Results 101 to 110 of about 195,011 (308)
An attack on MySQL's login protocol [PDF]
The MySQL challenge-and-response authentication protocol is proved insecure. We show how can an eavesdropper impersonate a valid user after witnessing only a few executions of this protocol. The algorithm of the underlying attack is presented. Finally we comment about implementations and statistical results.
arxiv
SchemaDB: Structures in Relational Datasets [PDF]
In this paper we introduce the SchemaDB data-set; a collection of relational database schemata in both sql and graph formats. Databases are not commonly shared publicly for reasons of privacy and security, so schemata are not available for study. Consequently, an understanding of database structures in the wild is lacking, and most examples found ...
arxiv
Forecasting heart failure: Seasonal alignment of heart failure outcomes in New York
Abstract Background Seasonal variations have been observed in heart failure (HF) hospitalization. Numerous explanatory mechanisms have been proposed, but no prior studies have examined potential contributors directly. Our objective was to identify specific factors that could contribute to seasonal variability using a large longitudinal dataset of HF ...
Prerna Gupta+5 more
wiley +1 more source
Teacher Monitoring Application in Teaching Based on CodeIgniter Framework in High Schools
This is Teacher monitoring in teaching at one Karawang Middle School, is needed to monitor teachers in teaching in class so it can be seen whether the teacher often does teaching and learning activities or not, teachers do not always attend school then ...
Syahri Susanto, Bayu Priyatna
doaj +1 more source
CNS Technology Website Administrative Guide (Version 1.0) [PDF]
Air Force Office of Scientific Research (F49620-01-1-0397); National Science Foundation (SBE-0354378); Office of Naval Research (N00014-01-1-0624)
Carpenter, Gail A.+5 more
core +1 more source
BestConfig: Tapping the Performance Potential of Systems via Automatic Configuration Tuning
An ever increasing number of configuration parameters are provided to system users. But many users have used one configuration setting across different workloads, leaving untapped the performance potential of systems.
Bao, Yungang+7 more
core +1 more source
Getting Started with PATSTAT Register [PDF]
This paper provides a technical introduction to the PATSTAT Register database, which contains bibliographical, procedural and legal status data on patent applications handled by the European Patent Office. It presents eight MySQL queries that cover some of the most relevant aspects of the database for research purposes.
arxiv
The network footprint of replication in popular DBMSs [PDF]
Database replication is an important component of reliable, disaster tolerant and highly available distributed systems. However, data replication also causes communication and processing overhead. Quantification of these overheads is crucial in choosing a suitable DBMS form several available options and capacity planning.
arxiv
Benchmark and comparison between hyperledger and MySQL
In this paper, we report the benchmarking results of Hyperledger, a Distributed Ledger, which is the derivation Blockchain Technology. Method to evaluate Hyperledger in a limited infrastructure is developed.
O. Purbo+4 more
semanticscholar +1 more source
This lesson will help you store large amounts of historical data in a structured manner, search and filter that data, and visualize some of the data as a graph.
openaire +3 more sources