Sciweavers

2737 search results - page 498 / 548
» GenerIE: Information extraction using database queries
Sort
View
SAC
2009
ACM
15 years 4 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
SIGMOD
2009
ACM
171views Database» more  SIGMOD 2009»
15 years 10 months ago
GAMPS: compressing multi sensor data by grouping and amplitude scaling
We consider the problem of collectively approximating a set of sensor signals using the least amount of space so that any individual signal can be efficiently reconstructed within...
Sorabh Gandhi, Suman Nath, Subhash Suri, Jie Liu
KDD
2001
ACM
226views Data Mining» more  KDD 2001»
15 years 2 months ago
Image Mining: Issues, Frameworks and Techniques
Advances in image acquisition and storage technology have led to tremendous growth in significantly large and detailed image databases. These images, if analyzed, can reveal usefu...
Ji Zhang, Wynne Hsu, Mong-Li Lee
ADC
2009
Springer
175views Database» more  ADC 2009»
15 years 4 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang
ADC
2004
Springer
97views Database» more  ADC 2004»
15 years 3 months ago
A Collaborative Approach for Caching Dynamic Data in Portal Applications
Portals are one of the rapidly growing applications on the Web, providing a single interface to access different sources (providers). Providing fast response time is one of the c...
Mehregan Mahdavi, John Shepherd, Boualem Benatalla...