Sciweavers

680 search results - page 120 / 136
» Implementing database operations using SIMD instructions
Sort
View
SAC
2009
ACM
14 years 3 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
BMCBI
2005
137views more  BMCBI 2005»
13 years 8 months ago
ArrayQuest: a web resource for the analysis of DNA microarray data
Background: Numerous microarray analysis programs have been created through the efforts of Open Source software development projects. Providing browser-based interfaces that allow...
Gary L. Argraves, Saurin D. Jani, Jeremy L. Barth,...
SOSP
2003
ACM
14 years 5 months ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...
SIGMOD
2002
ACM
112views Database» more  SIGMOD 2002»
14 years 8 months ago
Minimal probing: supporting expensive predicates for top-k queries
This paper addresses the problem of evaluating ranked top-? queries with expensive predicates. As major DBMSs now all support expensive user-defined predicates for Boolean queries...
Kevin Chen-Chuan Chang, Seung-won Hwang
ICDCS
2006
IEEE
14 years 2 months ago
PRINS: Optimizing Performance of Reliable Internet Storages
Distributed storage systems employ replicas or erasure code to ensure high reliability and availability of data. Such replicas create great amount of network traffic that negative...
Qing Yang, Weijun Xiao, Jin Ren