Academic literature on the topic 'SQL Server (Computer program)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SQL Server (Computer program).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "SQL Server (Computer program)"

1

Li, Xiao Bin, and De Rong Jiang. "Study on CAPP System Based on Rough Set Theory." Advanced Materials Research 219-220 (March 2011): 1060–63. http://dx.doi.org/10.4028/www.scientific.net/amr.219-220.1060.

Full text
Abstract:
As a significant technology of Computer Integrated Manufacturing System (CIMS), Computer Aided Process Planning (CAPP) is the bridge between Computer Aided Design (CAD) and Computer Aided Manufacturing (CAM). Meanwhile, it is a momentous foundation for building the overall information model of manufacturing of engineering product. By using of which along with the theory of rough set in rule reduction of expert system, the development of CAPP system framework is basis of .net platform, utilizing Visual Studio 2003 to design the system interface and associated structured query language (SQL) allow distributed data processing and data access, which is supported by SQL Server 2000. By designing and running the program, the method of designing is verified.
APA, Harvard, Vancouver, ISO, and other styles
2

Zhao, Mei Hong, and Jian Ping Ren. "The Research and Development of an Exam-Integrating System Based on .NET-Test Library." Applied Mechanics and Materials 135-136 (October 2011): 1077–80. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.1077.

Full text
Abstract:
In order to implement Exam-Integrating system with the function of auto generating papers, in this paper, we propose a program which processes the non-text information in the system such as complex formulas and graphics. The program takes model of reflection technology, with the use of ASP .NET technology and SQL Server 2005 database. The system completes both test library by hand and Exam-Integrating by specified parameters, and then generates the paper by automatically computer type setting.
APA, Harvard, Vancouver, ISO, and other styles
3

Andria, Andria, and Ridho Pamungkas. "Penetration Testing Database Menggunakan Metode SQL Injection Via SQLMap di Termux." Indonesian Journal of Applied Informatics 5, no. 1 (April 18, 2021): 1. http://dx.doi.org/10.20961/ijai.v5i1.40845.

Full text
Abstract:
<p class="infAbstract"><em>Abstrak : </em></p><p class="infAbstract">Penetration testing (Pentesting) merupakan sebuah metode evaluasi terhadap keamanan pada suatu sistem dan jaringan komputer dengan melakukan suatu pengujian, salah satu metode pengujian yang dapat digunakan adalah SQL Injection. SQL Injection merupakan suatu teknik hacking dengan fokus pengujian pada database sebagai media penyimpanan data pada sistem. Tool yang digunakan pada penelitian ini ialah SQLMap yang merupakan tool open source yang dapat menganalisa, mendeteksi dan melakukan exploit (sebuah kode yang dapat menyerang keamanan sistem komputer secara spesifik) pada bug SQL Injection. Pengujian dilakukan menggunakan perangkat Smartphone bersistem operasi Android dengan program aplikasi Termux sebagai emulator terminal berbasis linux. Tujuan dari penelitian ini untuk pengujian keamanan database web server dan membantu pengelola atau admin situs web untuk dapat memeriksa adanya celah kerentanan database yang dapat dieskploitasi oleh peretas.</p><p class="infAbstract">____________________________</p><p class="infAbstract">Abstract :</p><p><em>Penetration testing</em><em> (Pentest</em><em>ing</em><em>) is a method of evaluating the security of a computer system and network by conducting a test, one of the testing methods that can be used is SQL Injection . SQL Injection is a hacking technique that focuses on testing the database as a data storage medium on the system. The tool used in this study is SQLMap which is an open source tool that can analyze, detect and exploit (a code that can specifically attack computer system security) on the SQL Injection bug. Testing was carried out using a Smartphone device with the Android operating system with the Termux application program as a linux-based terminal emulator. The purpose of this research is to test the security of the web server database and help the website manager or admin to be able to check for any database vulnerabilities that can be exploited by hackers.</em></p><p class="infAbstract"><em><br /></em></p>
APA, Harvard, Vancouver, ISO, and other styles
4

Yan, Hai Zhong. "Development Technology of Excel Data Server Application with DELPHI ADO + RemObjectcs Combined (Part 1: The Server Side)." Applied Mechanics and Materials 727-728 (January 2015): 959–64. http://dx.doi.org/10.4028/www.scientific.net/amm.727-728.959.

