One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
In this paper, we present an online citation entry clustering system based on three-tier clustering. The objective is to further process search results returned by bibliography dat...
Recent work on information integration has yielded novel and efficient solutions for gathering data from the World Wide Web. However, there has been little attention given to the ...
Greg Barish, Dan DiPasquo, Craig A. Knoblock, Stev...
In a video database, large amount of information involving video, audio, and/or images needs to be stored and managed. Therefore, there is an important need for novel techniques a...
For an increasing number of modern database applications, efficient support of similarity search becomes an important task. Along with the complexity of the objects such as images...