نتایج جستجو برای: sql

تعداد نتایج: 16423  

Journal: :Computational Linguistics 2021

Abstract Text-to-SQL is the problem of converting a user question into an SQL query, when and database are given. In this article, we present neural network approach called RYANSQL (Recursively Yielding Annotation Network for SQL) to solve complex tasks cross-domain databases. Statement Position Code (SPC) defined transform nested query set non-nested SELECT statements; sketch-based slot fillin...

Journal: :Proceedings of the ... AAAI Conference on Artificial Intelligence 2023

Conversational text-to-SQL is designed to translate multi-turn natural language questions into their corresponding SQL queries. Most advanced conversational methods are incompatible with generative pre-trained models (PLMs), such as T5. In this paper, we present a two-stage unified MultI-task Generation frAmework (MIGA) that leverages PLMs’ ability tackle text-to-SQL. the pre-training stage, MI...

2004
Arnon Rosenthal Edward Sciore

ing and Refining Authorization in SQL Arnon Rosenthal, Edward Sciore1 Abstract. The SQL standard specifies authorization via a large set of rather opaque rules, which are difficult to understand and dangerous to change. To make the model easier to work with, we formalize the implicit principles behind The SQL standard specifies authorization via a large set of rather opaque rules, which are dif...

2017
Eric Draken

Relational Algebra (RA) and structured query language (SQL) are supposed to have a bijective relationship by having the same expressive power. That is, each operation in SQL can be mapped to one RA equivalent and vice versa. Actually, this is an essential fact because in commercial database management systems, every SQL query is translated into equivalent RA expression, which is optimized and e...

2014
Bojken Shehu Aleksander Xhuvani

SQL injection is a technique that exploits a security vulnerability occurring in the database layer of an application. The attack takes advantage of poor input validation in code and website administration. It allows attackers to obtain unauthorized access to the back-and database to change the intended application generated SQL queries. Researchers have proposed various solutions to address SQ...

2015
Jaina Patel Jay Dave

Information p lays an important role in our everyday life and databases are widely used for storing and retrieving informat ion. Database technology is having major impact in the world of computing. To access the informat ion from database one need to have knowledge of database query language such as SQL. Because the naïve user may not be aware of the syntax of SQL and structure of database, s/...

2014
Takeshi Matsuda

SQL injection is an attack of type to insert malicious query via an input form on web site. If SQL injection attack were successful, there are the threats of unauthorized access, information leak or falsification of data for web applications driven database system. In the conventional studies, a lot of prevention and detection methods using pattern matching, parsing or machine learning have bee...

Journal: :CoRR 2010
Spits Warnars

Searching learning or rules in relational database for data mining purposes with characteristic or classification/discriminant rule in attribute oriented induction technique can be quicker, easy, and simple with simple SQL statement. With just only one simple SQL statement, characteristic and classification rule can be created simultaneously. Collaboration SQL statement with any other applicati...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید