Track 5 | Database and Database Management |
Hiding Sensitive Association Rules to Maintain Privacy and Data Quality in Database | |
Efficient Iceberg Query Evaluation Using Compressed Bitmap Index by Deferring Bitwise-XOR Operations | |
Prevention of SQL Injection Attack Using Query Transformation and Hashing | |
Simulation and Analysis of Performance Prediction in Distributed Database Design Using OO Approach | |
A Survey of Query Log Processing Techniques and Evaluation of Web Query Intent Identification | |
Mechanism for Inserting/Updating and Security Preservation in Anonymous Medical Database | |
Result Prediction System for Multi-Tenant Database of University |