Sciweavers

782 search results - page 135 / 157
» Query interactions in database workloads
Sort
View
ASWEC
2006
IEEE
14 years 2 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
SIGMOD
2004
ACM
170views Database» more  SIGMOD 2004»
14 years 8 months ago
A Formal Analysis of Information Disclosure in Data Exchange
We perform a theoretical study of the following queryview security problem: given a view V to be published, does V logically disclose information about a confidential query S? The...
Gerome Miklau, Dan Suciu
VRST
2005
ACM
14 years 2 months ago
Search and transitioning for motion captured sequences
Animators today have started using motion captured (mocap) sequences to drive characters. Mocap allows rapid acquisition of highly realistic animation data. Consequently animators...
Suddha Basu, Shrinath Shanbhag, Sharat Chandran
TC
1997
13 years 9 months ago
An Extensible Framework for Repairing Constraint Violations
In this paper we describe a new approach to repairing violations of integrity constraints in databases with null values. By adopting basic concepts from model-based diagnosis, we ...
Michael Gertz, Udo W. Lipeck
CG
2010
Springer
13 years 8 months ago
An evaluation of descriptors for large-scale image retrieval from sketched feature lines
We address the problem of fast, large scale sketch-based image retrieval, searching in a database of over one million images. We show that current retrieval methods do not scale w...
Mathias Eitz, Kristian Hildebrand, Tamy Boubekeur,...