Sciweavers

637 search results - page 57 / 128
» Inconsistency-Tolerant Integrity Checking
Sort
View
141
Voted
ER
2008
Springer
110views Database» more  ER 2008»
15 years 5 months ago
Conjunctive Query Containment under Access Limitations
Access limitations may occur when querying data sources over the web or heterogeneous data sources presented as relational tables: this happens, for instance, in Data Exchange and ...
Andrea Calì, Davide Martinenghi
149
Voted
PRDC
1999
IEEE
15 years 8 months ago
Cost of Ensuring Safety in Distributed Database Management Systems
Generally, applications employing Database Management Systems (DBMS) require that the integrity of the data stored in the database be preserved during normal operation as well as ...
Maitrayi Sabaratnam, Svein-Olaf Hvasshovd, Ø...
141
Voted
CAV
2010
Springer
194views Hardware» more  CAV 2010»
15 years 7 months ago
LTSmin: Distributed and Symbolic Reachability
ions of ODE models (MAPLE, GNA). On the algorithmic side (Sec. 3.2), it supports two main streams in high-performance model checking: reachability analysis based on BDDs (symbolic)...
Stefan Blom, Jaco van de Pol, Michael Weber
131
Voted
QEST
2009
IEEE
15 years 10 months ago
Safety Analysis of an Airbag System Using Probabilistic FMEA and Probabilistic Counterexamples
—Failure mode and effects analysis (FMEA) is a technique to reason about possible system hazards that result from system or system component failures. Traditionally, FMEA does no...
Husain Aljazzar, Manuel Fischer, Lars Grunske, Mat...
108
Voted
SCAM
2008
IEEE
15 years 10 months ago
Some Assembly Required - Program Analysis of Embedded System Code
Programming embedded system software typically involves more than one programming language. Normally, a high-level language such as C/C++ is used for application oriented tasks an...
Ansgar Fehnker, Ralf Huuck, Felix Rauch, Sean Seef...