Full text
Abstract:
Microsoft office Excel is an important part of the Microsoft Office suite of software that can be processed, statistical analysis of various data, with its quick style and rich functionality has been generally welcomed, but with the database networking and sharing trends deepening, Excel application bottlenecks in stand-alone mode began to appear, and the network is the computer information technology in today's inevitable end, I imagine combining ADO technology developed by Delphi Excel data server in order to break this limitation, changes in non-network applications Excel mode.Excel Data Server is a set of services and client program, the server deployed on the server, the client is retrieved by the query language SQL, Excel data file can perform various operations and customer interface directly to form a Web-based application systems, customer service not only to support the application at both ends of the LAN, you can also support the application on the Internet. In this paper, Delphi7.0 support, using ADO and RemObjects SDK tools to develop an Excel data server. RemObjects referred to RO. RO version a lot, but it is recommended to use RemObjects Data Abstract 6.0.43.801, Delphi's experience in the development of it appear to be more stable, server-side and client-side data connections and programming efficiency, data manipulation more convenient.
APA, Harvard, Vancouver, ISO, and other styles
5

Langraf, Vladimír, Kornélia Petrovičová, Stanislav David, Zuzana Krumpálová, Adrián Purkart, and Janka Schlarmannová. "Proposal of a Relational Database (SQL) for Zoological Research of Epigeic Synusion." MENDEL 27, no. 1 (June 21, 2021): 23–28. http://dx.doi.org/10.13164/mendel.2021.1.023.

Full text
Abstract:
In recent years, developments in the field of molecular biology and genetics have led to the increase in biological information stored in databases. The same increase in the volume of information occurred in the field of zoology, but the development of databases was not addressed in this area. We prepared a relational database and its diagram in the Microsoft SQL Server Management Studio (SSMS) database program. Our results represent experience with construction of a new database design for the zoology field with a focus on research of epigeic groups. The structure of the database will help with meta-analyzes with the objective to identify zoological and ecological relationships and responses to anthropic intervention.
APA, Harvard, Vancouver, ISO, and other styles
6

Zhou, Yingbao. "A Multimedia Teaching System with Special Acoustic Effects in the Course of Aerobics." International Journal of Emerging Technologies in Learning (iJET) 11, no. 10 (October 27, 2016): 31. http://dx.doi.org/10.3991/ijet.v11i10.6266.

Full text
Abstract:
With the continuous advancement of multimedia technology, multimedia teaching has also posed higher requirements on multimedia playing capabilities. This essay presents the design program for a speaker which could be applied in multimedia classroom to achieve special acoustic effects based on use of the ASP.NET technology. The SQL Server 2005 database technology and Microsoft Visual Studio 2008 technology are combined in the design process. Compared with traditional multimedia speakers, the speak of this program is small, portable, and power-saving, may bring changeable lighting stage effects, could be easily connected to computers, and support playing files stored in U disk and SD card. After the entire program is practically utilized in teaching, it has been found that the system can meet acoustic demand of teachers and students, and improve teaching effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
7

Jalbani, Khuda Bux, Muhammad Yousaf, Muhammad Shahzad Sarfraz, Rozita Jamili Oskouei, Akhtar Hussain, and Zojan Memon. "Poor Coding Leads to DoS Attack and Security Issues in Web Applications for Sensors." Security and Communication Networks 2021 (May 19, 2021): 1–11. http://dx.doi.org/10.1155/2021/5523806.

Full text
Abstract:
As the SQL injection attack is still at the top of the list at Open Web Application Security Project (OWASP) for more than one decade, this type of attack created too many types of issues for a web application, sensors, or any similar type of applications, such as leakage of user private data and organization intellectual property, or may cause Distributed Denial of Service (DDoS) attacks. This paper focused on the poor coding or invalidated input field which is a big cause of services unavailability for web applications. Secondly, it focused on the selection of program created issues for the WebSocket connections between sensors and the webserver. The number of users is growing to use web applications and mobile apps. These web applications or mobile apps are used for different purposes such as tracking vehicles, banking services, online stores for shopping, taxi booking, logistics, education, monitoring user activities, collecting data, or sending any instructions to sensors, and social websites. Web applications are easy to develop with less time and at a low cost. Due to that, business community or individual service provider’s first choice is to have a website and mobile app. So everyone is trying to provide 24/7 services to its users without any downtime. But there are some critical issues of web application design and development. These problems are leading to too many security loopholes for web servers, web applications, and its user’s privacy. Because of poor coding and validation of input fields, these web applications are vulnerable to SQL Injection and other security problems. Instead of using the latest third-party frameworks, language for website development, and version database server, another factor to disturb the services of a web server may be the socket programming for sensors at the production level. These sensors are installed in vehicles to track or use them for booking mobile apps.
APA, Harvard, Vancouver, ISO, and other styles
8

Chang, Bao-Rong, Hsiu-Fen Tsai, Yun-Che Tsai, Chin-Fu Kuo, and Chi-Chung Chen. "Integration and optimization of multiple big data processing platforms." Engineering Computations 33, no. 6 (August 1, 2016): 1680–704. http://dx.doi.org/10.1108/ec-08-2015-0247.

Full text
Abstract:
Purpose – The purpose of this paper is to integrate and optimize a multiple big data processing platform with the features of high performance, high availability and high scalability in big data environment. Design/methodology/approach – First, the integration of Apache Hive, Cloudera Impala and BDAS Shark make the platform support SQL-like query. Next, users can access a single interface and select the best performance of big data warehouse platform automatically by the proposed optimizer. Finally, the distributed memory storage system Memcached incorporated into the distributed file system, Apache HDFS, is employed for fast caching query results. Therefore, if users query the same SQL command, the same result responds rapidly from the cache system instead of suffering the repeated searches in a big data warehouse and taking a longer time to retrieve. Findings – As a result the proposed approach significantly improves the overall performance and dramatically reduces the search time as querying a database, especially applying for the high-repeatable SQL commands under multi-user mode. Research limitations/implications – Currently, Shark’s latest stable version 0.9.1 does not support the latest versions of Spark and Hive. In addition, this series of software only supports Oracle JDK7. Using Oracle JDK8 or Open JDK will cause serious errors, and some software will be unable to run. Practical implications – The problem with this system is that some blocks are missing when too many blocks are stored in one result (about 100,000 records). Another problem is that the sequential writing into In-memory cache wastes time. Originality/value – When the remaining memory capacity is 2 GB or less on each server, Impala and Shark will have a lot of page swapping, causing extremely low performance. When the data scale is larger, it may cause the JVM I/O exception and make the program crash. However, when the remaining memory capacity is sufficient, Shark is faster than Hive and Impala. Impala’s consumption of memory resources is between those of Shark and Hive. This amount of remaining memory is sufficient for Impala’s maximum performance. In this study, each server allocates 20 GB of memory for cluster computing and sets the amount of remaining memory as Level 1: 3 percent (0.6 GB), Level 2: 15 percent (3 GB) and Level 3: 75 percent (15 GB) as the critical points. The program automatically selects Hive when memory is less than 15 percent, Impala at 15 to 75 percent and Shark at more than 75 percent.
APA, Harvard, Vancouver, ISO, and other styles
9

Riadi, Imam, Rusdy Umar, and Dora Bernadisman. "Analisis Forensik Database Menggunakan Metode Forensik Statis." JURNAL SISTEM INFORMASI BISNIS 9, no. 1 (May 3, 2019): 9. http://dx.doi.org/10.21456/vol9iss1pp9-17.

Full text
Abstract:
SIMDA (Regional Management Information System) is a system created by the BPKP (Financial and Development Supervisory Agency) to assist local governments in implementing regional financial management so that it complies with applicable, efficient, effective, transparent, accountable and auditable regulations. Management data is stored in the SIMDA database on a server connected to a computer network, it is possible that the database is always infiltrated and indicated by data manipulation by hackers. The purpose of this study is to monitor database activity and detect data manipulation done by hackers, then forensic processes are carried out using static forensic methods with stages, namely data collection, data checking, data analysis, and reporting so as to provide evidence and instructions to do analysis on the SIMDA Planning database. The results obtained using static forensic methods show that there has been manipulation or change in the budget ceiling of the activity that exceeds the program budget ceiling (mark-up in budget planning) carried out by hackers who enter through the SIMDA database. Output from forensic processes can prove manipulation data that is carried out by hackers can be detected using SQL Profiler and SQL Log Analyzer tools so that output can be used as digital evidence to assist law enforcement in revealing cybercrime crime cases and can be accounted for in court proceedings.
APA, Harvard, Vancouver, ISO, and other styles
10

