Sciweavers

478 search results - page 39 / 96
» A Perspective on Inductive Databases
Sort
View
ACMSE
2006
ACM
14 years 1 months ago
Application layer intrusion detection for SQL injection
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Frank S. Rietta
ACNS
2006
Springer
86views Cryptology» more  ACNS 2006»
13 years 11 months ago
Efficient Memory Bound Puzzles Using Pattern Databases
CPU bound client puzzles have been suggested as a defense mechanism against connection depletion attacks. However, the wide disparity in CPU speeds prevents such puzzles from being...
Sujata Doshi, Fabian Monrose, Aviel D. Rubin
DEXAW
1996
IEEE
79views Database» more  DEXAW 1996»
13 years 11 months ago
Managing Multiple Representations of Georeferenced Elements
This paper presents a framework for the management of multiple representations of georeferenced elements in a GIS environment. This solution is presented from a database perspecti...
Claudia Bauzer Medeiros, Marie-Jo Bellosta, Genevi...
PR
2008
79views more  PR 2008»
13 years 7 months ago
Region-based image retrieval with high-level semantics using decision tree learning
Semantic-based image retrieval has attracted great interest in recent years. This paper proposes a region-based image retrieval system with high-level semantic learning. The key f...
Ying Liu, Dengsheng Zhang, Guojun Lu
ER
2006
Springer
112views Database» more  ER 2006»
13 years 11 months ago
Deriving Concepts for Modeling Business Actions
We outline a procedure called communicative and material functions analysis that can be used to derive business modeling concepts. It is rooted in the language-action perspective o...
Peter Rittgen