Sciweavers

1445 search results - page 96 / 289
» XPath query containment
Sort
View
CIKM
2008
Springer
14 years 12 months ago
The query-flow graph: model and applications
Query logs record the queries and the actions of the users of search engines, and as such they contain valuable information about the interests, the preferences, and the behavior ...
Paolo Boldi, Francesco Bonchi, Carlos Castillo, De...
ISSRE
2008
IEEE
15 years 4 months ago
Automated Fix Generator for SQL Injection Attacks
A critical problem facing today’s internet community is the increasing number of attacks exploiting flaws found in Web applications. This paper specifically targets input valida...
Fred Dysart, Mark Sherriff
PODS
1992
ACM
100views Database» more  PODS 1992»
15 years 2 months ago
On the Equivalence of Recursive and Nonrecursive Datalog Programs
: We study the problem of determining whether a given recursive Datalog program is equivalent to a given nonrecursive Datalog program. Since nonrecursive Datalog programs are equiv...
Surajit Chaudhuri, Moshe Y. Vardi
DKE
2006
122views more  DKE 2006»
14 years 10 months ago
Sampling, information extraction and summarisation of Hidden Web databases
Hidden Web databases maintain a collection of specialised documents, which are dynamically generated in response to users' queries. The majority of these documents are genera...
Yih-Ling Hedley, Muhammad Younas, Anne E. James, M...
PODS
2008
ACM
250views Database» more  PODS 2008»
15 years 10 months ago
Approximating predicates and expressive queries on probabilistic databases
We study complexity and approximation of queries in an expressive query language for probabilistic databases. The language studied supports the compositional use of confidence com...
Christoph Koch