Sciweavers

103 search results - page 2 / 21
» Checking Violation Tolerance of Approaches to Database Integ...
Sort
View
CAISE
2005
Springer
13 years 11 months ago
Computing the Relevant Instances That May Violate an OCL Constraint
Integrity checking is aimed at efficiently determining whether the state of the information base is consistent after the application of a set of structural events. One possible way...
Jordi Cabot, Ernest Teniente
GPC
2009
Springer
13 years 3 months ago
Integrity Assurance Technique Using Determinant Approach
Data integrity is an important aspect of storage security and reliability which are prerequisite for most computer systems and network applications. This paper proposes a new tech...
Jasim A. Ghaeb
DBPL
1997
Springer
133views Database» more  DBPL 1997»
13 years 9 months ago
Automatic Verification of Transactions on an Object-Oriented Database
Abstract. In the context of the object-oriented data model, a compiletime approach is given that provides for a significant reduction of the amount of run-time transaction overhead...
David Spelt, Herman Balsters
ICDE
2007
IEEE
148views Database» more  ICDE 2007»
14 years 6 months ago
Efficient Detection of Distributed Constraint Violations
In many distributed environments, the primary function of monitoring software is to detect anomalies, that is, instances when system behavior deviates substantially from the norm....
Shipra Agrawal, Supratim Deb, K. V. M. Naidu, Raje...
WECWIS
2009
IEEE
177views ECommerce» more  WECWIS 2009»
14 years 1 days ago
Business Rules for Concurrent E-commerce Transactions
Business rules are a cornerstone of the consistency management of e-commerce data. The concurrency of transactions by multiple customers of e-commerce services (e.g., seat reserva...
Hendrik Decker