CA2026253C - Method and apparatus for the naming of database component files to avoid duplication of files - Google Patents

Method and apparatus for the naming of database component files to avoid duplication of files

Info

Publication number
CA2026253C
CA2026253C CA002026253A CA2026253A CA2026253C CA 2026253 C CA2026253 C CA 2026253C CA 002026253 A CA002026253 A CA 002026253A CA 2026253 A CA2026253 A CA 2026253A CA 2026253 C CA2026253 C CA 2026253C
Authority
CA
Canada
Prior art keywords
file
database component
source
name
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CA002026253A
Other languages
French (fr)
Other versions
CA2026253A1 (en
Inventor
Wayne C. Gramlich
Soren J. Tirfing
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sun Microsystems Inc
Original Assignee
Sun Microsystems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sun Microsystems Inc filed Critical Sun Microsystems Inc
Publication of CA2026253A1 publication Critical patent/CA2026253A1/en
Application granted granted Critical
Publication of CA2026253C publication Critical patent/CA2026253C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/164File meta data generation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/174Redundancy elimination performed by the file system
    • G06F16/1748De-duplication implemented within the file system, e.g. based on file segments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/176Support for shared access to files; File sharing support
    • G06F16/1767Concurrency control, e.g. optimistic or pessimistic approaches
    • G06F16/1774Locking methods, e.g. locking methods for file systems allowing shared and concurrent access to files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/31Indexing; Data structures therefor; Storage structures
    • G06F16/316Indexing structures
    • G06F16/319Inverted lists
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99932Access augmentation or optimizing

Abstract

In the method and apparatus of the present invention a file to be added to the database is given a unique name that is dependent upon the contents of the file such that, when the contents of the source file changes, the name of the database component file to be added to the database also changes. Conversely, if two files of the same name have the same information contained therein, the same file name will be generated and the duplication of information in the database is prevented by providing a simple test that checks for the existence of the name of the database file before the generation and addition of the new file to the database. If the file name exists in the database, the information is already contained in the database and the file is not generated and added to the database information. Preferably the name of the file is generated by computing a hash value from the contents of the file and concatenating the hash value to thename of the source file. Because the source file name is used in conjunction with the hash value to construct the database file name, the hash value does not haveto be unique for all files but only for those source files having the same name.

Description

202625s pACK~;ROUND OF THF INVENTION

1. FIFI ~ OF T~F INVFNTIQN:
The method and apparatus of the present invention relates to the organization of databases. More specifically, the method and apparatus of the present invention relates to the organization and identification of database files derived from textual sourc~ files which form the database and the information contained within the database files for optimum retrieval and storage efficiency of textual files.
2. RELAT~D PATENT8:

This application is related to U.S. Patent 5,129,082 entitled "Method and Apparatus for Searching Database Component Files to Retrieve Information from Modified Files", U.S. Patent 5,117,349 entitled "User Extensible, Language Sensitive Database System" and U.S. Patent 5,095,423 entitled "Locking Mechanism for the Prevention of Race Conditions".
3. ART BACKf~ROUND:
A database is a collection of information which is organized and stored in a predetermined manner for subsequent search and retrieval.
Typically, the data is organized in such a manner ~ha~ ~he data is indexed according to certain parameters and can be retrieved according to those parameters. Data oontained in databas~s valy according to thc applications.
For example, a d~tabaso may contain information to index words in a text file such that words or strings of words in the text file may be retrieved quickly.
The data contained in the datab~se may be or~anized in a sin~le file or multiplicity of files for access and retrieval. Sometimes the potential for - æ ~026~53 duplications of files occurs because of the nature of the source information from which the database is derived. Thus, if the source information contains duplicate information the d~t~b?~se may similarly contain duplicate information. One application where this occurs is in the environment of computer program compilers and processes which assist in the indexing and retrieval of source file information in text form according to certain compiler information generated during the process of compilation of the source file.

For example, software developers frequently need to review 10 specific lines or sections of a source code program in textual format that contains a certain variable or symbol (hereinafter referred to collectively as "symbolsn) in order to determine where in the program the symbol occurs and how the value of the symbol changes throughout the execution of the program. One method to provide this capability of search and retrieval is to form a database which 15 contains an index of all the symbols in the source program and the corresponding line numbers in the source files where these symbols appear. However, a source program may be quite large and span not one but a multiplicity of separate files, whereby the files are combined during the compilation process by linking or include statements (such as the ~# include~ statement in the C programming 20 language) located in the main program. Thus, those files which are frequentlyused will be included in the d~teb~se multiple times even though the informationcontained therein is the same.

There is also a need to insure that the d~tAb~se component files 25 which comprise the database match the current version of the source files from which the d~t~h~se component file is derived. The user may inadvertently modify the textual source files from which the database is derived without updating the database component file. Thus, the d~t~b~se may provide incorrect informa' on for the retrieval of text from the source file.

.....

In a multitasking environment, multiple processes or devices may access or attempt to access files simultaneously. A race condition occurs when one process or device attempts to read or write information to a file while another process or device is attempting to write information to the same file.
5 This results in corrupt data being written into the file ancVor corrupt data being read out of the file.

;~

2~26253 SUMMARY OF THE INYENTION
It is therefore an object of the present invention to provide a means for minimizing the duplication of files within a database.

It is an object of the present invention to provide a means for searching for database files and providing the means in certain instances for providing the corresponding portions of the source file when the integrity between the database file and source file is lost.

It is an object of the present invention to provide a means for checking the integrity of the database with the current version of the source file.

It is an object of the present invention to provide a means for preventing errors which arise due to race conditions which occur in a multitasking system.

In the method and apparatus of the present invention a database component file to be added to the database is given a unique name that is dependent upon the contents of the file such that, when the contents of the source file changes, the name of the corresponding database component file to be added to the database also changes. Conversely, if two database compùnent files have identical information contained therein, the same file name will be generated and the duplication of information in the database is prevented by providing a simple test that checks for the existence of the name of the d~t~hase component file before the generation and addition of the file to the d~hase. If the file name exists in the database, the information is already contained in the d~1~base and the file is not generated and added to the d~h~e information.

Preferably'~n~ ni~me of the file is generated by computing a hash value from the sum of the contents of the file and concatenating the hash value to the name of the file. Because the source file name is used in conjunction with the 202~253 hash value to construct the database component file name, the hash value does not have to be unique for all files but only for those source files having the same name. Therefore, the likelihood of conflicts is minimal. In addition, through the selection of heuristic methods for computing the hash value, a high degree of 5 confidence can be maintained that the file names are unique. Furthermore, because the d~t~h~se component file names are unique for each source file, the process of searching for the conect file is simplified and there is no need to specify the locations of database component files, e.g. the directory where the database component file is located, because the file name is unique for a 10 particular file contents and a query or search program can safely assume that any flle with the same name was generated from the same source file.

Each database component file contains information regarding the text contained in one source file which enables the user to quickly determine the 15 frequency of occurrence of the specified text and the location of the specified text in the source file. For each textual word (referred to herein as a ~symbol~), anentry in the database component file is provided containing symbol information.
The symbol information comprises the symbol name, symbol type and line number in the source file where the symbol is located. Line identification 20 information is also provided which contains the line numbers of the source file, the length of the line, (i.e., the number of characters in the line) and corresponding hash values which are computed from the contents of the line of text in the source file. Before a line of text identified in a query is displayed, the line identification information provides the means to verify that the line of text 25 identified in the symbol information is the same line of text as the one now contained in the source file. The hash value and line length corresponding to the lins of tsxt (referenced in the d~t~b~se) is compared to a hash value and line length computed for the text retrieved from the current source file. If the computed hash value and line length do~s not match the hash value and line length 30 contained in the line identification information, the text does not match ths database reference because the source file has been changed subsequent to the generation of the database.

A locking mechanism is also provided which prevents the errors which arise when race conditions occur in S a multi-tasking system by using temporary file names and file directories in conjunction with atomic commands.

Accordingly, in one aspect, the present invention provides in a computer system comprising a CPU, input/output means and memory containing a file system, said file system comprising at least one source file comprising text, a process for generating a database comprising at least one database component file derived from the source files such that one database component file is generated for each unique source file regardless of the number of copies of the source file occurring in a file system, said process comprising the steps of:
generating a unique name for the database component file, said name generated by concatenating the source file name with a hash value computed according to the contents of the source file, whereby if the contents of the source file changes, the hash value changes and a different database component file name is generated;
searching the file system for a database component file having the same name as the generated database component file name;

. ~

if a database component file having the same name as the generated database component file does not exist in the file system, generating a database component file for the source file comprising a listing of symbols and line numbers in the source file where the symbol occurs;
if a database file having the same name as the generated database file exists, a database component file is not generated thereby eliminating the duplication of database component files and the system usage required to write the duplicate file.

In a further aspect, the present invention provides in a computer system comprising a CPU, input/output means and memory containing a file system, said file system comprising at least one source file comprising text, an lS apparatus for generating a database comprising at least one database component file derived from the source files such that one database component file is generated for each unique source file regardless of the number of copies of the source file occurring in the file system, said apparatus comprising:

means for generating a unique name for the database component file, said name generated by concatenating the source file name with a hash value computed according to the contents of the source file, whereby if the contents of the source file changes, the hash value changes and a different database component file name is generated;

.
,,~

means for searching the file system for a database component file having the same name as the generated database component file name;
if a database component file having the same name as the generated database component file does not exist in the file system, means for generating a database component file for the source file comprising a listing of symbols and line numbers in the source file where the symbol occurs.

~ - 6B -:, , -1 2~2~253 .

BRIEF DESCRIPTION OF T~E DRAWINGS
The objects, features and advantages of the present invention will be apparent from the following detailed description in which:

FIGURE 1 is a block diagram of an exemplary computer employed in the present invention.

FIGURE 2 is illustrative of database component files generated according to the present invention.
FIGURES 3a, 3b and 3c illustrate a source file, the database component file generated therefrom according to a preferred embodiment of the present invention and the contents of the database file.

FIGURES 4a, 4b and 4c illustrate the stnJcture of a preferred embodiment of the present invention.

FIGURES 5a and 5b are flow charts of the process of the preferred embodiment of the present invention.
FIGURE 6 illustrates a symbolic link which connects a common database component file to one or more directories in the system.

FIGURE 7 illustrates the implementation of the split function to increase the speed of performing queries on large d~t~h~se component files.

FIGURE 8 is illustrative of a user interface to the system of the present invention.

FIGURE 9 illustrates race conditions which can occur in a multitasking environment.

202~253 g FIGURE 10 is a flow chart illustrating the process for creating a database component file.

FIGURE 11 is a flowchart illustrating the process for issuing a query and building an index file according to a preferred embodiment of the present invention.

G~ 2 5 ~

n FTAILFD D FSCRIPTION OF THF IN V F N Tl O N

Not~tlon And Nomencl~t~re The detailed descriptions which follow are presented largely in 5 terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art.

An algorithm is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. These steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise 15 manipulated. It proves convenient at times, principally for reasons of commonusage, to refer to these signals as bits, values, elements, symbols, characters,terms, numbers, or the like. It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities.
Further, the manipulations performed are often referred to in terms, such as adding or comparing, which are commonly associated with mental operations performed by a human operator. No such capability of a human operator is necessary, or desirable in most cases, in any of the operations 25 described herein which form part of the present invention; the operations aremachine operations. Useful machines for performing the operations of the presentinvention include general purpose digital computers or other similar devices. Inall cases there shouW be borne in mind the distinction between the method of operations in operating a computer and the method of computation itself. The 30 present invention relates to method steps for operating a computer in processing -- lD 2~2~i253 electrical or other (e.g., mechanical, chemical) physical signals to generate other desired physical signals.

The present invention also relates to apparatus for performing these 5 operations. This apparatus may be specially constructed for the required purposes or it may comprise a general purpose computer as selectively activated or reconfigured by a computer program stored in the computer. The algorithms presented herein are not inherently related to a particular computer or other apparatus. In particular, various general purpose machines may be used with 10 programs written in accordance with the teachings herein, or it may prove more convenient to construct more specialized apparatus to perform the required method steps. The required structure for a variety of these machines will appearfrom the description given below.

15 General System Confi~uration Fig. 1 shows a typical computer-based system for d~t~bAses according to the present invention. Shown there is a computer 101 which comprises three major components. The first of these is the input/output (I/O) 20 circuit 102 which is used to communicate information in appropriately structured form to and from thè other parts of the computer 101. Also shown as a part of computer 101 is the central processing unit (CPU) 103 and memory 104. These latter two elements are those typically found in most general purpose computers and almost all special purpose computers. In fact, the several elements 25 contained within computer 101 are intended to be representative of this broadcategory of data processors. Particular examples of suitable data processors to fill the role of computer 101 include machines manufactured by Sun Microsystems, Inc., Mountain View, California. Other computers having like -~ capabilities may of course be adapted in a straightforward manner tc pe;form the 30 functions described below.

:
~` ~ ~

~02~2~3 Also shown in Fig. 1 is an input device 105, shown in typical ~ ' embodiment as a keyboard. It should be understood, however, that the input -~~ device may actually be a card reader, magnetic or paper tape reader, or other well-known input device (including, of course, another computer). A mass -- 5 memory device 106 is coupled to the l/0 circuit 102 and provides additional storage capability for the compu!er 101. The mass memory may include other programs and the like and may take the form of a magnetic or paper tape reader or other well known device. It will be appreciated that the data retained within- mass memory 106, may, in appropriate cases, be incorporated in standard fashion into computer 101 as part of memory 104.

In addition, a display monitor 107 is illustrated which is used to display messages or other communications to the user. Such a display monitor may take the form of any of several well-known varieties of CRT displays. A
1~ cursor control 108 is used to select command modes and edit the input data, .. .. ..
such as, for example, the parameter to query the database, and provides a more convenient means to input information into the system.

Process Descript70n The following description of a preferred embodiment of the present invention will describe the source files as source code files of computer programs. The means for generating the dat~h~-~e files, referred to as the ~collector~, is described as a part of a compiler which compiles the source codeinto object code files. It will be evident to one skilled in the art that the present invention may be applied to all types of text files and is not limited to computer . program source files. Furthermore, the collector function may be combined with -- elements that perform other functions, such as the compiler herein described, or the collector may operate as an independent means.

Referring to Fig. 2, the d~t~h~ase employed to illustrate the present invention is shown. The database compr7ses at least one d~h~e component file (referred to in Fig. 2 as having the suffix ~.bd~ which represents the term~browser data7 and an index file which is used to locate information in the d~t~base component files. Each database component file contains the symbol information and line identification information to provide the capability of 5 browsing or searching one source file in response to a query. The symbols in the source text file may comprise every word in the text file or select text which are identified according to the symbol type. The symbols may be categorized and identified according to the type of source file by employing an interface which specifies the identification of the symbols, such as that described in u . s .
patent 5,177,349 entitled "User Extensible, Language Sensitive Database System".

A database component file is created for each source file and is stored in the current working file directory. This is illustrated in Fig. 2. Sub-directory Source1 contains source files a.c and b.c. A sub-directory .sb is created which contains database files a.c.-.bd and b.c.-.bd and index file Index1.
Sub-directory .sb which is a sub-directory of directory Source2, contains database files e.c.-.W and ~.c.-.bd and index file Index2 which corresponds to source files e.c and f.c contained in directory Source2. As explained in detail below, the ~-~ in the database file name represents a hash value which is incorporated into the file name to provide a unique file name to correspond to the contents of the source file.
This is further illustrated by the example of hgs. 3a and 3b. Flg. 3a shows a text file which is a simple computer program written in the C language comprising a ~printf~ statement and an ~include~ statement which incorporates the 25 file ~stdio.h~ into the program. The d~t~b~se generation means, referred to as the ~collector and in the present example a part of the compiler which compiles the - ~mputer program, generates the d~t~b~se files shown in Fig. 3b. Shown in Fg.
3b are the d~teh~se component files foo.2rBQsT.bd, which is the d~t~b~se component file representative of the linked execu1able file foo.c.luoYuw.bd, 13 ~a~G2~3 which is the database component file representative of the source file "foo.c~, and the database component file stdio.h.OyPdOs.bd for the source file ~stdio.h~,which was incorporated into the program foo.c through the include statement.

Each database component file name includes a hash value which, when combined with the file name of the source file results in a unique file name.
The hash value is computed as a function of the contents of the source file wherein if the contents of the source file changes, the hash code changes. For example the string ~2rBQsr in the d~t~b~se tile name foo.2rBQsT.bd, the string "luoYuw~ in file database name foo.c.luoYuw.bd and the string ~OyPdOs~
database file name stdio.h.OyPdOs.bd are the hash values generated and incorporated into the database file names.

The dat~b~-se component file symbol reference comprises symbol identification information and line identification information. The symbol information consists of a symbol triple containing the symbol name, line number in the source file where the symbol is located, and the symbol type. The line identification information comprises a list of triples, each triple identifying relative line numbers within the source file, length of the line and hash value of the line.
The hash value is computed from the contents of the line of text (e.g. the sum of the bytes in the line); thus, if the contents of the line are modified or the line is moved because of the insertion or deletion of text, the hash value will correspondingly change.

An illustration of the contents of a database component file for the program of Fig. 3a is illustrated in Fig. 3c. The ~symbol table section~ 400 contains the name of the symbols and the location of the symbol in the ~semantictable section~ 410. The semantic table section 410 contains a triple for each use of e-zh~ymbol, identifying the symbol name, the line number in the source file where the symbol is located and the type of the symbol. The line identification 1~ ~Q2~2~

section 420, contains the line number, length and hash value triptes which correspond to the lines of text in the source file.

The index file provides the means for querying or searching the 5 dRtab~se component files for the occurrence of symbols which are the subject of the query. In the present example, the index file contains a list of all symbolsused and the names of the database component files each of the symbols is contained in.

