Sciweavers

1542 search results - page 229 / 309
» Using Queries to Improve Database Reverse Engineering
Sort
View
SIGMOD
2009
ACM
167views Database» more  SIGMOD 2009»
15 years 10 months ago
Exploring schema repositories with schemr
Schemr is a schema search engine, and provides users the ability to search for and visualize schemas stored in a metadata repository. Users may search by keywords and by example ?...
Kuang Chen, Jayant Madhavan, Alon Y. Halevy
HAIS
2010
Springer
15 years 2 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
CIKM
2005
Springer
15 years 3 months ago
Generating better concept hierarchies using automatic document classification
This paper presents a hybrid concept hierarchy development technique for web returned documents retrieved by a meta-search engine. The aim of the technique is to separate the init...
Razvan Stefan Bot, Yi-fang Brook Wu, Xin Chen, Qua...
AINA
2007
IEEE
15 years 4 months ago
Using Web Directories for Similarity Measurement in Personal Name Disambiguation
In this paper, we target on the problem of personal name disambiguation in search results returned by personal name queries. Usually, a personal name refers to several people. The...
Quang Minh Vu, Tomonari Masada, Atsuhiro Takasu, J...
VLDB
2007
ACM
115views Database» more  VLDB 2007»
15 years 3 months ago
The Boundary Between Privacy and Utility in Data Publishing
We consider the privacy problem in data publishing: given a database instance containing sensitive information “anonymize” it to obtain a view such that, on one hand attackers...
Vibhor Rastogi, Sungho Hong, Dan Suciu