Traditionally, the goal of benchmarking a software system is to evaluate its performance under a particular workload for a fixed configuration. The most prominent examples for eva...
Carsten Binnig, Donald Kossmann, Tim Kraska, Simon...
We present a practical protection mechanism against SQL injection attacks. Such attacks target databases that are accessible through a web frontend, and take advantage of flaws in...
Retrieving images by content and forming visual queries are important functionality of an image database system. Using textual descriptions to specify queries on image content is ...
David Wai-Lok Cheung, Chi-Hung Lee, Vincent T. Y. ...
Distributed database applications are a wide use of distributed systems. One of the major advantages of distributed database systems is the potential for achieving high availabili...
This paper stresses the contribution of the process of knowledge discovery in databases for the effective creation and sharing of organizational knowledge. The focus on the proces...