A source comprises one or more text files. These text files may or may not, depending upon the application, be related to one another. For example, a source may consist of text representative of a document such as a book or a magazine article. Separate text files may be created for the differentsections of the document, such as the title, introduction, abstract, bibliography, 15 as well as the body of the document. If the source is a computer program, thesource may comprise a single file containing all the codes for subsequent compilation and execution of the program or the source may be spread among a plurality of files wherein one file contains the code of the main program and other files contain the source code for sub-programs which are referenced in the main 20 program in the form of sub-routine calls or include statements, such as the ~#
include~ statement utilized in the C-programming language.

As each file containing code is compiled, the information to be incorporated into the dat~b~se component file (~.bd file7 is generated. Prior to25 generating the d~t~b~se component file, a unique name is generated for the database component file to be created. The name of the d~t~bRse component file is derived from the name of the text file and a hash value. The hash value is computed as a function of the contents of the file such that if the contents of the text file ch~ g~,s~ .he hash code changes thereby distinguishing between the 30 d~t~b~se component files for different versions of the same text file.

2 ~ 2 ~ 2 ~ 3 In some instances, the same text files may frequently be incorporated into a multiplicity of different sources. For example, with respect to computer program source, the same text files containing declarations which reference sub-programs may be incorporated into the text source files containing5 the code of the main program. To eliminate the duplication of the same det?bese component file in such instances, prior to generating a database component file,the name of the database component file is generated and compared to a list of currently existing database component files. If the name of the d~t~bese component file exists, the database file is not regenerated and duplicated, 10 because the existing database file can be used for the source file. By eliminating duplicate database files, processor overhead and memory used to store the database component file is saved.

The hash value may be generated by any one of many ways which 15 deri~e the hash values from the contents of the database component file. For example, the hash value used to form the database component file name can be computed according to the sum of all the bytes contained in the file.

Preferably, the hash value is a sum of various key pieces of 20 information to be contained in the d~t~h~se component file. For example, if the information to be contained in the d~t~b~se component file is the information shown in Fig. 3c, the hash value would be generated as follows: a separate hash value is computed for each of the sections in the file and the hash value.
incorporated into the file name is the sum of the hash values for each of the 25 sections in the file.

To generate the hash values for each of the sections in the file, certain information is selected from the section and summed together. For example, the magic~h~tnber (the first 2 or 4 bytes in a UNIX~ file), source type ID, 30 major and minor version numbers of the file (e.g. version 2,1), line indicator, case indicator (the case indicator is set if the case of characters is not significant) and 2~2~2~

each character in the language name string are summed to compute a hash value for the section. The hash value tor the source name section is generated from the ASCII value of each character from the file name and the relative field, if the relative field is set to a value of one (the relative field indicates whether the file was identified by a relative path or absolute path). The hash value for thereferenced section is generated from the sum of each hash value for each referenced file and the ASCII value of each character from the name of each referenced file. The hash value for the symbol table section is the sum of the ASCII value of each character from each string in the symbol table section. The record type ID, line number and semantic tag for each record in the semantic table section are summed together to generate the hash value. In addition, the line length and hash value (determined according to the sum of the bytes for theline) for each line in the line ID section are summed and a value of one is added for each line that has its inactive indicator flag set (the inactive indicator is used for debugging tools) to generate the hash value for the line ID section of the - database component file.

Thus, the file name incorporating the hash value would be: ~[source code file name] . [hash value] . bd~. It is preferred for easier identification that the ` 20 suffix ~.bd~ is used to consistently identify those files which are database component files.

To save memory space, simplify the file name generation process and to simplify the query or browse process, it is preferred that the name of the directory in which the d~t~h~se component file resides is not incorporated into the file name. This is possible because each database component file name is unique and relates to a specific text file of the source. Therefore, the query or search program simply searches file directories in the file system until the unique d~t~hase component file nam_ which corresponds to the text file name is found.
To minimize the number of file directories to search for dAt~h~se component files, it is preferred that a means is provided which contains a listing of all directories in MEM~h - 16 - ~""~' "' ' 252~2~3 which database component files are located. The query program will then search for database component files only in those directories listed. Preferably, by default, the query program will search only the current working directory.
. _ Expansion of a search beyond the working directory is then indicated by a specific file recognized by the browser to provide a list of the directories of the file system to search.

- Once the database component file(s) is created, an index file is generated to provide an index into the database component file. The index file contains the symbols (e.g. text) by which a query may be performed and a list ofthe database component files in which each symbol is found.

To query (query may be also referred to as search or browse) a database for a symboi, the index file is reviewed to determine the database - ~~~ ~~~~~ 15 component files of the database, and thus the corresponding text files of the source, the symbol is located in. The database component files containing the symbol are reviewed to retrieve the symbol information contained therein which indicates the location of the symbol in the source text files. The results of the query are then returned to the user; The information retumed may be in a varietyof formats including in the form of a listing of source text files and line numbers where the symbol is located, the lines of text from the file in which the symbol is located or a plurality of lines from the text file surrounding and including the line in which the symbol is located.

Continuing with the present example from Fig.1, if a specific symbol is the subiect of a query and is searched for in the Source1 sub-directory, the index, Index1, will be reviewed to determine which d~t~hase component files the symbol is contained in. If the index file states that the symbol is found in a.c. ~ .bd, that database component file is reviewed to retrieve the symbol information containing the symbol name, line number and symbol type as well as the line length and hash value. The text source file corresponding to the dat~b~e 1~

2~2~3 component file, that is a.c, is reviewed and the line of text at the line numberdes;gnated is retrieved for the user.

If the database component file and index file are generated and the 5 source file is subsequently modified, search errors witl occur unless the database component files and index file are also subsequently updated. To alleviate the effect of an inconsistent database, line identification information is included in the database component files. The line identification information - c-ontains the line number, line length and a hash value generated according to 10 the contents of the line. Prior to the retrieval of lines of text from the source text file, a hash value is computed according to the text at the referenced line number and the line length and computed hash value are respectively compared to the Iine length and hash value stored in the database component file. If the values are equal, the proper line of text has been found and is provided to the user as a 15 result of the query. If one or both values do not match, then the source file has been changed subsequent to the generation of the database file. An error message may then be generated telling the user that the database file needs to be updated. Altematively, if the line of text has been moved to a different line in ' the source text file, it may still be found by comparing the line length and hash 20 value stored in the d~t~b~se file to line lengths and generated hash values for other lines from the source text file to find a match. Preferably, to provide a more accurate match, the line lengths and generated hash values for the lines of textabove and below the line of text to be retneved are compared to the line lengthsand hash values, representative of three sequential lines of text, stored in the25 database component file. Thus, if the line lengths and hash codes of the sequence of three lines of text match a sequence of line lengths and hash valuesstored in the database component file, a match is found and the line(s) of text is - returned to the user as a result of the query.
tr- ~ ~
A preferred embodiment of the present invention is described with reference to Figs. 4a, 4b and 4c. The present invention is preferably divided into . ., " , ~
. ':;''~ ~. ;, ~,...

2G2~253 two tasks or structures (herein referred to as the ~collector~ and ~browser~). In the present example of the preferred embodiment, the source text file comprises textfiles in the form of computer code such as a program written in the C language.
The collector is incorporated into the C language compiler 220. Thus, the 5 compiler 220 generates the compiled or object code 225 and generates the corresponding database component file 230 for the source text file 210. The database component file contains a listing of symbol identification information containing the symbol name, the line number the symbol is located at and the type of symbol. Furthermore, t~e database component file contains line 1 0 identification information, comprising the line number, the length of the line and the hash value generated therefrom. The line identification information, as explained above, is used to check whether the line number identified by the database file is the correct line of text to retrieve from the text file and present to the user as a response to a query.
To perform a query; the browser 240 is employed. The browser 240 generates an index file 250 which provides a reference of symbols and the names of database component files 230 the symbols are contained in. To perform a query, the browser 240 reviews the index file 250 and the d~t~base component 20 files 230 identified in the index file as containing the symbol queried, retrieves the lines of text in the source text file 210 containing the symbol identified in the d~t~hase component file 230 and presents such information as output information 255 to the user.

Fig. 4b illustrates the stnucture of the preferred embodiment, wherein two text files, source file A 260 and source file B 270, fomm the source that is input to compiler 220 to generate the compited code 225 and the detab~se, respectively comprising database component file A 280 and dat~base component file B 290, which are then utilized by .:,e ~rowser 240 to provide theoutput information 255 which comprises the result of a query to the user. It should be noted ~hat only one index file 250 is generated. In as much as text file A and 2~262~3 text file B are contained within the same directory, only one index file is required.
However, i~ the database component files are written to separate directories within the file system, separate index files would be generated.

Fig. 4c illustrates the addition of text file C 300 to the source which, in conjunction with text file A 260 and text file B 270, is compiled by compiler 220 to generate compiler code 225 and, the dat~hase respectively comprising, - database component file A 280, database component file B 290 and d~t~base component file C 310. In as much as text file C 300 is locate~ within a different directory than text file A 260 and text file B 270, two index files are generated, one for each directory. The browser 240 generates two indices, Index1 250 for database component files 280, 290 and Index2 320 for the database component file 310. The browser 240 utilizes to the index files 250, 320 determine the lines of text to be retrieved from the source files 260, 270 and 280 according to the 1 5 query to be presented as output in~ormation 255 to the user.

The process of the preferred embodiment of the present invention is explained with reference to Figs. 5a and 5b. Referring to Flg. 5a, at block 400 the collector generates a unique name to identify the database component file. The d~tab~-ce component file name is a combination of the source text file name concatenated with a hash value which is concatenated with an identification suffix which identifies the file as a database component file (for example, ~.bd~).
The hash value is generated as a function of the contents of the database component file and should be computed in a manner such that if the contents of the file changes the hash value changes. At block 410, the d~t~hace component file name generated is checked against the existing dat~hase component file names. If the database component file name exists, this indicates that a dAt~b~se component file for that particular source text file exists and there is no need to generate another det~h~se component file. If the d~ha~ ~bmponent file name does not exist, at block 420 a dat~h~ce component file identified by the unique dat~h~se component file name is generated.

202~2 ~1 Fig. 5b illustrates the functions that would be performed by the browser element including the generation of the index file and the execution of queries. At block 430 a query is received and at block 440 file directories are examined to determine if an index file needs to be generated or updated. The index is built from scratch if there is no index. The index is updated if there are any database component files that have been created since the last time the index was created/updated. If an index file needs to be generated or updated, atblock 450, the index file is generated or updated. At block 460, the index file is reviewed and the database component file identification information for the symbol, which is the subject of the query, is retneved. This information is thenused at block 470 to access the first database component file identified. At block 475, the line number of the first symbol reference is identified and at block 480, th6 symbol identification and line identification information is retneved from the database component file. At block 490, the corresponding line of text is retrieved from the source file and at block 500 the hash value is computed for the line oftext.

At block 510, the length of the line and hash value computed are compared with the line length and hash value contained in the line identification information retrieved from the database component file. If the two are equal, the -~ line of text containing the symbol which is the subject of the query is output to the - --~ user at block 520. If the line lengths or hash values are not equal, at block 530, a search is attempted through the source file in order to find the line of tQxt which - 25 may have been shiRed due to the insertion andlor deletion of text subsequent to the generation of the d~t~hase file. As described above, this may be done by generating a line length and hash value for each line of the source file and comparing the first length and hash value to the line length and hash value retrieved from the line identi~ic~tion infommation in the det~hase eo~llponent file.
Preferably, this process is per~ormed for three lines of text, the line of text above the line to be retrieved and the line of text below the line to be retrieved. Thus, if _, ~26~133 a sequence of line lengths and corresponding hash values for three sequential lines match those retrieved from the d~t~base component file, the line of text is output to the user as responsive to the query.

At blocks 525 and 527 the process continues for the next line containing the symbol which is the subject of the query until all references in the current database component file and corresponding text file are retrieved. The process continues to the next database component file identified by the index file via blocks 530 and 540 and process through blocks 480 through 530 until the iast database file is reviewed and the query process is completed.

The database files comprising a database generated according to the present invention may reside in a single directory or in multiple directories within the file system. For each text file of the source, the collector will create a corresponding database component file and will, by default, place the det~hase component file into a sub-directory of the current working directory where the source text file is located. Preferably the sub- directories containing the database component files are uniformly identified by the path name [Source Directory Name/.sb. An index file is also located in each dat~hase component file sub-directory providing an index into the database component files located therein.

Though various enhancements to the d~t~hase system of the present invention, a database may be extended and referenced in a variety of 2~ ways.

For example, a single common d~t~hase directory may be employed by all the directories from which source programs are processed ;~ ~ ^ through the collector by installing a reference, referred to as a ~symboii~; ii,l~, 30 between the source files directory and the directory containing tho c~"""on d~h~e component files. This is illustrated in Fig. 6, wherein the main directory 20262~3 ,~ 3 Project contains two sub-directories Source1 and Source2, Source1 containing, source files a.c and b.c and Source2 containing source files e.c and t.c. The corresponding database component files are located in common directory .sb which is a sub-directory of main directory project and contains an index file and 5 database component files a.c.~.W, b.c.-.bd, e.c.~.bd and f.c.~.bd. For example, in the UNIX~ (UNIX is a trademark of AT&T) operating system, a symbolic link may be established by executing the following command:
In -s <directory path name>/.sb Furthermore, when generating database component files, it may be desirable to store the database component file in a directory other than a sub-directo~ of the current working directory. For example it may be desirable to place, in a single directory for easy reference, those database component files commonly referenced by source files located in a plurality of directories. In addition, a query, by default, will review the index file and corresponding cl~t~base component files located in the current working directory. Often, it isdesirable to execute a query on database component files inside as well as outside the current working directory.

A file, having a predetermined identifiable name, referred to in the preferred embodiment as the .sbinit file, is used by the collector and browser to obtain information about the d~t~b~se structure. The .sbinit file contains the commands~import", ~export~ and ~split~.

To query multiple database component files in directories other than the current working directory, the import command is used to indicate to the browser the path names of directories containing d~t~h~se component files outside the current working directory to read each time it performs a query. Thev import command has the forrn~
import ~path~

` ~L¦ 20262~3 where path is the path name to the file directory that contains the .sb sub-directory containing the d~t~h~se component files to be imported. For example, if the current working directory is /project/source1, and the browser is to search project/source2 as well as Iproject/source1 when performing a query, the import 5 command would be:
import /projecVsource2 Similarly, the ~export~ command, may be used to cause the - collector which generates the database component files to store the files in a 10 directory other than the current working directory. The export command identifies the path name and source file name of those source files the database component files of which are to be located in a specified directory. This enables the user to save disk space by placing those database component files associated with identical files in a single database while still retaining distinct 15 databases in separate directories for individual projects. The export command has the form:
export <prefix> into <path name>
thus whenever a collector processes a source file having the path name which starts with <prefix>, the resulting database component file will be stored in 20 <path name>l.sb . For example, to place the database component file created for source files from lusr/include in a .sb sub-directory in the directory project/sys, the export command would be:
export lusrlinclude into /projecUsys .

To improve the performance of the system when working with a large number of dat~base component files, a split function may be implemented.
The split function splits the database component files into an ~old~ group and ~new~ group of database component files whenever the size of the index file ^~-eeds a specified number of bytes indicating that the d~1~b~se is too large toefficiently perform updates within a predetermined period of time. Thus, when the database component files are updated thus requiring that the index file be updated, those source files which have changed subsequent to the last time the database component files were updated are updated and categorized in the ~new~ group of database component files, leaving the remaining databasé
component files in the ~old" group unchanged. Correspondingly, a new index file is created to index the new group of database component files while the index file to the old group of dat~b~se component files remains unchanged. This increases system performance because the time it takes to build the index file is proportional to the number of database files that require indexing. Consequently, it takes less time to build a small index file for the new group of database component files than to rebuild one large index file for the entire group of database component files.
This is illustrated in Fig. 7. The size of the index file in Source1/.sb is larger than the predetermined number of bytes. Thus, the old group of database component files has moved down a sub-directory to Source1/.sb/.sb and a new group of database component files is created comprising those database component files corresponding to source files which have been modified subsequent to the last time the collector process was executed and the database component files were updated. In the present example, only source file a.c has been modified;
therefore the new group of database files in Source1/.sb contains a.c.-.bd and anew index file is created for a.c.~.bd. The split command has the form:
split <size~
where <size> is the size, in bytes, of the d~t~b~se index. When the index file is greater than or equal to <size>, the split function will be initiated.

The information provided to the user indicating the results of the query may take a variety of forms and is implementation dependent. Fig. 8 is an example of a user interface containing information regarding the source file, the parameters of the query, the lines of text from the source file which are returned pursuant to the query and a predetermined number of lines of the source file which ~(~und the line of text which contains the symbol which is the subject of the query.

~( 2~253 The frame header 500 indicates the current working directory. The control sub-window 510 displays the current query information such as the name of the source file containing the current match 540, the query parameter 550, the number of matches (occurrences of the symbol specified by the query), as well ~~~~ 5 as the match currently displayed 560, the identifier or string constant for the current match 570 and the line numbers of text displayed 580. The control sub-window 510 also contains the controls needed to manipulate the browser. For example, the buttons available in the sub-window permits the user to issue qtleries, move between matches, move between queries, delete matches and queries and refine or narrow queries.

The match sub-window 520 displays all matches found by the current query. The information provided for each match includes the name of the file in which the match appears 590, the line number in the file on which the match appears 600, the function in which the match appears 610 (if applicable) and the line of text containing the match 620.

The source sub-window 530 displays a portion of the source file that contains the current match. The match is identified by a marker such as a - 20 black arrow 630. The source sub-window 530 may optionally contain markers in the form of gray arrows 640 to identify other matches found during the current or other queries.

Thus a user, by using the user interface such as the one shown in 25 Fig. 8, can perform a variety of tasks employing the system of the present invention, including issuing queries, modifying queries, modifying the d~t~hesessearched, as well as reviewing the results of the queries. As is apparent to oneskilled in the art, the user interface can be tailored to each implementation toinclude additior^' ' nctionality or tools for the user to refine his queries, as well 30 as to modify the information content and o,yanizalion of information which ispresented to the user to show the results of the queries performed.

2~2~3 The flexibility of the system of the present invention provides for a multitasking capability wherein multiple collectors as well as multiple browsersmay be operating simultaneously on a number of database files. The database 5 files operated on may include duplicate files that are accessed by multiple collectors or browsers. A problem which arises in the multitasking environment is the existence of race conditions. This problem arises when two processes or devices access a single source file or corresponding database component file at ~~ the same time resulting in corrupt data being written into the d~t~h~.se component 10 file and/or corrupt data being read out of the database component file. An - example of the race condition may be explained by reference to Fig. 9. The main directory proiect contain source files ac., b.c and i.h. Source files a.c and b.c contain statements which include file i.h. Thus, if two compilers are initiated to compile files a.c and b.c, both compilers will attempt to generate a d~!~b~se 15 component file for i.h, because i.h is included in source files a.c and b.c. As a - result, both compilers attempt to simuitaneously create i.h.-.bd which may result in corrupted data because both compilers are writing into the same file concurrently. In addition, if two queries are run in parallel and the index for the databases a.c and b.c have not been generated, each query mechanism will 20 initiate a process to build an index. Therefore the index file may contain corrupted data as the result of two processes concurrently writing into the same ., ., . , ., . ~ . _ ~
index file.

To prevent these problems, a process is utilized which employs a 25 lochng mechanism to prevent more than one process from accessing a file at any one time. A sub-directory is created which is referred to by a predetermined name, herein referred to as ~new root~, which is used as part of a lochng mechanism to prevent more than one collector or browser from interacting simultaneously with a ~ ;h~e component file. In conjunction with the specially 30 named sub-directory, a locking mechanism is employed using atomic operations whereby if ~he operation fails, the process step fails and the process will either _ 2~2~2~3 fall to a wait state or an error state (depending upon the application). In addition, the use of this sub-directory provides the means for determining when an index file requires an update to conform to a recent modification of a database component file.

Referring to Fig.,10, the collector, at block 700, prior to generating a database component file, will generate the hash value, combine it with the source file name and check whether the database component file name already exists which indicates that there is no need to generate-a new de~b~se 10 component file. At block 710, the hash value generated and the d~t~h~se component file name generated using the hash value is compared against the existing database file names. If the file name exists, the database already exists and there is no need to generate a new database. If the file name does not exist, at block 720, a sub-directory, which is referred to herein as ~new root~, is 15 created. At block 730, the database file is then generated and placed in the new root directory. During the creation of the database component file, the file is identified by a temporary file name. Preferably the temporary file name is the concatenation of the time the file was opened, the machine ID of the machine thecollector is executing on and the process ID. Thus the temporary file name would20 be [time] [machine ID] [process ID]. lP.

Once the generation of the r~t~ha.ce component file is complete, at block 731, the file is renamed from its temporary file name to its d~base component file name. If, at block 732, the rename operation fails because a file25 with the same dat~hase component file name exists, the system recognizes thatthere is no need to have duplicate files and the file identified by the temporary file name is deleted at block 734. Occasionally while one compiler process is generating a database component file, a browser process will be operating and will determine that an index fil~~rr~eds to be generated or ~Ipd~te~l For e~.,pl~, 30 this may occur when a first d~t~hase component file has been generated and a second database component file is in the process of being generdtsd when an `~ -2~2~2~3 index file is generated. As will be described in detail below, one of the steps in the process for the generation of the index file is to rename the new root directory to ~locked~ and move all the files contained in the locked directory to another directory, referred to herein as ~old root~. Thus the rename file operation to 5 rename the d,atabase component file from a temporary name in new root to the database component file name also in new root will fail if a file with the temporary file name does not exist in new root. At block 736, if the rename operation fails because the file is not found, at block 738 the database component file identified by the temporary fiie name, is moved from the locked directory to the new root 10 sub-directory and is renamed from the temporary file to its database component file name.

Referring to Fig. 11, when the index file is to be generated (in the preferred embodiment, this is performed when a search or query is initiated) at 15 block 740, the sub-directories are checked to determine whether a sub-directory identified as new root exists (block 750). The presence of a directory named newroot indicates that the index Sile needs to be updated Sor the database component file(s) contained therein. At block 760, the new root directory is renamed to a - ' second predetermined sub-directory name, ~locked~. As will be evident 20 subsequently, this protects against access and use of the dat~b~se files contained therein until such time that the index file is completely generated. If, at block 765, the rename operation fails because a locked directory already exis!s,this indicates that an index build.is in progress and the current process has towait until the index build is complete. Therefore, at block 767, the current 25 process puts itself ~to sleep~ (i.e. suspends itself) for a predetemmined time period (e.g. 10 seconds). At the end of the time period, the process returns to block 750 and checks to see if the new root directory still exists. This process continuesuntil the locked diectory no longer exists. At block 760, once the rename operator is executed to rename ~new .u-.. to ~locked', at block 770, the 30 database component files are moved out of the ~locked~ directory to a sub-directory having a third predetermined name, in the present example, ~old root~, MFll~h - ~4 -202~2S3 and the index file is generated. At block 775, any IP files which may exist are also transferred out of the locked directory to a new root directory which already exists or is created by the process.

Once the files are transferred and the index file is generated, the operation is complete. To indicate the operation is complete to other processes attempting to access the database files, at block 780, the locked directory is removed from the file system. Thus, if a subsequent process performs a search and looks for the new root directory, it will find that none exist, indicating that the index file is up to date and a new index file does not need to be generated.

When a query is initiated and the browser attempts to access a database component file while a new index file is being generated, it will be prevented from doing so because an index file does not exist and a search for the new root directory will fail (because it has been renamed to ~locked"). Thus, the rename directory operation, which is an atomic operation, will fail and the process will either remain in a wait state (i.e. ~put itself to sleep~) until it can perform the operation or will branch on an error condition or to a predeterminedstate such as waiting for ~ccess. Preferably the browser process will be put into a wait state for a predetermined time period, e.g. 10 seconds, check to see if the index file generation process is complete and continue in the wait state for another time period. This process is continued until the index file generation process is complete and the rename operation can be executed.

In addition, if a new new root directory is created during the index build process, and another query is issued, the second query will also be put into a wait state and suspend its index rebuild until the locked directory is removed.

While the invention has been d~ed in conjunction with the preferred embodiment, it is evident that numerous alternatives, modifications, variations and uses will be apparent to those skilled in the art in light of the foregoing description.

Claims (18)

1. In a computer system comprising a CPU, input/output means and memory containing a file system, said file system comprising at least one source file comprising text, a process for generating a database comprising at least one database component file derived from the source files such that one database component file is generated for each unique source file regardless of the number of copies of the source file occurring in a file system, said process comprising the steps of:
generating a unique name for the database component file, said name generated by concatenating the source file name with a hash value computed according to the contents of the source file, whereby if the contents of the source file changes, the hash value changes and a different database component file name is generated;
searching the file system for a database component file having the same name as the generated database component file name;
if a database component file having the same name as the generated database component file does not exist in the file system, generating a database component file for the source file comprising a listing of symbols and line numbers in the source file where the symbol occurs;

if a database file having the same name as the generated database file exists, a database component file is not generated thereby eliminating the duplication of database component files and the system usage required to write the duplicate file.
2. The process according to claim 1, further comprising the step of:
generating an index file for at least one database component file, said index file comprising a listing of symbols and the name of the database component file the symbol occurs in.
3. The process according to claim 2, further comprising the steps for performing a query for at least one symbol comprising:
reading the index file for the occurrence of the symbol;
if an occurrence of the symbol is found in the index file, reading the database component file, the index file specifies the symbol to be in, to identify the line number in each source file where symbol occurs;
retrieving each line of text in each source file where the symbol occurs identified by reviewing the database component file and providing each line of text to the user as a response to the query.
4. In a computer system comprising a CPU, input/output means and memory containing a file system, said file system comprising at least one source file comprising text, an apparatus for generating a database comprising at least one database component file derived from the source files such that one database component file is generated for each unique source file regardless of the number of copies of the source file occurring in the file system, said apparatus comprising:
means for generating a unique name for the database component file, said name generated by concatenating the source file name with a hash value computed according to the contents of the source file, whereby if the contents of the source file changes, the hash value changes and a different database component file name is generated;
means for searching the file system for a database component file having the same name as the generated database component file name;
if a database component file having the same name as the generated database component file does not exist in the file system, means for generating a database component file for the source file comprising a listing of symbols and line numbers in the source file where the symbol occurs.
5. The apparatus according to claim 4, further comprising:

