Sciweavers

RECOSOC
2007
116views Hardware» more  RECOSOC 2007»
13 years 6 months ago
IBC-EI: An Instruction Based Compression method with Encryption and Integrity Checking
Code Compression has been shown to be efficient in minimizing the memory requirements for embedded systems as well as in power consumption reduction and performance improvement. I...
Eduardo Wanderley Netto, Reouven Elbaz, Lionel Tor...
VLDB
1991
ACM
114views Database» more  VLDB 1991»
13 years 8 months ago
Integrity Constraints Checking In Deductive Databases
We propose a new method for integrity checking in deductive databases.The methodaugmentsadatabasewith asetof transition and internal eventsrules,which explicitly definetheinsertio...
Antoni Olivé
FQAS
2004
Springer
122views Database» more  FQAS 2004»
13 years 8 months ago
Simplification of Integrity Constraints with Aggregates and Arithmetic Built-Ins
In the context of relational as well as deductive databases, correct and efficient integrity checking is a crucial issue, as, without any guarantee of data consistency, the answers...
Davide Martinenghi
LPAR
2005
Springer
13 years 10 months ago
Incremental Integrity Checking: Limitations and Possibilities
Integrity checking is an essential means for the preservation of the intended semantics of a deductive database. Incrementality is the only feasible approach to checking and can be...
Henning Christiansen, Davide Martinenghi
ADVIS
2006
Springer
13 years 10 months ago
Checking Violation Tolerance of Approaches to Database Integrity
A hitherto unquestioned assumption made by all methods for integrity checking has been that the database satisfies its constraints before each update. This consistency assumption ...
Hendrik Decker, Davide Martinenghi
DEXAW
2006
IEEE
151views Database» more  DEXAW 2006»
13 years 11 months ago
Avenues to Flexible Data Integrity Checking
Traditional methods for integrity checking in relational or deductive databases heavily rely on the assumption that data have integrity before the execution of updates. In this wa...
Hendrik Decker, Davide Martinenghi
SBACPAD
2007
IEEE
143views Hardware» more  SBACPAD 2007»
13 years 11 months ago
A Code Compression Method to Cope with Security Hardware Overheads
Code Compression has been used to alleviate the memory requirements as well as to improve performance and/or minimize energy consumption. On the other hand, implementing security ...
Eduardo Wanderley Netto, Romain Vaslin, Guy Gognia...