The research community has noted the need to retrieve the instance level of an ontology from bulk data stored in external data sources (e.g., a relational database), in order to de...
: Documents such as spreadsheets are easy to create, edit, and exchange. However, their use causes a set of well known problems such as poor data quality, lack of multi user suppor...
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
Abstract— We have developed log-based recovery for middleware servers that access back-end transaction systems (DBMSs). Transactional consistency is provided between in-memory st...
Flexible and effective indexing of video data so as to render it useful in automated inference and datadriven knowledge acquisition is a key problem in knowledge engineering. In t...
Jie Bao, Yu Cao, Wallapak Tavanapong, Vasant Honav...