means for generating an index file for at least one database component file, said index file comprising a listing of symbols and the name of the database component files the symbol occurs in.
6. The apparatus according to claim 5, further comprising a means for performing a query for at least one symbol comprising:
means for reading the index file for the occurrence of the symbol;
if an occurrence of the symbol is found in the index file, means for reading the database component files that the index file specifies each symbol to be in, to identify each source file and line number in each source file where the symbol occurs;
means for retrieving each line of text in each source file where the symbol occurs identified by the means for reviewing the database component file and providing each line of text to the user as a response to the query.
7. The apparatus according to claim 4, wherein the database component file further comprises:
database component file information section comprising a source type ID, version of the database component file, line indicator status, case indicator, and name of language the source file is created in;

source name section comprising the name of the source file;
referenced file section comprising the names of the referenced files;
symbol table section comprising a symbol tables of symbols contained in the source file and line number(s) of the source file where each symbol is located;
semantic table section comprising a record type ID, line number and semantic tag for each line of text; and line identification section comprising the line number, line length, hash value and inactive indicator of each line of text in the source file.
8. The apparatus according to claim 4, wherein the means for searching the file system for a database component file will search a current working directory and any directories and sub-directories specified in a directory listing and provided to the means for searching the file system.
9. The apparatus according to claim 8, wherein the directory listing is located in a predetermined file, the means for searching the file system refers to when searching the file system for a database component file having the same name as the generated database component file name.
10. The apparatus according to claim 4, wherein the database component file for a source file is located in a sub-directory of a directory where the source file is located and is identified by a predetermined sub-directory name.
11. The apparatus according to claim 10, wherein the index file provides an index to the database component files located within the same sub-directory as the index file.
12. The apparatus according to claim 10, wherein said sub-directory comprising database component files is named, [current file directory]/.sb where [current file directory] is the directory path name for the directory containing the source and .sb is the sub-directory identifier.
13. The apparatus according to claim 5, wherein the database component file for a source file is located in a directory separate from a directory where the source file is located.
14. The apparatus according to claim 13, wherein the database component file is located in a directory specified in a second directory listing, said second directory listing comprising source file names and the location in the file system of corresponding database component file names.
15. The apparatus according to claim 14, wherein the second directory listing is located in a predetermined file referred to when a database component file is generated.
16. The apparatus according to claim 4, wherein the hash value is computed according to the sum of the bytes in the database component file.
17. The apparatus of claim 7, wherein said means for generating a hash value generates the hash value as the sum of:
the hash value generated for the database component file information section comprising the sum of the first predetermined number of bytes in the database component file, source type ID, the major and minor version numbers of the file, line indicator and case indicator and each character comprising the name of the language the source is written in;
the hash value generated for the source name section comprising the sum of the value of each character of the file name of the source file;
the hash value generated for the referenced file section comprising the sum of the values of the names of the referenced files;
the hash value generated for the symbol table section comprising the sum of the values of the characters comprising the symbols in the symbol table;

the hash value generated for the semantic table section comprising the sum of the record type ID, line number and semantic tag for each symbol reference; and the hash value generated for the line identification section comprising the sum of the line number, line length, hash value and inactive indicator of each line of text in the source file.
18. The apparatus according to claim 5, said means for generating an index file further comprising a split function means comprising:
means for determining the size of the index file and comparing the size of the index file to be generated to a maximum index file size;
if the size of the index file is greater than or equal to the maximum index file size;
means for establishing a first sub-directory comprising database component files which have not changed subsequent to a prior generation of the index file and the index file generated prior;
means for establishing a second sub-directory comprising database component files which have changed subsequent to a prior generation of the index file;
means to control said means for generating an index file to generate a new index file only for those source files which have changed subsequent to the prior generation of the index file;

whereby the size of the index files generated are maintained below the maximum index file size thereby preventing decrease in processing speed due to the generation of large index files.
CA002026253A 1990-03-27 1990-09-26 Method and apparatus for the naming of database component files to avoid duplication of files Expired - Fee Related CA2026253C (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US07/499,639 US5202982A (en) 1990-03-27 1990-03-27 Method and apparatus for the naming of database component files to avoid duplication of files
US499,639 1990-03-27

Publications (2)

Publication Number Publication Date
CA2026253A1 CA2026253A1 (en) 1991-09-28
CA2026253C true CA2026253C (en) 1997-04-01

Family

ID=23986079

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002026253A Expired - Fee Related CA2026253C (en) 1990-03-27 1990-09-26 Method and apparatus for the naming of database component files to avoid duplication of files

Country Status (5)

Country Link
US (1) US5202982A (en)
JP (1) JP2632092B2 (en)
CA (1) CA2026253C (en)
GB (1) GB2242549B (en)
HK (1) HK52794A (en)

