Sciweavers

6495 search results - page 1196 / 1299
» Modeling Multidimensional Databases
Sort
View
HAIS
2010
Springer
14 years 2 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
MDM
2010
Springer
301views Communications» more  MDM 2010»
14 years 2 months ago
Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services
Abstract—Location obfuscation using cloaking regions preserves location anonymity by hiding the true user among a set of other equally likely users. Furthermore, a cloaking regio...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...
BICOB
2009
Springer
14 years 2 months ago
Computational Prediction of Genes Translationally Regulated by Cytoplasmic Polyadenylation Elements
Cytoplasmic post-transcriptional modification of mRNA transcripts in the form of polyadenylated (poly(A)) tails plays a key role in their translational control. The timing and degr...
Eric C. Rouchka, Xiangping Wang, James H. Graham, ...
EDBT
2009
ACM
112views Database» more  EDBT 2009»
14 years 2 months ago
GCIP: exploiting the generation and optimization of integration processes
As a result of the changing scope of data management towards the management of highly distributed systems and applications, integration processes have gained in imporuch integrati...
Matthias Böhm, Uwe Wloka, Dirk Habich, Wolfga...
EDBT
2009
ACM
81views Database» more  EDBT 2009»
14 years 2 months ago
Exploiting similarity-aware grouping in decision support systems
Decision Support Systems (DSS) are information systems that support decision making processes. In many scenarios these systems are built on top of data managed by DBMSs and make e...
Yasin N. Silva, Muhammad U. Arshad, Walid G. Aref
« Prev « First page 1196 / 1299 Last » Next »