Sciweavers

3836 search results - page 586 / 768
» Semantics of Database Transformations
Sort
View
KDD
2005
ACM
182views Data Mining» more  KDD 2005»
16 years 4 months ago
Making holistic schema matching robust: an ensemble approach
The Web has been rapidly "deepened" by myriad searchable databases online, where data are hidden behind query interfaces. As an essential task toward integrating these m...
Bin He, Kevin Chen-Chuan Chang
201
Voted
SIGMOD
2007
ACM
124views Database» more  SIGMOD 2007»
16 years 4 months ago
Query suspend and resume
Suppose a long-running analytical query is executing on a database server and has been allocated a large amount of physical memory. A high-priority task comes in and we need to ru...
Badrish Chandramouli, Christopher N. Bond, Shivnat...
PODS
2007
ACM
142views Database» more  PODS 2007»
16 years 4 months ago
Quasi-inverses of schema mappings
Schema mappings are high-level specifications that describe the relationship between two database schemas. Two operators on schema mappings, namely the composition operator and th...
Ronald Fagin, Phokion G. Kolaitis, Lucian Popa, Wa...
ICDM
2009
IEEE
198views Data Mining» more  ICDM 2009»
15 years 10 months ago
Information Extraction for Clinical Data Mining: A Mammography Case Study
Abstract—Breast cancer is the leading cause of cancer mortality in women between the ages of 15 and 54. During mammography screening, radiologists use a strict lexicon (BI-RADS) ...
Houssam Nassif, Ryan Woods, Elizabeth S. Burnside,...
ASWEC
2006
IEEE
15 years 10 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...