Families Citing this family (148)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5301286A (en) * 1991-01-02 1994-04-05 At&T Bell Laboratories Memory archiving indexing arrangement
DE69225828T2 (en) * 1991-02-27 1998-11-12 Canon Kk Procedure for discovering incorrect overwriting of stored data
DE69227051T2 (en) * 1991-02-27 1999-03-11 Canon Kk Procedure for discovering incorrect overwriting of stored data
CA2067650C (en) * 1991-07-24 1996-10-22 Eric Jonathan Bauer Method and apparatus for operating a computer-based file system
US5301316A (en) * 1991-10-30 1994-04-05 Sun Microsystems, Inc. System for determination of the equivalence of two objects without compromising then done by a third object nominated by one and accetped by the other
US5745902A (en) * 1992-07-06 1998-04-28 Microsoft Corporation Method and system for accessing a file using file names having different file name formats
SE500599C2 (en) * 1992-12-08 1994-07-25 Ellemtel Utvecklings Ab Ways to optimize memory space in a database
US5685003A (en) * 1992-12-23 1997-11-04 Microsoft Corporation Method and system for automatically indexing data in a document using a fresh index table
AU673021B2 (en) * 1992-12-28 1996-10-24 Nec Corporation Management apparatus for volume-medium correspondence information for use in dual file system
JP3402659B2 (en) * 1993-05-13 2003-05-06 オリンパス光学工業株式会社 Image handling equipment
EP0629960B1 (en) * 1993-06-17 2000-05-24 Sun Microsystems, Inc. Extendible file system
DE69413977T2 (en) * 1993-07-01 1999-03-18 Legent Corp ARRANGEMENT AND METHOD FOR DISTRIBUTED DATA MANAGEMENT IN NETWORKED COMPUTER SYSTEMS
US5530849A (en) * 1993-08-16 1996-06-25 Cornell Research Foundation, Inc. Method of reading dynamic, hierarchical file system directories
JPH0778098A (en) * 1993-09-08 1995-03-20 Fujitsu Ltd File management system
US5544051A (en) * 1993-09-17 1996-08-06 Digital Equipment Corporation Document management system using multiple threaded processes and having asynchronous repository responses and no busy cursor
US6012072A (en) * 1993-09-17 2000-01-04 Digital Equipment Corporation Display apparatus for the display of documents in a three-dimensional workspace
WO1995013583A1 (en) * 1993-11-09 1995-05-18 Conner Kenneth H First come memory accessing without conflict
US5572590A (en) * 1994-04-12 1996-11-05 International Business Machines Corporation Discrimination of malicious changes to digital information using multiple signatures
US5537587A (en) * 1994-05-11 1996-07-16 International Business Machines Corporation File record maintenance in a data processing system by synchronization of menus with corresponding data files
US5557790A (en) * 1994-06-21 1996-09-17 International Business Machines Corp. Facility for the generic storage and management of multimedia objects
JP3201945B2 (en) * 1995-01-10 2001-08-27 インターナショナル・ビジネス・マシーンズ・コーポレーション How to compare database tables
EP2270687A2 (en) 1995-04-11 2011-01-05 Kinetech, Inc. Identifying data in a data processing system
US5740430A (en) * 1995-11-06 1998-04-14 C/Net, Inc. Method and apparatus for server-independent caching of dynamically-generated customized pages
US5701498A (en) * 1995-11-17 1997-12-23 International Business Machines Corporation Method and apparatus for a structured ASCII browser for online publications formatted in a bookmaster format
US5713013A (en) * 1996-01-25 1998-01-27 Apple Computer, Inc. System for establishing and enforcing maximum size of directory by preventing the size of the directory from exceeding the set quota size of the directory
US5819291A (en) * 1996-08-23 1998-10-06 General Electric Company Matching new customer records to existing customer records in a large business database using hash key
US7058822B2 (en) 2000-03-30 2006-06-06 Finjan Software, Ltd. Malicious mobile code runtime monitoring system and methods
US6038665A (en) * 1996-12-03 2000-03-14 Fairbanks Systems Group System and method for backing up computer files over a wide area computer network
US5794254A (en) * 1996-12-03 1998-08-11 Fairbanks Systems Group Incremental computer file backup using a two-step comparison of first two characters in the block and a signature with pre-stored character and signature sets
US6061518A (en) * 1997-11-25 2000-05-09 International Business Machines Corporation Data processing system and method for debugging a JavaScript program
US6237035B1 (en) * 1997-12-18 2001-05-22 International Business Machines Corporation System and method for preventing duplicate transactions in an internet browser/internet server environment
US6807632B1 (en) * 1999-01-21 2004-10-19 Emc Corporation Content addressable information encapsulation, representation, and transfer
US6163859A (en) 1998-12-02 2000-12-19 Support.Com, Inc. Software vault
DE19860803A1 (en) * 1998-12-30 2000-07-06 Giesecke & Devrient Gmbh Method of creating a file identifier
US6922708B1 (en) 1999-02-18 2005-07-26 Oracle International Corporation File system that supports transactions
JP3440991B2 (en) * 1999-03-05 2003-08-25 日本電気株式会社 File revision management system
US6549916B1 (en) 1999-08-05 2003-04-15 Oracle Corporation Event notification system tied to a file system
US7280995B1 (en) 1999-08-05 2007-10-09 Oracle International Corporation On-the-fly format conversion
US8335775B1 (en) 1999-08-05 2012-12-18 Oracle International Corporation Versioning in internet file system
US6976165B1 (en) 1999-09-07 2005-12-13 Emc Corporation System and method for secure storage, transfer and retrieval of content addressable information
EP1247221A4 (en) 1999-09-20 2005-01-19 Quintiles Transnat Corp System and method for analyzing de-identified health care data
US6578054B1 (en) * 1999-10-04 2003-06-10 Microsoft Corporation Method and system for supporting off-line mode of operation and synchronization using resource state information
AU7611300A (en) * 1999-11-23 2001-06-04 Microsoft Corporation Content-specific filename systems
US6885481B1 (en) * 2000-02-11 2005-04-26 Hewlett-Packard Development Company, L.P. System and method for automatically assigning a filename to a scanned document
AU2001238269B2 (en) * 2000-02-18 2006-06-22 Emc Corporation Hash file system and method for use in a commonality factoring system
US7509420B2 (en) * 2000-02-18 2009-03-24 Emc Corporation System and method for intelligent, globally distributed network storage
US7185005B1 (en) 2000-05-12 2007-02-27 Oracle International Corporation Nested transactions in a file system
DE10047216A1 (en) * 2000-09-23 2002-04-11 Philips Corp Intellectual Pty A method of detecting write conflicts in replicated databases without memory overhead
US7596564B1 (en) 2000-09-29 2009-09-29 Vignette Corporation Method and system for cache management of a cache including dynamically-generated content
US7058648B1 (en) 2000-12-01 2006-06-06 Oracle International Corporation Hierarchy-based secured document repository
US7194506B1 (en) 2000-12-21 2007-03-20 Vignette Corporation Method and system for cache management of locale-sensitive content
US6850941B1 (en) 2000-12-21 2005-02-01 Vignette Corporation Method and system for native-byte form handling
US6892377B1 (en) * 2000-12-21 2005-05-10 Vignette Corporation Method and system for platform-independent file system interaction
US20020091720A1 (en) * 2001-01-05 2002-07-11 Jun Liu Methods and arrangements for providing improved software version control in managed devices
US7047420B2 (en) 2001-01-17 2006-05-16 Microsoft Corporation Exclusive encryption
US6716102B2 (en) * 2001-03-09 2004-04-06 Microsoft Corporation Method and apparatus for displaying information regarding stored data in a gaming system
US7043637B2 (en) * 2001-03-21 2006-05-09 Microsoft Corporation On-disk file format for a serverless distributed file system
US6981138B2 (en) * 2001-03-26 2005-12-27 Microsoft Corporation Encrypted key cache
US7062490B2 (en) 2001-03-26 2006-06-13 Microsoft Corporation Serverless distributed file system
US6988124B2 (en) 2001-06-06 2006-01-17 Microsoft Corporation Locating potentially identical objects across multiple computers based on stochastic partitioning of workload
US7024452B1 (en) 2001-07-13 2006-04-04 Vignette Corporation Method and system for file-system based caching
US9639547B2 (en) 2001-07-13 2017-05-02 Open Text Sa Ulc Method and system for file-system based caching
US7761497B1 (en) 2001-07-13 2010-07-20 Vignette Software, LLC Storage medium having a manageable file directory structure
US7349942B1 (en) 2002-02-13 2008-03-25 Vignette Corporation Storage medium having a manageable file directory structure
CN1294514C (en) * 2001-08-20 2007-01-10 信息中心科技有限公司 Efficient computer file backup system and method
US20040054656A1 (en) * 2001-08-31 2004-03-18 Arkivio, Inc. Techniques for balancing capacity utilization in a storage environment
US20040039891A1 (en) * 2001-08-31 2004-02-26 Arkivio, Inc. Optimizing storage capacity utilization based upon data storage costs
US7092977B2 (en) * 2001-08-31 2006-08-15 Arkivio, Inc. Techniques for storing data based upon storage policies
WO2003025795A1 (en) * 2001-08-31 2003-03-27 Arkivio, Inc. Techniques for restoring data based on contents and attributes of the data
US20030115204A1 (en) * 2001-12-14 2003-06-19 Arkivio, Inc. Structure of policy information for storage, network and data management applications
US6687793B1 (en) * 2001-12-28 2004-02-03 Vignette Corporation Method and system for optimizing resources for cache management
US7062515B1 (en) * 2001-12-28 2006-06-13 Vignette Corporation System and method for the synchronization of a file in a cache
US6795903B2 (en) * 2002-01-17 2004-09-21 Thomas Licensing S.A. System and method for searching for duplicate data
US6909910B2 (en) 2002-02-01 2005-06-21 Microsoft Corporation Method and system for managing changes to a contact database
US20030200193A1 (en) * 2002-04-17 2003-10-23 Boucher Michael L. Fast retrieval of data stored in metadata
US7505971B2 (en) * 2002-06-28 2009-03-17 Hewlett-Packard Development Company, L.P. Shared drive that provides shared access to editable files in a database
WO2004021225A1 (en) * 2002-08-30 2004-03-11 Arkivio, Inc. Techniques for moving stub files without recalling data
US20040083202A1 (en) * 2002-08-30 2004-04-29 Arkivio, Inc. Techniques to control recalls in storage management applications
CA2506543A1 (en) * 2002-12-02 2004-06-17 Arkivio Inc. Data recovery techniques in storage systems
US8380932B1 (en) 2002-12-13 2013-02-19 Open Text S.A. Contextual regeneration of pages for web-based applications
US8312222B1 (en) 2002-12-13 2012-11-13 Open Text, S.A. Event-driven regeneration of pages for web-based applications
US7818506B1 (en) * 2002-12-13 2010-10-19 Vignette Software Llc Method and system for cache management
US8463998B1 (en) 2002-12-13 2013-06-11 Open Text S.A. System and method for managing page variations in a page delivery cache
US7188216B1 (en) 2002-12-13 2007-03-06 Vignette Corporation Method and system for an extensible caching framework
US7360025B1 (en) 2002-12-13 2008-04-15 O'connell Conleth Method and system for automatic cache management
US7603371B1 (en) * 2002-12-17 2009-10-13 Vignette Corporation Object based system and method for managing information
US20050021566A1 (en) * 2003-05-30 2005-01-27 Arkivio, Inc. Techniques for facilitating backup and restore of migrated files
US20050015409A1 (en) * 2003-05-30 2005-01-20 Arkivio, Inc. Techniques for performing operations on migrated files without recalling data
WO2005001646A2 (en) * 2003-06-25 2005-01-06 Arkivio, Inc. Techniques for performing policy automated operations
US8694510B2 (en) * 2003-09-04 2014-04-08 Oracle International Corporation Indexing XML documents efficiently
US8229932B2 (en) 2003-09-04 2012-07-24 Oracle International Corporation Storing XML documents efficiently in an RDBMS
US7788681B1 (en) 2003-09-16 2010-08-31 Vignette Software, LLC System and method for incorporating web services in a web site
US7644376B2 (en) * 2003-10-23 2010-01-05 Microsoft Corporation Flexible architecture for notifying applications of state changes
US7631310B1 (en) * 2003-11-14 2009-12-08 Google Inc. Loadbalancing multiple files across computing devices
US7444389B2 (en) * 2003-12-09 2008-10-28 Emc Corporation Methods and apparatus for generating a content address to indicate data units written to a storage system proximate in time
US7930277B2 (en) * 2004-04-21 2011-04-19 Oracle International Corporation Cost-based optimizer for an XML data repository within a database
US20070208946A1 (en) * 2004-07-06 2007-09-06 Oracle International Corporation High performance secure caching in the mid-tier
US8095501B1 (en) 2004-07-27 2012-01-10 Infoblox Inc. Automatic enforcement or relationships in a database schema
JP4315876B2 (en) * 2004-08-17 2009-08-19 富士通株式会社 File management program, file management method, and file management apparatus
JP2006059075A (en) * 2004-08-19 2006-03-02 Fuji Xerox Co Ltd Document processor and program
US8725705B2 (en) * 2004-09-15 2014-05-13 International Business Machines Corporation Systems and methods for searching of storage data with reduced bandwidth requirements
US7523098B2 (en) * 2004-09-15 2009-04-21 International Business Machines Corporation Systems and methods for efficient data searching, storage and reduction
US8364631B1 (en) * 2004-09-24 2013-01-29 Infoblox Inc. Database migration
US7383281B1 (en) * 2004-09-24 2008-06-03 Infoblox, Inc. Multiversion database cluster management
US7627547B2 (en) * 2004-11-29 2009-12-01 Oracle International Corporation Processing path-based database operations
US7921076B2 (en) 2004-12-15 2011-04-05 Oracle International Corporation Performing an action in response to a file system event
US8131766B2 (en) * 2004-12-15 2012-03-06 Oracle International Corporation Comprehensive framework to integrate business logic into a repository
US8321439B2 (en) 2004-12-17 2012-11-27 Microsoft Corporation Quick filename lookup using name hash
US7873596B2 (en) 2006-05-23 2011-01-18 Microsoft Corporation Extending cluster allocations in an extensible file system
US8606830B2 (en) 2004-12-17 2013-12-10 Microsoft Corporation Contiguous file allocation in an extensible file system
US9639554B2 (en) 2004-12-17 2017-05-02 Microsoft Technology Licensing, Llc Extensible file system
US7908254B2 (en) * 2005-06-10 2011-03-15 Hewlett-Packard Development Company, L.P. Identifying characteristics in sets of organized items
US7610291B2 (en) * 2005-08-17 2009-10-27 International Business Machines Corporation Logical grouping and management of redundant objects in storage systems
US8073841B2 (en) * 2005-10-07 2011-12-06 Oracle International Corporation Optimizing correlated XML extracts
US8356053B2 (en) * 2005-10-20 2013-01-15 Oracle International Corporation Managing relationships between resources stored within a repository
US8949455B2 (en) 2005-11-21 2015-02-03 Oracle International Corporation Path-caching mechanism to improve performance of path-related operations in a repository
US20070185870A1 (en) 2006-01-27 2007-08-09 Hogue Andrew W Data object visualization using graphs
US8954426B2 (en) * 2006-02-17 2015-02-10 Google Inc. Query language
US20070234278A1 (en) * 2006-03-02 2007-10-04 Microsoft Corporation Managing source code in a model-based development environment
US8185576B2 (en) * 2006-03-14 2012-05-22 Altnet, Inc. Filter for a distributed network
US8954412B1 (en) 2006-09-28 2015-02-10 Google Inc. Corroborating facts in electronic documents
US9183321B2 (en) * 2006-10-16 2015-11-10 Oracle International Corporation Managing compound XML documents in a repository
US7827177B2 (en) * 2006-10-16 2010-11-02 Oracle International Corporation Managing compound XML documents in a repository
US7797310B2 (en) * 2006-10-16 2010-09-14 Oracle International Corporation Technique to estimate the cost of streaming evaluation of XPaths
US9355273B2 (en) 2006-12-18 2016-05-31 Bank Of America, N.A., As Collateral Agent System and method for the protection and de-identification of health care data
JP5020673B2 (en) * 2007-03-27 2012-09-05 株式会社日立製作所 A computer system that prevents the storage of duplicate files
DE102008044808B4 (en) 2007-10-15 2010-01-07 Giesecke & Devrient Gmbh Method for generating program code in an operating system memory and an application memory of a data carrier
JP2009301204A (en) * 2008-06-11 2009-12-24 Hitachi Systems & Services Ltd Document management system
US8156126B2 (en) * 2008-07-14 2012-04-10 Greenbytes, Inc. Method for the allocation of data on physical media by a file system that eliminates duplicate data
US7958112B2 (en) * 2008-08-08 2011-06-07 Oracle International Corporation Interleaving query transformations for XML indexes
US8041893B1 (en) 2008-09-09 2011-10-18 Vignette Software Llc System and method for managing large filesystem-based caches
JP5650982B2 (en) 2010-10-25 2015-01-07 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Apparatus and method for eliminating file duplication
US9600513B2 (en) 2011-06-09 2017-03-21 International Business Machines Corporation Database table comparison
US9552201B2 (en) * 2011-08-31 2017-01-24 Avaya Inc. System and method for incremental software installation
US9218411B2 (en) 2012-08-07 2015-12-22 International Business Machines Corporation Incremental dynamic document index generation
US9659058B2 (en) 2013-03-22 2017-05-23 X1 Discovery, Inc. Methods and systems for federation of results from search indexing
US9880983B2 (en) * 2013-06-04 2018-01-30 X1 Discovery, Inc. Methods and systems for uniquely identifying digital content for eDiscovery
JP5661979B1 (en) * 2014-03-12 2015-01-28 楽天株式会社 Data registration system, data registration method, and program
US9898520B2 (en) 2014-03-25 2018-02-20 Open Text Sa Ulc Systems and methods for seamless access to remotely managed documents using synchronization of locally stored documents
US10394756B2 (en) * 2014-03-28 2019-08-27 Vayavya Labs Private. Limited System and method for customizing archive of a device driver generator tool for a user
US20170213042A1 (en) * 2014-05-07 2017-07-27 Huawei Device Co., Ltd. Data encryption method and encryption apparatus
CN105224572B (en) * 2014-06-30 2019-11-15 北京金山安全软件有限公司 Method and device for identifying garbage catalogue
CN104199863B (en) * 2014-08-15 2017-11-21 小米科技有限责任公司 Lookup method, device and the router of file in storage device
US10346550B1 (en) 2014-08-28 2019-07-09 X1 Discovery, Inc. Methods and systems for searching and indexing virtual environments
US10324802B2 (en) * 2015-05-01 2019-06-18 Ashish Govind Khurange Methods and systems of a dedupe storage network for image management
US10049016B2 (en) * 2015-02-06 2018-08-14 Ashish Govind Khurange Distributed garbage collection for the dedupe storage network
US11003632B2 (en) 2016-11-28 2021-05-11 Open Text Sa Ulc System and method for content synchronization
US11301431B2 (en) 2017-06-02 2022-04-12 Open Text Sa Ulc System and method for selective synchronization