Guo, Yuan, Yu Sun, and Kai Wu. "Research and development of monitoring system and data monitoring system and data acquisition of CNC machine tool in intelligent manufacturing." International Journal of Advanced Robotic Systems 17, no. 2 (March 1, 2020): 172988141989801. http://dx.doi.org/10.1177/1729881419898017.

Full text
Abstract:
Intelligent manufacturing as the development direction of the new generation manufacturing system has become a hot research topic. Computer numerical control (CNC) machine tools are the core manufacturing equipment in discrete manufacturing enterprises, collecting and monitoring the data is an important part of intelligent manufacturing workshops. It has a great significance to improve the production efficiency of enterprises and eliminate information islands. The purpose of this article is to solve the problems of data acquisition and monitoring of CNC machine tools in the manufacturing workshop of enterprises. This article uses FOCAS data acquisition method to research and develop the data acquisition and monitoring system of CNC machine tools in intelligent manufacturing workshop. The research results show that the equipment information model based on MTConnect protocol and FOCAS can solve the data acquisition and storage functions of CNC machine tools well. Using the object-oriented Petri net model, it can solve various uncertain factors in numerical control (NC) machining tasks and realize the monitoring function of CNC machining tasks in the workshop. Based on the NC program analysis, the calculation method of machining time in the NC program can determine the preventive maintenance cycle of the machine based on the machine fault information. Based on VS2013 development environment, Qt application framework and SQL Server 2012 database, the numerical control machine tool data acquisition and monitoring prototype system was developed, and the system was verified in the workshop to prove the effectiveness of the system.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "SQL Server (Computer program)"

1

Poti, Allison Tamara S. "Building a multi-tier enterprise system utilizing visual Basic, MTS, ASP, and MS SQL." Virtual Press, 2001. http://liblink.bsu.edu/uhtbin/catkey/1221293.

Full text
Abstract:
Multi-tier enterprise systems consist of more than two distributed tiers. The design of multi-tier systems is considerably more involved than two tier systems. Not all systems should be designed as multi-tier, but if the decision to build a multi-tier system is made, there are benefits to this type of system design. CSCources is a system that tracks computer science course information. The requirements of this system indicate that it should be a multi-tier system. This system has three tiers, client, business and data. Microsoft tools are used such as Visual Basic (VB) that was used to build the client tier that physically resides on the client machine. VB is also used to create the business tier. This tier consists of the business layer and the data layer. The business layer contains most of the business logic for the system. The data layer communicates with the data tier. Microsoft SQL Server (MS SQL) is used for the data store. The database containsseveral tables and stored procedures. The stored procedures are used to add, edit, update and delete records in the database. Microsoft Transaction Server (MTS) is used to control modifications to the database. The transaction and security features available in the MTS environment are used. The business tier and data tier may or may not reside on the same physical computer or server. Active Server Pages (ASP) was built that accesses the business tier to retrieve the needed information for display on a web page. The cost of designing a distributed system, building a distributed system, upgrades to the system and error handling are examined.Ball State UniversityMuncie, IN 47306
Department of Computer Science
APA, Harvard, Vancouver, ISO, and other styles
2

Venugopal, Niveditha. "Annotation-Enabled Interpretation and Analysis of Time-Series Data." PDXScholar, 2018. https://pdxscholar.library.pdx.edu/open_access_etds/4708.

Full text
Abstract:
As we continue to produce large amounts of time-series data, the need for data analysis is growing rapidly to help gain insights from this data. These insights form the foundation of data-driven decisions in various aspects of life. Data annotations are information about the data such as comments, errors and provenance, which provide context to the underlying data and aid in meaningful data analysis in domains such as scientific research, genomics and ECG analysis. Storing such annotations in the database along with the data makes them available to help with analysis of the data. In this thesis, I propose a user-friendly technique for Annotation-Enabled Analysis through which a user can employ annotations to help query and analyze data without having prior knowledge of the details of the database schema or any kind of database programming language. The proposed technique receives the request for analysis as a high-level specification, hiding the details of the schema, joins, etc., and parses it, validates the input and converts it into SQL. This SQL query can then be executed in a relational database and the result of the query returned to the user. I evaluate this technique by providing real-world data from a building-data platform containing data about Portland State University buildings such as room temperature, air volume and CO2 level. This data is annotated with information such as class schedules, power outages and control modes (for example, day or night mode). I test my technique with three increasingly sophisticated levels of use cases drawn from this building science domain. (1) Retrieve data with include or exclude annotation selection (2) Correlate data with include or exclude annotation selection (3) Align data based on include annotation selection to support aggregation over multiple periods. I evaluate the technique by performing two kinds of tests: (1) To validate correctness, I generate synthetic datasets for which I know the expected result of these annotation-enabled analyses and compare the expected results with the results generated from my technique (2) I evaluate the performance of the queries generated by this service with respect to execution time in the database by comparing them with alternative SQL translations that I developed.
APA, Harvard, Vancouver, ISO, and other styles
3

Jia, Hao. "A web application for Medasolution Healthcare Company customer service system." CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2612.

Full text
Abstract:
Medasolution is a virtual company designed by the author to handle Medicare insurance business. The web application (which uses ASP.net and SQL Server 2000) facilitates communication between Medasolution and all its clients: members, employers, brokers, and medicare providers through separate web pages based on their category levels. The program incorporates security so that it follows government privacy rules regarding client information.
APA, Harvard, Vancouver, ISO, and other styles
4

Torenius, Tommy. "Metod för att identifiera redundant logik i en SQL Server-miljö." Thesis, KTH, Data- och elektroteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-103044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sedin, Hälldahl Stefan. "Frågespel : Mobilapp med server." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-37189.

Full text
Abstract:
Detta projekts huvudsakliga syfte är att skapa ett frågespel där användare samtidigt kan spela mot andra genom att använda en mobil applikation. Den som startar en spelomgång får välja vilken kategori av frågor som ska ställas och ger därefter ut erhållen kod till vänner som i sin tur kan ansluta till spelet. Därefter exekveras spelomgång varpå resultat erhålls och vinnare utses. Teknisk lösning för detta projekt använder Unity3D för presentation av spelet på de mobila enheterna vilka sedan kommunicerar med en server som exekverar på plattform utvecklad med Microsoft .NET Core och SQL Server. För att administrera de kategorier och frågor som spelarna ställs inför används ASP.NET MVC på samma plattform.
The main purpose of this project is to create a quiz game where users are able to simultaneously play against others using a mobile application. Anyone who starts a game session can choose which category of questions to ask and then send out received code to friends who in their turn joins the game. A round is then started where players will answer questions, after which they obtain results and a winner is selected. Technical solution for this project uses Unity3D for presentation of the game on the mobile devices which then communicates with a server that executes on a platform developed with Microsoft .NET Core and SQL Server. ASP.NET MVC is used on the same platform to manage the categories and questions faced by the players.
APA, Harvard, Vancouver, ISO, and other styles
6

Ma, Chao. "ACE Student Tracker." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1306789622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hasan, Waqar. "Optimization of SQL queries for parallel machines /." Berlin [u.a.] : Springer, 1996. http://www.loc.gov/catdir/enhancements/fy0815/96039704-d.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lodico, Marc Richard. "SQLSDM : a SQL front-end semantic data model /." Online version of thesis, 1989. http://hdl.handle.net/1850/10620.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Beasley, Johnita. "A graphical alternative to direct SQL based querying." Master's thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-12162009-020050/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Grahn, Göran. "Analys och utveckling av en metod för distribution av data." Thesis, University of Skövde, School of Humanities and Informatics, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-1043.

Full text
Abstract:

Detta examensarbete omfattar utveckling och test av en metod för distribution av data i ett multidatabassystem. Testen av metoden har gjorts genom att den har implementerats i en fallstudie. Fallstudien berör en organisation som har behov av att integrera tre av sina databassystem. Detta för att information ska kunna utbytas mellan dessa. Integrationen av databassystemen har gjorts på ett sådant sätt att de data som distribueras från dessa skickas till en central databas, med SQL Server som databashanterare.

Det verktyg som har valts att användas i examensarbetet för att lösa uppgiften är Data Transformation Services, DTS, i SQL Server.

APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "SQL Server (Computer program)"

1

1975-, Litchfield David, and Grindlay Bill, eds. SQL server security. New York: McGraw-Hill/Osborne, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Murach's SQL for SQL server. Fresno, CA: Mike Murach & Associates, Inc., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Microsoft Corporation. Microsoft SQL server introduction: SQL server, including OLAP services. Redmond, Wash: Microsoft Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Morris, Lewis. SQL server security distilled. 2nd ed. Berkeley, Calif: Apress, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bagui, Sikha. Essential SQL on SQL server 2008. Sudbury, Mass: Jones and Bartlett Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mike, White, Parui Uttam, and ebrary Inc, eds. Microsoft SQL server 2008 bible. Indianapolis, IN: Wiley, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ken, Simmons, and SpringerLink (Online service), eds. Pro SQL Server 2008 Mirroring. Berkeley, CA: Apress, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Programming Sql Server 2005. S.l: O'reilly Media, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Grant, Fritchey, and Taglienti Carmen, eds. Beginning SQL server 2008 administration. [Berkeley, Calif.]: Apress, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ben-Gan, Itzik. Microsoft SQL server 2008: T-SQL fundamentals. Redmond, Wash: Microsoft Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "SQL Server (Computer program)"

1

Pal, Shankar, Dragan Tomic, Brandon Berg, and Joe Xavier. "Managing Collections of XML Schemas in Microsoft SQL Server 2005." In Lecture Notes in Computer Science, 1102–5. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11687238_69.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wycislik, Lukasz, and Lukasz Warchal. "Using Oracle 11.2g Database Server in Social Network Analysis Based on Recursive SQL." In Computer Networks, 139–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31217-5_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shi, Liang, and Wenxing Bao. "One Method for Batch DHI Data Import into SQL-Server." In Computer and Computing Technologies in Agriculture IV, 124–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-18336-2_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Orr, Douglas B., Robert W. Mecklenburg, Peter J. Hoogenboom, and Jay Lepreau. "Dynamic Program Monitoring and Transformation using the OMOS Object Server." In The Interaction of Compilation Technology and Computer Architecture, 137–59. Boston, MA: Springer US, 1994. http://dx.doi.org/10.1007/978-1-4615-2684-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Aiwu, and Hongying Liu. "Research on the Principle and Application of Multiversion Data in SQL Server 2008." In Communications in Computer and Information Science, 707–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31968-6_84.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

M, Santhiya, Siva Rathnam M, Radha Krishnan T, and Nishanth S. "Smart Forest Fire Identification and Notification System Using Iot Based Wireless Sensor Networks." In Intelligent Systems and Computer Technology. IOS Press, 2020. http://dx.doi.org/10.3233/apc200203.

Full text
Abstract:
Wildlife and wildlife authorities face the problem of animal migration from woodland to residential areas in the present environment. Natural calamities triggered by nature, wind and dry undergrowth will destroy acres of land and consume everything in their way that causes significant harm to both natural and human capital. The proposed system to design an IoT-based system that will be able to detect the fire as soon as possible before the fire spreads over the wide area and prevent poaching. Raspberry interfacing with a temperature sensor, a smoke sensor, webcam and a buzzer. GSM gateway is used to conduct this project to provide the user with the final SMS via given number in simulation program. The temperature sensor used to indicate high and low temperatures, the PIR sensor designed to track human activity on the LCD display, the flame sensor used to signify the intensity of flames and the forest fire observed on the LCD display. Once large, image processing is used to determine the accuracy of the fire rate. Wireless Sensor Network (WSN) for data processing to be used as input data in our control system. WSN comprising of temperature sensor system and GPS module to sense forest fire by measuring the level and sending its position to the server utilizing GSM communication contact and GPS functionality. Raspberry Pi cluster, a complicated computation is broken into multiple parts using MPI, and each component runs on separate raspberry pi device. Such sections will be analysed in sequence and then MPI must merge the output and turn it over to the user, essentially they operate as individual units (but in tandem and together) to produce very quick results.
APA, Harvard, Vancouver, ISO, and other styles
7

Hamidi, H., and K. Mohammadi. "Modeling Fault Tolerant and Secure Mobile Agent Execution in Distributed Systems." In Mobile Computing, 2739–51. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-054-7.ch207.

