Backend Database

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 258 Experts worldwide ranked by ideXlab platform

Qiong Luo - One of the best experts on this subject based on the ideXlab platform.

  • APWeb - Template-Based Runtime Invalidation for Database-Generated Web Contents
    Advanced Web Technologies and Applications, 2004
    Co-Authors: Chun Yi Choi, Qiong Luo
    Abstract:

    We propose a template based runtime invalidation approach for maintaining cache consistency of Database generated web contents. In our approach, the invalidator sits between a web cache and a Database server, and intercepts query statements as well as update statements transparently. Moreover, it maintains templates for queries and updates, as well as a mapping between URLs and SQL queries. At runtime, the invalidator checks an update statement against the query statements whose corresponding HTML fragments have been cached, and decides on if any cached HTML fragments should be invalidated based on an extended satisfiability testing algorithm without sending any polling queries to the Backend Database. We further improve the efficiency of this checking process by utilizing the semantic information of the templates. We have integrated our invalidator with the Oracle Web Cache and have conducted extensive experiments using the TPC-W benchmark. Our results show that this approach efficiently maintains the consistency of cached HTML fragments with the Backend Database.

  • Template-based runtime invalidation for Database-generated Web contents
    Lecture Notes in Computer Science, 2004
    Co-Authors: Chun Yi Choi, Qiong Luo
    Abstract:

    We propose a template based runtime invalidation approach for maintaining cache consistency of Database generated web contents. In our approach, the invalidator sits between a web cache and a Database server, and intercepts query statements as well as update statements transparently. Moreover, it maintains templates for queries and updates, as well as a mapping between URLs and SQL queries. At runtime, the invalidator checks an update statement against the query statements whose corresponding HTML fragments have been cached, and decides on if any cached HTML fragments should be invalidated based on an extended satisfiability testing algorithm without sending any polling queries to the Backend Database. We further improve the efficiency of this checking process by utilizing the semantic information of the templates. We have integrated our invalidator with the Oracle Web Cache and have conducted extensive experiments using the TPC-W benchmark. Our results show that this approach efficiently maintains the consistency of cached HTML fragments with the Backend Database.

  • SIGMOD Conference - Middle-tier Database caching for e-business
    Proceedings of the 2002 ACM SIGMOD international conference on Management of data - SIGMOD '02, 2002
    Co-Authors: Qiong Luo, Sailesh Krishnamurthy, Chandrasekaran Mohan, Hamid Pirahesh, Honguk Woo, Bruce G. Lindsay, Jeffrey F. Naughton
    Abstract:

    While scaling up to the enormous and growing Internet population with unpredictable usage patterns, E-commerce applications face severe challenges in cost and manageability, especially for Database servers that are deployed as those applications' Backends in a multi-tier configuration. Middle-tier Database caching is one solution to this problem. In this paper, we present a simple extension to the existing federated features in DB2 UDB, which enables a regular DB2 instance to become a DBCache without any application modification. On deployment of a DBCache at an application server, arbitrary SQL statements generated from the unchanged application that are intended for a Backend Database server, can be answered: at the cache, at the Backend Database server, or at both locations in a distributed manner. The factors that determine the distribution of workload include the SQL statement type, the cache content, the application requirement on data freshness, and cost-based optimization at the cache. We have developed a research prototype of DBCache, and conducted an extensive set of experiments with an E-Commerce benchmark to show the benefits of this approach and illustrate tradeoffs in caching considerations.

Bin Wang - One of the best experts on this subject based on the ideXlab platform.

  • ICICS - An untraceable and server-independent RFID authentication scheme
    2011 8th International Conference on Information Communications & Signal Processing, 2011
    Co-Authors: Bin Wang
    Abstract:

    RFID technology is an object identification technology which will become promising and ubiquitous attracting a lot of research attentions. But due to the open-medium nature of the radio communication and the simple structure of RFID tags, most RFID systems have to be tethered to a Backend Database and prone to tag tracing attacks which will lead to user privacy leakage. In this paper, we propose a RFID authentication scheme which enhances the mobility of the RFID systems by making Backend Database removable and protects user privacy by a label/ID sharing scheme.

Chun Yi Choi - One of the best experts on this subject based on the ideXlab platform.

  • APWeb - Template-Based Runtime Invalidation for Database-Generated Web Contents
    Advanced Web Technologies and Applications, 2004
    Co-Authors: Chun Yi Choi, Qiong Luo
    Abstract:

    We propose a template based runtime invalidation approach for maintaining cache consistency of Database generated web contents. In our approach, the invalidator sits between a web cache and a Database server, and intercepts query statements as well as update statements transparently. Moreover, it maintains templates for queries and updates, as well as a mapping between URLs and SQL queries. At runtime, the invalidator checks an update statement against the query statements whose corresponding HTML fragments have been cached, and decides on if any cached HTML fragments should be invalidated based on an extended satisfiability testing algorithm without sending any polling queries to the Backend Database. We further improve the efficiency of this checking process by utilizing the semantic information of the templates. We have integrated our invalidator with the Oracle Web Cache and have conducted extensive experiments using the TPC-W benchmark. Our results show that this approach efficiently maintains the consistency of cached HTML fragments with the Backend Database.

