Sciweavers

3935 search results - page 667 / 787
» Database Support for Hypertext
Sort
View
EDBT
2010
ACM
138views Database» more  EDBT 2010»
14 years 3 months ago
How to authenticate graphs without leaking
Secure data sharing in multi-party environments requires that both authenticity and confidentiality of the data be assured. Digital signature schemes are commonly employed for au...
Ashish Kundu, Elisa Bertino
HAIS
2010
Springer
14 years 2 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
BICOB
2009
Springer
14 years 2 months ago
A New Machine Learning Approach for Protein Phosphorylation Site Prediction in Plants
Protein phosphorylation is a crucial regulatory mechanism in various organisms. With recent improvements in mass spectrometry, phosphorylation site data are rapidly accumulating. D...
Jianjiong Gao, Ganesh Kumar Agrawal, Jay J. Thelen...
EDBT
2009
ACM
160views Database» more  EDBT 2009»
14 years 2 months ago
Estimating aggregates in time-constrained approximate queries in Oracle
The concept of time-constrained SQL queries was introduced to address the problem of long-running SQL queries. A key approach adopted for supporting time-constrained SQL queries i...
Ying Hu, Seema Sundara, Jagannathan Srinivasan
EDBT
2009
ACM
121views Database» more  EDBT 2009»
14 years 2 months ago
MarcoPolo: a community system for sharing and integrating travel information on maps
The tagging technique has been widely applied in existing Web 2.0 systems, where users label resources with tags for effective classification and efficient retrieval of resource...
Yueguo Chen, Su Chen, Yu Gu, Mei Hui, Feng Li, Che...