Full text
Abstract:
A mobile agent is a software program which migrates from a site to another site to perform tasks assigned by a user. For the mobile agent system to support agents in various application areas, the issues regarding reliable agent execution, as well as compatibility between two different agent systems or secure agent migration, have been considered. Some of the proposed schemes are either replicating the agents (Hamidi & Mohammadi, 2005) or check-pointing the agents (Park, Byun, Kim, & Yeom, 2002; Pleisch & Schiper, 2001;) For a single agent environment without considering inter-agent communication, the performance of the replication scheme and the check-pointing scheme is compared in Park et al. (2002) and Silva, Batista, and Silva (2000). In the area of mobile agents, only few works can be found relating to fault tolerance. Most of them refer to special agent systems or cover only some special aspects relating to mobile agents, such as the communication subsystem. Nevertheless, most people working with mobile agents consider fault tolerance to be an important issue (Izatt, Chan, & Brecht, 1999; Shiraishi, Enokido, & Takzawa, 2003). Mobile agents are becoming a major trend for designing distributed systems and applications in the last few years and foreseeable future. It can bring benefits such as reduced network load and overcoming of network latency (Chan, Won, & Lyu, 1993). Nevertheless, security is one of the limiting factors of the development of these systems. The main unsolved security problem lies in the possible existence of malicious hosts that can manipulate the execution and data of agents (Defago, Schiper, & Sergent, 1998). Most distributed applications we see today are deploying the client/server paradigm. There are certain problems with the client/server paradigm, such as the requirement of a high network bandwidth, and continuous user-computer interactivity. In view of the deficiencies of the client/server paradigm, the mobile code paradigm has been developed as an alternative approach for distributed application design. In the client/server paradigm, programs cannot move across different machines and must run on the machines they reside on. The mobile code paradigm, on the other hand, allows programs to be transferred among and executed on different computers. By allowing code to move between hosts, programs can interact on the same computer instead of over the network. Therefore, communication cost can be reduced. Besides, mobile agent (Fischer, Lynch, & Paterson, 1983) programs can be designed to work on behalf of users autonomously. This autonomy allows users to delegate their tasks to the mobile agents, and not to stay continuously in front of the computer terminal. The promises of the mobile code paradigm bring about active research in its realization. Most researchers, however, agree that security concerns are a hurdle (Greenberg, Byington, & Harper, 1998). In this article, we investigate these concerns. First, we review some of the foundation materials of the mobile code paradigm. We elaborate Ghezzi and Vigna’s classification of mobile code paradigms (Ghezzi & Vigna, 1997), which is a collection of the remote evaluation, code on demand, and mobile agent approaches. In the next section, we address the current status of mobile code security. The following section presents the model for fault-tolerant mobile agent. In the next section, security issues of the mobile agent are discussed, and we discuss security modeling and evaluation for the mobile agent in the section after. In the following section, simulation results and influence of the size of agent are discussed. We then conclude the article.
APA, Harvard, Vancouver, ISO, and other styles
8

Dorfman, Jay. "Introducing Technology-Based Music Instruction." In Theory and Practice of Technology-Based Music Instruction. Oxford University Press, 2013. http://dx.doi.org/10.1093/oso/9780199795581.003.0004.

Full text
Abstract:
Mrs. Jones has 14 years of teaching under her belt. She received her music education degree from an excellent state university program and completed a master’s in music education early in her career during the summers. After teaching at several levels, she has settled in a good junior high school position in an upper middle-class neighborhood. The music department—she and two other teachers—is a collaborative group that consistently turns out strong performances for the school and community. About five years ago, Mrs. Jones noticed that technology was becoming an increasingly important part of many of the school music programs she considered to be on par with her own. She had introduced some technology in her orchestra class—she used notation software to create warm-up exercises and often played listening examples for the students that she stored on her iPod. So, with the same enthusiasm that she approaches most of the parts of her job, she approached her principal about funding a computer lab for the music department. Her request was met with excitement. The principal agreed to set up a lab dedicated to the music department and to schedule a class for Mrs. Jones to teach called Music Technology for the following fall. There was no established curriculum for the class, but Mrs. Jones would have the summer to assemble the curriculum and lesson plans, in consultation with the principal and the other music teachers. They all recognized that starting this class would bring new students to their excellent music department and could only draw more public attention to their good work. The lab would have 15 student stations and an additional station for the teacher. None of the music teachers or the school’s administrators had any expertise in designing computer labs, so they left that task up to the district’s architects. The information technology (IT) department was enlisted to set up all of the hardware and software and to make appropriate network and server connections, with enough time for Mrs. Jones to get used to the lab before the school year would begin.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "SQL Server (Computer program)"

