Sciweavers

820 search results - page 154 / 164
» Deep web data extraction
Sort
View
SIGMOD
1998
ACM
180views Database» more  SIGMOD 1998»
14 years 2 months ago
Integration of Heterogeneous Databases Without Common Domains Using Queries Based on Textual Similarity
Most databases contain “name constants” like course numbers, personal names, and place names that correspond to entities in the real world. Previous work in integration of het...
William W. Cohen
ACSAC
2004
IEEE
14 years 1 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna
LWA
2008
13 years 11 months ago
Labeling Clusters - Tagging Resources
In order to support the navigation in huge document collections efficiently, tagged hierarchical structures can be used. Often, multiple tags are used to describe resources. For u...
Korinna Bade, Andreas Nürnberger
CSREASAM
2006
13 years 11 months ago
SQL Injection - Threats to Medical Systems: The Issues and Countermeasures
- A vast majority of medical information systems use Standard Query Language databases (SQL) as the underlying technology to deliver medical records in a timely and efficient manne...
Craig Valli
JIPS
2006
110views more  JIPS 2006»
13 years 9 months ago
Monitoring Systems for Embedded Equipment in Ubiquitous Environments
: Accurate and efficient monitoring of dynamically changing environments is one of the most important requirements for ubiquitous network environments. Ubiquitous computing provide...
Ji-Hye Bae, Hee-Kuk Kang, Yoon-Young Park, Jung-Ho...