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4611298A (en) * 1983-06-03 1986-09-09 Harding And Harris Behavioral Research, Inc. Information storage and retrieval system and method
US4558413A (en) * 1983-11-21 1985-12-10 Xerox Corporation Software version management system
US4792921A (en) * 1986-03-18 1988-12-20 Wang Laboratories, Inc. Network event identifiers
US5027316A (en) * 1986-09-11 1991-06-25 International Business Machines Corporation Versioning of message formats in a 24-hour operating environment
JP2557239B2 (en) * 1987-11-20 1996-11-27 株式会社日立製作所 In-program data name standardization method

Also Published As

Publication number Publication date
GB2242549B (en) 1993-10-06
HK52794A (en) 1994-06-03
JPH05135108A (en) 1993-06-01
JP2632092B2 (en) 1997-07-16
CA2026253A1 (en) 1991-09-28
GB9016310D0 (en) 1990-09-12
GB2242549A (en) 1991-10-02
US5202982A (en) 1993-04-13

Similar Documents

Publication Publication Date Title
CA2026253C (en) Method and apparatus for the naming of database component files to avoid duplication of files
US5129082A (en) Method and apparatus for searching database component files to retrieve information from modified files
US5095423A (en) Locking mechanism for the prevention of race conditions
US8484638B2 (en) Infrastructure for the automation of the assembly of schema maintenance scripts
US6453310B1 (en) Installable schema for low-overhead databases
US7774772B2 (en) Method and apparatus to perform an application software migration
JP3767699B2 (en) Object link tracking method and system
US6115544A (en) Method and system for displaying error messages
US7152224B1 (en) Versioned project associations
US20040046804A1 (en) User-driven menu generation system with multiple submenus
EP0501613A2 (en) Heterogeneous software configuration management apparatus
AU6429390A (en) A system for program execution on a host data processing machine
US20030037312A1 (en) Documentation generator
US6360218B1 (en) Compact record format for low-overhead databases
Fraser et al. An editor for revision control
Etzel et al. Digital Visual Fortran programmer's guide
US20050044523A1 (en) Method and system for compiling Java code with referenced classes in a workspace environment
Coldea et al. Orcfs: Organized relationships between components of the file system for efficient file retrieval
Kofler Java, JSP, JDBC
US6321223B1 (en) Method of identifying multilingual text for DOS
White Design of a secure file management system
CHEE et al. An installable version control file system for Unix
Kofler Java (JDBC and Connector/J)
Petrick et al. An Analysis of The Definition of a Production Quality Ada Compiler. Volume 2. PQAC Test Suite
White ESD-TR-75-57£ SD ACCESSION LIST, XKRICallNo. _J? iLsfil Copy No. L'f--^ _cyS-DESIGN OF A SECURE FILE MANAGEMENT SYSTEM

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed