Sciweavers

32 search results - page 2 / 7
» Real-time data attack isolation for commercial database appl...
Sort
View
DSD
2010
IEEE
190views Hardware» more  DSD 2010»
13 years 5 months ago
Hardware-Based Speed Up of Face Recognition Towards Real-Time Performance
— Real-time face recognition by computer systems is required in many commercial and security applications because it is the only way to protect privacy and security in the sea of...
I. Sajid, Sotirios G. Ziavras, M. M. Ahmed
GI
2000
Springer
13 years 9 months ago
Taming the Tiger: How to Cope with Real Database Products in Transactional Federations for Internet Applications
Data consistency in transactional federations is a key requirement of advanced E-service applications on the Internet, such as electronic auctions or real-estate purchase. Federat...
Ralf Schenkel, Gerhard Weikum
POPL
2006
ACM
14 years 5 months ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
13 years 11 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
SIGMOD
2008
ACM
143views Database» more  SIGMOD 2008»
14 years 5 months ago
Middleware-based database replication: the gaps between theory and practice
The need for high availability and performance in data management systems has been fueling a long running interest in database replication from both academia and industry. However...
Emmanuel Cecchet, George Candea, Anastasia Ailamak...