Filters








36,586 Hits in 8.6 sec

Information Extraction

Sunita Sarawagi
2007 Foundations and Trends in Databases  
The automatic extraction of information from unstructured sources has opened up new avenues for querying, organizing, and analyzing data by drawing upon the clean semantics of structured databases and  ...  We survey techniques for optimizing the various steps in an information extraction pipeline, adapting to dynamic data, integrating with existing entities and handling uncertainty in the extraction process  ...  First, I would like to thank Surajit Chaudhuri for getting me to take a break from research and spend time on the survey instead.  ... 
doi:10.1561/1900000003 fatcat:bw42p45zkbgajmroydls2m2giq

Efficient Information Extraction Based on Signature Index

Canghong Jin, Minghui Wu, Zemin Liu, Shiwen Cheng
2015 International Journal of Database Theory and Application  
Information Extraction (IE) is an essential tool to retrieve structured information from at text (including web-content).Given a pattern query, an ideal IE application should be able to extract the matched  ...  Hence, iExtractor can validate query pattern in signature index without original text. The framework also supports on-line extraction through a general and flexible pattern extraction language.  ...  There is an obvious deficit of the approaches: for the queries in the pre-defined set they need to do a brute-force match involving a parse and check (using techniques such as wrapper-generation) over  ... 
doi:10.14257/ijdta.2015.8.2.04 fatcat:etfxbudrlvabpposilxjrqel7a

A Review on Image Retrieval Techniques

M.S. Meharban, Dr.S. Priya
2016 Bonfring International Journal of Advances in Image Processing  
Rapid and explosive growth of digital libraries due to the invention of Web cameras, digital cameras, and mobile phones equipped with such devices is making the database management by human annotation  ...  In this paper presents techniques for extracting low level features, various distance measures for measuring the similarity of image and performance measures.  ...  The CBIR system offers an easy way for a user to search a digital image from a large database [1] .  ... 
doi:10.9756/bijaip.8136 fatcat:xx7qitoxjfb4rnxuedxcbkcgim

Data mining: concepts and techniques

2012 ChoiceReviews  
Thus, Solution is to have a separate database system which supports primitives and structures suitable to store, access and process OLAP specific data ... in short...have a data warehouse.  ...  Use of OLAP query on OLTP system degrades its performance. 2. An OLAP query reads HUGE amount of data and generates the required result. The query is very complex too.  ...  • Main problems with the existing search approaches: -High ratio of "false hits" (irrelevant information) -Users themselves have to locate and extract the information, from the search results • What a  ... 
doi:10.5860/choice.49-3305 fatcat:tmksf6eodvaspcsun6sj3a5fba

LDAP injection techniques

Jose Maria Alonso, Rodolfo Bordon, Marta Beltran, Antonio Guzman
2008 2008 11th IEEE Singapore International Conference on Communication Systems  
If one of these applications accepts inputs from a client and executes these inputs without first validating them, the attackers are free to execute their own queries and therefore, to extract, modify  ...  In this paper a deep analysis of the LDAP injection techniques is presented. Furthermore, a clear distinction between classic and blind injection techniques is made.  ...  To access a database, users have to connect to one of these applications and to submit queries trough them to the database.  ... 
doi:10.1109/iccs.2008.4737330 fatcat:pdksksalyjd6nhtxpk5nlil7ba

LDAP Injection Techniques

Jose Maria ALONSO, Antonio GUZMAN, Marta BELTRAN, Rodolfo BORDON
2009 Wireless Sensor Network  
If one of these applications accepts inputs from a client and executes these inputs without first validating them, the attackers are free to execute their own queries and therefore, to extract, modify  ...  In this paper a deep analysis of the LDAP injection techniques is presented. Furthermore, a clear distinction between classic and blind injection techniques is made.  ...  To access a database, users have to connect to one of these applications and to submit queries trough them to the database.  ... 
doi:10.4236/wsn.2009.14030 fatcat:pmbxnqfbibfcjlvkuj4adqxsca

Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database [article]

Vrushali Randhe, Archana Chougule, Debajyoti Mukhopadhyay
2013 arXiv   pre-print
Reverse Proxy is a technique which is used to sanitize the users inputs that may transform into a database attack.  ...  In this framework we include detection and sanitization of the tainted information being sent to the database and innovate a new prototype.  ...  Web Service Oriented XPATH Authentication Technique does not directly allow to access database in database server. SQLProb [6] approach is fully modular.  ... 
arXiv:1311.6578v1 fatcat:feum6lwqxrcu7bhanslodgmyn4

Databases Attacks and Defence Techniques

2019 University of Thi-Qar journal  
This paper will review in detail the main database security techniques and outline to some extent the ways in which databases are attacked.  ...  It allows those in possession an easy way to retrieve and maintain the information as well as organise and manipulate the data when necessary.  ...  The database industry is growing and new approaches are being created and improvements to existing techniques are being made.  ... 
doi:10.32792/utq/utj/vol10/2/3 fatcat:4ajzlj22yjesbj5743egfwz5hy

