Sciweavers

20 search results - page 3 / 4
» Interceptor Based Constraint Violation Detection
Sort
View
PVLDB
2008
111views more  PVLDB 2008»
13 years 5 months ago
Semandaq: a data quality system based on conditional functional dependencies
We present SEMANDAQ, a prototype system for improving the quality of relational data. Based on the recently proposed conditional functional dependencies (CFDs), it detects and rep...
Wenfei Fan, Floris Geerts, Xibei Jia
ICCV
1999
IEEE
14 years 7 months ago
Multi-View Subspace Constraints on Homographies
The motion of a planar surface between two camera views induces a homography. The homography depends on the cameraintrinsic and extrinsic parameters, as well as on the 3D plane pa...
Lihi Zelnik-Manor, Michal Irani
ACSAC
2005
IEEE
13 years 11 months ago
An Integrity Verification Scheme for DNS Zone file based on Security Impact Analysis
The Domain Name System (DNS) is the world’s largest distributed computing system that performs the key function of translating user-friendly domain names to IP addresses through...
Ramaswamy Chandramouli, Scott Rose
DKE
2008
158views more  DKE 2008»
13 years 5 months ago
Integration and verification of semantic constraints in adaptive process management systems
Adaptivity in process management systems is key to their successful applicability in practice. Approaches have been already developed to ensure system correctness after arbitrary ...
Linh Thao Ly, Stefanie Rinderle, Peter Dadam
COMPSAC
2009
IEEE
13 years 9 months ago
GUI-Based Testing of Boundary Overflow Vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Tugkan Tuglular, Can A. Muftuoglu, Özgür...