
Facets of Software Component Repository
The software repository is used for storing, managing, and retrieving large numbers of software components. Repositories should be designed to meet the growing and changing needs of the software development organizations...
DESIGN OF PARAMETER EXTRACTOR IN LOW POWER PRECOMPUTATION BASED CONTENT ADDRESSABLE MEMORY
Content-addressable memory (CAM) is frequently used in applications, such as lookup tables, databases, associative computing, and networking, that require high-speed searches due to its ability to improve application per...
A Content Management System for Building Quality Blogs
the vast amount of information on the World Wide Web is created and published by many different types of providers. Unlike books and journals, most of this information is not subject to editing or peer review by experts....
Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitz’s Method
Elliptic Curve Cryptography recently gained a lot of attention in industry. The principal attraction of ECC compared to RSA is that it offers equal security for a smaller bit size, thereby educing processing overhead. E...