Sciweavers

6660 search results - page 80 / 1332
» Highly-Available Application Integration
Sort
View
ERSA
2009
109views Hardware» more  ERSA 2009»
14 years 7 months ago
An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors
An increasing number of embedded system solutions in space, military, and consumer electronics applications rely on processor cores inside reconfigurable logic devices. Ensuring da...
Austin Rogers, Aleksandar Milenkovic
ICDT
2007
ACM
160views Database» more  ICDT 2007»
15 years 4 months ago
Beauty and the Beast: The Theory and Practice of Information Integration
Information integration is becoming a critical problem for businesses and individuals alike. Data volumes are sky-rocketing, and new sources and types of information are proliferat...
Laura M. Haas
ICISS
2010
Springer
14 years 7 months ago
Unifying Facets of Information Integrity
Abstract. Information integrity is a vital security property in a variety of applications. However, there is more than one facet to integrity: interpretations of integrity in diffe...
Arnar Birgisson, Alejandro Russo, Andrei Sabelfeld
VTS
2000
IEEE
89views Hardware» more  VTS 2000»
15 years 2 months ago
Fault Escapes in Duplex Systems
Hardware duplication techniques are widely used for concurrent error detection in dependable systems to ensure high availability and data integrity. These techniques are vulnerabl...
Subhasish Mitra, Nirmal R. Saxena, Edward J. McClu...
SIGMOD
2009
ACM
143views Database» more  SIGMOD 2009»
15 years 10 months ago
Data integration in mashups
Mashup is a new application development approach that allows users to aggregate multiple services to create a service for a new purpose. Even if the Mashup approach opens new and ...
Giusy Di Lorenzo, Hakim Hacid, Hye-Young Paik, Bou...