{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T00:28:41Z","timestamp":1777854521161,"version":"3.51.4"},"reference-count":27,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2016,7,10]],"date-time":"2016-07-10T00:00:00Z","timestamp":1468108800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Science"],"published-print":{"date-parts":[[2017,2]]},"abstract":"<jats:p>Detecting differences between XML documents is one of most important research topics for XML. Since XML documents are generally considered to be organized in a tree structure, most previous research has attempted to detect differences using tree-matching algorithms. However, most tree-matching algorithms have inadequate performance owing to limitations in terms of the execution time, optimality and scalability. This study proposes a stream-based difference detection method in which an XML binary encoding algorithm is used to provide improved performance relative to that of previous tree-matching algorithms. A tree-structured analysis of XML is not essential in order to detect differences. We use a D-Path algorithm that has an optimal result quality for difference detection between two streams and has a lower time complexity than tree-based methods. We then modify the existing XML binary encoding method to tokenize the stream and the algorithm in order to support more operations than D-Path algorithm does. The experimental results reveal greater efficiency for the proposed method relative to tree-based methods. The execution time is at least 4 times faster than state-of-the-art tree-based methods. In addition, the scalability is much more efficient.<\/jats:p>","DOI":"10.1177\/0165551515602805","type":"journal-article","created":{"date-parts":[[2015,11,5]],"date-time":"2015-11-05T21:48:22Z","timestamp":1446760102000},"page":"39-53","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":2,"title":["A stream-based method to detect differences between XML documents"],"prefix":"10.1177","volume":"43","author":[{"given":"Bumsuk","family":"Jang","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Konkuk University, South Korea"}]},{"given":"SeongHun","family":"Park","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Konkuk University, South Korea"}]},{"given":"Young-guk","family":"Ha","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Konkuk University, South Korea"}]}],"member":"179","published-online":{"date-parts":[[2016,7,10]]},"reference":[{"key":"bibr1-0165551515602805","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2005.10.002"},{"key":"bibr2-0165551515602805","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12181-9_7"},{"key":"bibr3-0165551515602805","first-page":"519","volume-title":"The 19th international conference on data engineering","volume":"19","author":"Yuan W","year":"2003"},{"key":"bibr4-0165551515602805","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2002.994696"},{"key":"bibr5-0165551515602805","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2005.06.006"},{"key":"bibr6-0165551515602805","volume-title":"The 3rd Twente student conference on IT","author":"Peters L","year":"2005"},{"key":"bibr7-0165551515602805","first-page":"21","volume":"18","author":"Cob\u00e9na G","year":"2002","journal-title":"Journ\u00e9es Bases de Donn\u00e9es Avanc\u00e9es \u2013 BDA"},{"key":"bibr8-0165551515602805","doi-asserted-by":"publisher","DOI":"10.1007\/BF01840446"},{"key":"bibr9-0165551515602805","unstructured":"Schneider J, Takuki K, Peinter D, Kyusakov R. Efficient XML Interchange (EXI) Format 1.0 (2nd edition), W3C Candidate Recommendation, 11 Feburary 2014, http:\/\/www.w3.org\/TR\/exi\/ (accessed July 2014)."},{"key":"bibr10-0165551515602805","unstructured":"The TV-Anytime Metadata specification, http:\/\/www.tv-anytime.org\/ (accessed July 2014)."},{"key":"bibr11-0165551515602805","first-page":"128","volume-title":"International conference on information and knowledge management","volume":"1","author":"Tolga B","year":"1997"},{"key":"bibr12-0165551515602805","doi-asserted-by":"publisher","DOI":"10.1145\/322033.322044"},{"key":"bibr13-0165551515602805","doi-asserted-by":"publisher","DOI":"10.1145\/1166160.1166183"},{"key":"bibr14-0165551515602805","first-page":"493","volume-title":"Proceedings of the ACM SIGMOD international conference on management of data","volume":"25","author":"Sudarshan C","year":"1996"},{"key":"bibr15-0165551515602805","first-page":"438","volume-title":"19th International conference on software engineering and knowledge","author":"Cordeiro dos Santos R","year":"2007"},{"key":"bibr16-0165551515602805","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(77)90064-3"},{"key":"bibr17-0165551515602805","doi-asserted-by":"publisher","DOI":"10.1145\/322139.322143"},{"key":"bibr18-0165551515602805","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099693"},{"key":"bibr19-0165551515602805","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30480-7_29"},{"key":"bibr20-0165551515602805","first-page":"90","volume-title":"VLDB \u201899 Proceedings of the 25th international conference on very large data bases","author":"Sudarshan C","year":"1999"},{"key":"bibr21-0165551515602805","first-page":"581","volume-title":"VLDB \u201801 Proceedings of the 27th international conference on very large data bases","author":"Marian A","year":"2001"},{"key":"bibr22-0165551515602805","first-page":"699","volume-title":"IADIS international conference on WWW\/Internet","author":"Suzuki N","year":"2002"},{"key":"bibr23-0165551515602805","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.09.044"},{"key":"bibr24-0165551515602805","first-page":"25","author":"Globa L","year":"2011","journal-title":"Metody Informatyki Stosowanej"},{"key":"bibr25-0165551515602805","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(92)90136-J"},{"key":"bibr26-0165551515602805","doi-asserted-by":"publisher","DOI":"10.1007\/BF01975866"},{"key":"bibr27-0165551515602805","doi-asserted-by":"publisher","DOI":"10.1109\/TSSC.1968.300136"}],"container-title":["Journal of Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0165551515602805","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/0165551515602805","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0165551515602805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T23:09:22Z","timestamp":1777504162000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/0165551515602805"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,10]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["10.1177\/0165551515602805"],"URL":"https:\/\/doi.org\/10.1177\/0165551515602805","relation":{},"ISSN":["0165-5515","1741-6485"],"issn-type":[{"value":"0165-5515","type":"print"},{"value":"1741-6485","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,10]]}}}