Sciweavers

10210 search results - page 363 / 2042
» Configuring Database Systems
Sort
View
JNCA
2006
86views more  JNCA 2006»
15 years 3 months ago
Real-time data attack isolation for commercial database applications
Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
Peng Liu, Hai Wang, Lunquan Li
IMCSIT
2010
15 years 1 months ago
Quality Benchmarking Relational Databases and Lucene in the TREC4 Adhoc Task Environment
The present work covers a comparison of the text retrieval qualities of open source relational databases and Lucene, which is a full text search engine library, over English docume...
Ahmet Arslan, Ozgur Yilmazel
SIGMOD
2012
ACM
275views Database» more  SIGMOD 2012»
13 years 6 months ago
Computational reproducibility: state-of-the-art, challenges, and database research opportunities
Computational experiments have become an integral part of the scientific method, but reproducing, archiving, and querying them is still a challenge. The first barrier to a wider...
Juliana Freire, Philippe Bonnet, Dennis Shasha
ICSE
2004
IEEE-ACM
16 years 3 months ago
Static Checking of Dynamically Generated Queries in Database Applications
Many data-intensive applications dynamically construct queries in response to client requests and execute them. Java servlets, e.g., can create string representations of SQL queri...
Carl Gould, Zhendong Su, Premkumar T. Devanbu
ICMCS
2005
IEEE
89views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Semantic Knowledge Building for Image Database by Analyzing Web Page Contents
In this paper, we present a method of semantic knowledge building for image database by extracting semantic meanings from Web page contents. The novelty of our method is that it i...
Yung-Kwang Lai, Song Liu, Liang-Tien Chia, Syin Ch...