Sciweavers

103 search results - page 3 / 21
» Checking Violation Tolerance of Approaches to Database Integ...
Sort
View
TC
1997
13 years 7 months ago
An Extensible Framework for Repairing Constraint Violations
In this paper we describe a new approach to repairing violations of integrity constraints in databases with null values. By adopting basic concepts from model-based diagnosis, we ...
Michael Gertz, Udo W. Lipeck
PEPM
1995
ACM
13 years 9 months ago
Towards Creating Specialised Integrity Checks through Partial Evaluation of Meta-Interpreters
In [23] we presented a partial evaluation scheme for a “real life” subset of Prolog, containing first-order built-in’s, simple side-effects and the operational predicate i...
Michael Leuschel, Danny De Schreye
GIS
2008
ACM
14 years 6 months ago
An inconsistency tolerant approach to querying spatial databases
In order to deal with inconsistent databases, a repair semantics defines a set of admissible database instances that restore consistency, while staying close to the original insta...
Leopoldo E. Bertossi, Mónica Caniupá...
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
14 years 7 months ago
Fast Identification of Relational Constraint Violations
Logical constraints, (e.g., 'phone numbers in toronto can have prefixes 416, 647, 905 only'), are ubiquitous in relational databases. Traditional integrity constraints, ...
Amit Chandel, Nick Koudas, Ken Q. Pu, Divesh Sriva...
ACSAC
2003
IEEE
13 years 11 months ago
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
Tye Stallard, Karl N. Levitt