Sciweavers

10210 search results - page 291 / 2042
» Configuring Database Systems
Sort
View
ACSAC
2007
IEEE
15 years 9 months ago
Database Isolation and Filtering against Data Corruption Attacks
Various attacks (e.g., SQL injections) may corrupt data items in the database systems, which decreases the integrity level of the database. Intrusion detections systems are becomi...
Meng Yu, Wanyu Zang, Peng Liu
AVI
2000
15 years 4 months ago
A Visual Tool for Querying Geographic Databases
To support users in querying geographic databases we have developed a system that lets people sketch what they are looking for. It closes the gap between user and information syst...
Andreas D. Blaser, Max J. Egenhofer
112
Voted
IWRT
2008
15 years 4 months ago
Tag Loss Probability Evaluation for a Continuous Flow of Tags in the EPC-Global Standard
Abstract. This paper addresses the evaluation of a passive RFID system under a continuous flow of tag arrivals and departures, for instance, in a conveyor belt installation. In suc...
Javier Vales-Alonso, M. Victoria Bueno-Delgado, Es...
PUK
2001
15 years 4 months ago
Web-based Commerce of Complex Products and Services with Multiple Suppliers
The sales of customisable products and services over the internet is a challenging task within the area of electronic commerce. In this chapter we will present a case study which s...
Liliana Ardissono, Alexander Felfernig, Gerhard Fr...
104
Voted
SIGMOD
1998
ACM
126views Database» more  SIGMOD 1998»
15 years 7 months ago
DataSplash
Database visualization is an area of growing importance as database systems become larger and more accessible. DataSplash is an easy-to-use, integrated environment for navigating,...
Chris Olston, Allison Woodruff, Alexander Aiken, M...