Sciweavers

3305 search results - page 46 / 661
» Can we Rely on SQL
Sort
View
VLDB
2007
ACM
141views Database» more  VLDB 2007»
14 years 1 months ago
Bridging the Application and DBMS Profiling Divide for Database Application Developers
tools for profiling and tuning application code remain disconnected from the profiling and tuning tools for relational DBMSs. This makes it challenging for developers of database ...
Surajit Chaudhuri, Vivek R. Narasayya, Manoj Syama...
ACSAC
2010
IEEE
13 years 5 months ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
ESSOS
2010
Springer
14 years 4 months ago
Idea: Towards Architecture-Centric Security Analysis of Software
Static security analysis of software has made great progress over the last years. In particular, this applies to the detection of lowlevel security bugs such as buffer overflows,...
Karsten Sohr, Bernhard Berger
TIME
2009
IEEE
14 years 2 months ago
Event-Oriented Data Models and Temporal Queries in Transaction-Time Databases
—Past research on temporal databases has primarily focused on state-based representations and on relational query language extensions for such representations. This led to many d...
Carlo Zaniolo
DEXAW
2007
IEEE
141views Database» more  DEXAW 2007»
14 years 1 months ago
SWARD: Semantic Web Abridged Relational Databases
The semantic web represents meta-data as a relation of triples using the RDF data model. We have developed a virtual repository system that enables to process queries to RDF views...
Johan Petrini, Tore Risch