1

Roshan, Kavuri. "SQL Server Failover Clustering." In International Conference of Advanced Computer Science & Information Technology. Academy & Industry Research Collaboration Center (AIRCC), 2012. http://dx.doi.org/10.5121/csit.2012.2313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mateen, Abdul, Basit Raza, Tauqeer Hussain, and M. M. Awais. "Autonomic Computing in SQL Server." In Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008). IEEE, 2008. http://dx.doi.org/10.1109/icis.2008.111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sícoli, Fábio, and André Simão. "Finding Detached Microsoft SQL Server Database Files." In The Sixth International Conference on Forensic Computer Science. ABEAT, 2011. http://dx.doi.org/10.5769/c2011022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cao, Ruguo, and Yongqin Tan. "Data Mining Program in library based on SQL Server 2005." In 2012 IEEE Symposium on Robotics and Applications (ISRA). IEEE, 2012. http://dx.doi.org/10.1109/isra.2012.6219123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rao, Wenbi, Yali Guo, and Junqiang Wang. "Research of OLAM Module Based on SQL Server." In 2008 International Conference on Computer Science and Software Engineering. IEEE, 2008. http://dx.doi.org/10.1109/csse.2008.741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dong, Minghua, Qin Huang, Shumei Li, and Qingfen Wu. "Applying Microsoft SQL Server database in paper quality evaluation." In 2013 International Conference on Sport Science and Computer Science. Southampton, UK: WIT Press, 2014. http://dx.doi.org/10.2495/cccs130061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kamtuo, Krit, and Chitsutha Soomlek. "Machine Learning for SQL injection prevention on server-side scripting." In 2016 International Computer Science and Engineering Conference (ICSEC). IEEE, 2016. http://dx.doi.org/10.1109/icsec.2016.7859950.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ren, Zhijun. "Constructing a Business Intelligence Solution with Microsoft SQL Server 2005." In 2010 International Conference on Biomedical Engineering and Computer Science (ICBECS). IEEE, 2010. http://dx.doi.org/10.1109/icbecs.2010.5462387.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhou, Gongbo, Zhencai Zhu, Guangzhu Chen, and Aijun Zhang. "Technique of WinCC Long-Distance Accessing Exterior SQL Server Database." In 2009 First International Workshop on Education Technology and Computer Science. IEEE, 2009. http://dx.doi.org/10.1109/etcs.2009.295.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhu Li-juan. "Research and application of SQL Server in the trade management system." In 2011 3rd International Conference on Computer Research and Development (ICCRD). IEEE, 2011. http://dx.doi.org/10.1109/iccrd.2011.5764282.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "SQL Server (Computer program)"

1

Tarko, Andrew P., Jose Thomaz, and Mario Romero. SNIP Light User Manual. Purdue University, 2020. http://dx.doi.org/10.5703/1288284317136.

Full text
Abstract:
A systemic approach to identifying road locations that exhibit safety problems was provided by the Safety Needs Identification Program (SNIP and SNIP2) developed by the Purdue University Center for Road Safety (CRS). The new version SNIP Light has been developed to provide other uses with planning level traffic safety analysis capability for a wider range of uses including Metropolitan Planning Agencies (MPOs) who want the tool for planning cost-effective safety programs in their metropolitan areas. The SNIP Light reduces the demand of computing and data storage resources and replaces the SQL server database system an integrated module coded in-house which is considerably faster than the original component. Furthermore, certain proficiency required to install and use the old version is no longer needed thanks to the intuitive single-window interface and executing file operations in the background without the user’s involvement. Some operations, such as optimizing funding of safety projects, are removed to simplify the tool.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography