Sciweavers

2063 search results - page 147 / 413
» Containment of Aggregate Queries
Sort
View
ISSRE
2008
IEEE
15 years 11 months ago
Automated Fix Generator for SQL Injection Attacks
A critical problem facing today’s internet community is the increasing number of attacks exploiting flaws found in Web applications. This paper specifically targets input valida...
Fred Dysart, Mark Sherriff
PODS
1992
ACM
100views Database» more  PODS 1992»
15 years 8 months ago
On the Equivalence of Recursive and Nonrecursive Datalog Programs
: We study the problem of determining whether a given recursive Datalog program is equivalent to a given nonrecursive Datalog program. Since nonrecursive Datalog programs are equiv...
Surajit Chaudhuri, Moshe Y. Vardi
143
Voted
ICPP
2009
IEEE
15 years 11 months ago
Broker Selection Strategies in Interoperable Grid Systems
—The increasing demand for resources of the high performance computing systems has led to new forms of collaboration of distributed systems such as interoperable grid systems tha...
Ivan Rodero, Francesc Guim, Julita Corbalán...
DKE
2006
122views more  DKE 2006»
15 years 4 months ago
Sampling, information extraction and summarisation of Hidden Web databases
Hidden Web databases maintain a collection of specialised documents, which are dynamically generated in response to users' queries. The majority of these documents are genera...
Yih-Ling Hedley, Muhammad Younas, Anne E. James, M...
159
Voted
PODS
2008
ACM
250views Database» more  PODS 2008»
16 years 4 months ago
Approximating predicates and expressive queries on probabilistic databases
We study complexity and approximation of queries in an expressive query language for probabilistic databases. The language studied supports the compositional use of confidence com...
Christoph Koch