Web Image Retrieval using Hashing Technique: A Survey

Dattatray Waghole, Rupesh Bagul, Sandeep Turai, Ashwini Dawlekar
2015 International Journal of Engineering Research and  
First step is to retrieve the images from large databases based on the user queries in the form of Textual Information.  ...   Abstract-Web Image retrieval, is an effective approach to regain the effective results for image searched by the users with the help of queries.  ...  The semantic feature of the web images are related to the visual oriented information to be re-ranked can be considerably lessened down by the qualm keyword given by the user.  ... 
doi:10.17577/ijertv4is020855 fatcat:4hlbcnwllnb4zeqescf7odq7vy

Database techniques for the World-Wide Web

Daniela Florescu, Alon Levy, Alberto Mendelzon
1998 SIGMOD record  
Acknowledgements The authors are grateful to the following colleagues who provided suggestions and comments on earlier versions of this paper: Serge Abiteboul, Gustavo Arocena, Paolo Atzeni, Jos e B l  ...  a k eley, N i c k Kushmerick, Bertram Lud ascher, C.  ...  A second trend that will a ect the applicability of database techniques for querying the web is the growth of the so-called hidden web.  ... 
doi:10.1145/290593.290605 fatcat:sn73hqmulvdkzc3p33fygnj2ca

Semantic Web Techniques for Yellow Page Service Providers [article]

Raghu Anantharangachar, Ramani Srinivasan
2012 arXiv   pre-print
Use of web pages providing unstructured information poses variety of problems to the user, such as use of arbitrary formats, unsuitability for machine processing and likely incompleteness of information  ...  In some cases, human intermediaries accessible over the phone network examine a centralized database and use their reasoning ability to deal with the user's need for information.  ...  In addition, the database users use the web as a pipe for carrying information. Semantic web brings a new vision of having web scale information repositories.  ... 
arXiv:1208.1886v1 fatcat:iflolnt4wfb7rlmgc6a5owe5aq

IVSS Integration of Color Feature Extraction Techniques for Intelligent Video Search Systems [article]

Avinash N Bhute, B. B. Meshram
2013 arXiv   pre-print
As large amount of visual Information is available on web in form of images, graphics, animations and videos, so it is important in internet era to have an effective video search system.  ...  In this paper we are recommending a system that will search for relevant video using color feature of video in response of user Query.  ...  So to obtain the exact and accurate result from a video database we are using an integrated approach of color feature extraction methods where we are providing options to user to select any of combination  ... 
arXiv:1312.6782v1 fatcat:dwoaxxlifvgrdka3cqqkwd36p4

Survey of Techniques for Deep Web Source Selection and Surfacing the Hidden Web Content

Khushboo Khurana, M.B. Chandak
2016 International Journal of Advanced Computer Science and Applications  
The paper discusses various techniques that can be used to surface the deep web information and techniques for Deep Web Source Selection.  ...  Enormous data is available in deep web that can be useful to gain new insight for various domains, creating need to access the information from the deep web by developing efficient techniques.  ...  Hidden Web content can be accessed by Deep Web Crawlers that can fill and submit forms to query the online databases for information extraction.  ... 
doi:10.14569/ijacsa.2016.070555 fatcat:yb6ffo7nv5gv3aorditiarfeca

Semantic Web Techniques for Yellow Page Service Providers

Raghu Anantharangachar
2012 International journal of Web & Semantic Technology  
We view this design as one in which vendors and end-users do the bulk of the work in building large distributed collections of information in a Web 2.0 style.  ...  Use of web pages providing unstructured information poses variety of problems to the user, such as use of arbitrary formats, unsuitability for machine processing and likely incompleteness of information  ...  information unrelated to his original search. • The users need to extract relevant fragments of information from each web site, and synthesize answers to their questions.  ... 
doi:10.5121/ijwest.2012.3304 fatcat:by4u4vixhrfzzdzlcple5fjr5q

A Survey of Text Question Answering Techniques

Poonam Gupta, Vishal Gupta
2012 International Journal of Computer Applications  
QA systems give the ability to answer questions posed in natural language by extracting, from a repository of documents, fragments of documents that contain material relevant to the answer.  ...  It involves information technology, artificial intelligence, natural language processing, knowledge and database management and cognitive science.  ...  The latest approach taken to matching the user needs is to carry out actual investigation of the question from a linguistic point of view and to attempt to understand what the user really means.  ... 
doi:10.5120/8406-2030 fatcat:pzhcq4v44rhltjsnesw7cqan24
« Previous Showing results 1 — 15 out of 36,586 results