  • Template-based runtime invalidation for Database-generated Web contents
    Lecture Notes in Computer Science, 2004
    Co-Authors: Chun Yi Choi, Qiong Luo
    Abstract:

    We propose a template based runtime invalidation approach for maintaining cache consistency of Database generated web contents. In our approach, the invalidator sits between a web cache and a Database server, and intercepts query statements as well as update statements transparently. Moreover, it maintains templates for queries and updates, as well as a mapping between URLs and SQL queries. At runtime, the invalidator checks an update statement against the query statements whose corresponding HTML fragments have been cached, and decides on if any cached HTML fragments should be invalidated based on an extended satisfiability testing algorithm without sending any polling queries to the Backend Database. We further improve the efficiency of this checking process by utilizing the semantic information of the templates. We have integrated our invalidator with the Oracle Web Cache and have conducted extensive experiments using the TPC-W benchmark. Our results show that this approach efficiently maintains the consistency of cached HTML fragments with the Backend Database.

Jose Manuel Pardo - One of the best experts on this subject based on the ideXlab platform.

  • Application of Backend Database contents and structure to the design of spoken dialog services
    Expert Systems with Applications, 2012
    Co-Authors: Luis Fernando D'haro, Ricardo De Cordoba, Juan Manuel Montero, Javier Ferreiros, Jose Manuel Pardo
    Abstract:

    Current development platforms for designing spoken dialog services feature different kinds of strategies to help designers build, test, and deploy their applications. In general, these platforms are made up of several assistants that handle the different design stages (e.g. definition of the dialog flow, prompt and grammar definition, Database connection, or to debug and test the running of the application). In spite of all the advances in this area, in general the process of designing spoken-based dialog services is a time consuming task that needs to be accelerated. In this paper we describe a complete development platform that reduces the design time by using different types of acceleration strategies based on using information from the data model structure and Database contents, as well as cumulative information obtained throughout the successive steps in the design. Thanks to these accelerations, the interaction with the platform is simplified and the design is reduced, in most cases, to simple confirmations to the ''proposals'' that the platform automatically provides at each stage. Different kinds of proposals are available to complete the application flow such as the possibility of selecting which information slots should be requested to the user together, predefined templates for common dialogs, the most probable actions that make up each state defined in the flow, different solutions to solve specific speech-modality problems such as the presentation of the lists of retrieved results after querying the Backend Database. The platform also includes accelerations for creating speech grammars and prompts, and the SQL queries for accessing the Database at runtime. Finally, we will describe the setup and results obtained in a simultaneous summative, subjective and objective evaluations with different designers used to test the usability of the proposed accelerations as well as their contribution to reducing the design time and interaction.

  • strategies for accelerating the design of dialogue applications using heuristic information from the Backend Database
    Conference of the International Speech Communication Association, 2009
    Co-Authors: Luis Fernando Dharo, Ricardo De Cordoba, Ruben Sansegundo, Javier Maciasguarasa, Jose Manuel Pardo
    Abstract:

    Nowadays, current commercial and academic platforms for developing spoken dialogue applications lack of acceleration strategies based on using heuristic information from the contents or structure of the Backend Database in order to speed up the definition of the dialogue flow. In this paper we describe our attempts to take advantage of these information sources using the following strategies: the quick creation of classes and attributes to define the data model structure, the semi-automatic generation and debugging of Database access functions, the automatic proposal of the slots that should be preferably requested using mixed-initiative forms or the slots that are better to request one by one using directed forms, and the generation of automatic state proposals to specify the transition network that defines the dialogue flow. Subjective and objective evaluations confirm the advantages of using the proposed strategies to simplify the design, and the high acceptance of the platform and its acceleration strategies. Index Terms: Development Platforms, Automatic Design of Dialogue Systems, Data Mining.

  • INTERSPEECH - Strategies for Accelerating the Design of Dialogue Applications using Heuristic Information from the Backend Database
    2009
    Co-Authors: Luis Fernando D'haro, Ricardo De Cordoba, Rubén San-segundo, Javier Macias-guarasa, Jose Manuel Pardo
    Abstract:

    Nowadays, current commercial and academic platforms for developing spoken dialogue applications lack of acceleration strategies based on using heuristic information from the contents or structure of the Backend Database in order to speed up the definition of the dialogue flow. In this paper we describe our attempts to take advantage of these information sources using the following strategies: the quick creation of classes and attributes to define the data model structure, the semi-automatic generation and debugging of Database access functions, the automatic proposal of the slots that should be preferably requested using mixed-initiative forms or the slots that are better to request one by one using directed forms, and the generation of automatic state proposals to specify the transition network that defines the dialogue flow. Subjective and objective evaluations confirm the advantages of using the proposed strategies to simplify the design, and the high acceptance of the platform and its acceleration strategies. Index Terms: Development Platforms, Automatic Design of Dialogue Systems, Data Mining.

George M. Mohay - One of the best experts on this subject based on the ideXlab platform.

  • ARES - Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks
    2008 Third International Conference on Availability Reliability and Security, 2008
    Co-Authors: M. Kiani, Andrew Clark, George M. Mohay
    Abstract:

    The ubiquity of Web applications has led to an increased focus on the development of attacks targeting these applications. One particular type of attack that has recently become prominent is the SQL injection attack. SQL injection attacks can potentially result in unauthorized access to confidential information stored in a Backend Database. In this paper we describe an anomaly based approach which utilizes the character distribution of certain sections of HTTP requests to detect previously unseen SQL injection attacks. Our approach requires no user interaction, and no modification of or access to, either the Backend Database or the source code of the web application itself. Our practical results suggest that the model proposed in this paper is superior to existing models at detecting SQL injection attacks. We also evaluate the effectiveness of our model at detecting different types of SQL injection attacks.