Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 222,933,251 papers from all fields of science
Search
Sign In
Create Free Account
Select (SQL)
Known as:
Select sql
, SQL query
, Select
Expand
The SQL SELECT statement returns a result set of records from one or more tables. A SELECT statement retrieves zero or more rows from one or more…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
44 relations
Adaptive Server Enterprise
Aggregate function
Associative entity
Correlated subquery
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Querying Temporal Databases via OWL 2 QL
Szymon Klarman
,
T. Meyer
International Conference on Web Reasoning and…
2014
Corpus ID: 17382388
SQL:2011, the most recently adopted version of the SQL query language, has unprecedentedly standardized the representation of…
Expand
2014
2014
Automatic SQL Query Formation from Natural Language Query
P. Ghosh
,
Saparja Dey
,
Subhabrata Sengupta
2014
Corpus ID: 59747095
Natural language processing is a field of computer science concerned with the interactions between computers and human (natural…
Expand
Highly Cited
2012
Highly Cited
2012
Information-Theoretic Detection of SQL Injection Attacks
Hossain Shahriar
,
Mohammad Zulkernine
IEEE International Symposium on High-Assurance…
2012
Corpus ID: 25416751
SQL Injection (SQLI) is a wide spread vulnerability commonly found in web-based programs. Exploitations of SQL injection…
Expand
2011
2011
Intelligent spam classification for mobile text message
Kuruvilla Mathew
,
B. Issac
Proceedings of International Conference on…
2011
Corpus ID: 16318185
This paper analyses the methods of intelligent spam filtering techniques in the SMS (Short Message Service) text paradigm, in the…
Expand
2010
2010
Detection of SQL Injection Vulnerabilities via Automatic Test Case Generation of Programs
Michelle Ruse
2010
Corpus ID: 10572216
SQL injection attacks occur due to vulnerabilities in the design of queries where a malicious user can take advantage of input…
Expand
Highly Cited
2006
Highly Cited
2006
VisAVis: An Approach to an Intermediate Layer between Ontologies and Relational Database Contents
Nikolaos Konstantinou
,
Dimitrios-Emmanuel Spanos
,
Michael Chalas
,
E. Solidakis
,
N. Mitrou
Web Information Systems and Mining
2006
Corpus ID: 9632307
This paper introduces an approach to mapping relational database contents to ontologies. The current effort is motivated by the…
Expand
Highly Cited
2005
Highly Cited
2005
Optimization of Relational Preference Queries
Bernd Hafenrichter
,
Werner Kießling
Australasian Database Conference
2005
Corpus ID: 17694337
The design and implementation of advanced personalized database applications requires a preference-driven approach. Representing…
Expand
Highly Cited
2001
Highly Cited
2001
The Nimble XML data integration system
Denise Draper
,
A. Halevy
,
Daniel S. Weld
Proceedings / International Conference on Data…
2001
Corpus ID: 12280864
For better or for worse, XML has emerged as a de facto standard for data interchange. This consensus is likely to lead to…
Expand
2000
2000
Semantic Access: Semantic Interface for Querying Databases
N. Rishe
,
Jun Yuan
,
+6 authors
Dmitry Vasilevsky
Very Large Data Bases Conference
2000
Corpus ID: 14210474
Semantic Binary Object-oriented Data Model (Sem-ODM) provides an expressive data model (similar to Object-oriented Data Models…
Expand
Highly Cited
1999
Highly Cited
1999
What can Hierarchies do for Data Warehouses?
H. V. Jagadish
,
L. Lakshmanan
,
D. Srivastava
Very Large Data Bases Conference
1999
Corpus ID: 2066261
Data in a warehouse typically has multiple dimensions of interest, such as location, time, and product. It is well-recognized…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE