Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,265,827 papers from all fields of science
Search
Sign In
Create Free Account
MySQL
Known as:
MySQL server
, SunSQL
, My.ini
Expand
MySQL (officially pronounced as /maɪ ˌɛskjuːˈɛl/ "My S-Q-L",) is an open-source relational database management system (RDBMS). Its name is a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
<oXygen/> XML Editor
ADO.NET data provider
BuddyPress
Bugzilla
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
A performance evaluation of Hive for scientific data management
Taoying Liu
,
Jing Liu
,
Hong Liu
,
Wei Li
BigData Congress [Services Society]
2013
Corpus ID: 14672650
It is very important to evaluate the MapReduce-based frameworks for scientific data processing applications. Scientists need a…
Expand
2012
2012
Database Administration: The Complete Guide to DBA Practices and Procedures (2nd Edition)
Craig S. Mullins
2012
Corpus ID: 61623913
Database Administration, Second Edition, is the definitive, technology-independent guide to the modern discipline of database…
Expand
2012
2012
Computing on high performance clusters with R : Packages BatchJobs and BatchExperiments Te ch ni ca lR ep or t
B. Bischl
,
Michel Lang
,
Olaf Mersmann
,
J. Rahnenführer
,
C. Weihs
2012
Corpus ID: 14142506
Empirical analysis of statistical algorithms often demands time-consuming experiments which are best performed on high…
Expand
2010
2010
A WEB BASED TOMATO CROP EXPERT INFORMATION SYSTEM BASED ON ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING ALGORITHMS
M. Babu
,
N. Murty
,
S. Narayana
,
P. Courses
2010
Corpus ID: 59510759
.
2008
2008
RFID malware fragmentation attacks
A. Sulaiman
,
M. K. Shankarapani
,
Srinivas Mukkamala
,
A. Sung
International Symposium on Collaborative…
2008
Corpus ID: 581479
With no one's expectation, radio frequency identification devices (RFID) tags can lead to a SQL injection attack, denial of…
Expand
2007
2007
The Design of an Automated C Programming Assessment Using Pseudo-code Comparison Technique
Khirulnizam Abd Rahman
,
Syarbaini Ahmad
,
Md. Jan Nordin
2007
Corpus ID: 15239204
Automated programming assessment is a computer aided approach in checking and grading students programming exercises, without the…
Expand
Highly Cited
2006
Highly Cited
2006
E-Learning Model Based On Semantic Web Technology
F. Ghaleb
,
Sameh S. Daoud
,
Ahmad Hasna
,
Jihad M. ALJa
,
S. El-Seoud
,
H. El-Sofany
2006
Corpus ID: 14886653
Research works in the field of E-Learning are represented by a broad spectrum of applications, ranged from virtual classrooms to…
Expand
2004
2004
An empirical study of software project bidding
M. Jørgensen
,
Gunnar J. Carelius
IEEE Transactions on Software Engineering
2004
Corpus ID: 12440788
The study described in this paper reports from a real-life bidding process in which 35 companies were bidding for the same…
Expand
2004
2004
PHP5 and MySQL Bible
Tim Converse
,
Joyce Park
,
C. Morgan
2004
Corpus ID: 62193249
Classes An abstract class is one that cannot be instantiated, only inherited. You declare an abstract class with the keyword…
Expand
2002
2002
A Friendly Peer-to-Peer File Sharing System with Profit but without Copy Protection
Rüdiger Grimm
,
J. Nützel
IICS
2002
Corpus ID: 3223390
Content providers try to restrict the usage of their products by their customers in order to prevent unlicensed distribution. On…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE