Sciweavers

5 search results - page 1 / 1
» On Guard: Producing Run-Time Checks from Integrity Constrain...
Sort
View
100
Voted
AMAST
2004
Springer
15 years 5 months ago
On Guard: Producing Run-Time Checks from Integrity Constraints
Abstract. Software applications are inevitably concerned with data integrity, whether the data is stored in a database, files, or program memory. An integrity guard is code execut...
Michael Benedikt, Glenn Bruns
90
Voted
IAJIT
2008
94views more  IAJIT 2008»
15 years 5 days ago
Enforcing User-Defined Constraints during the Run-Time in OODB
: In this paper a run-time model is proposed. The run-time model enforces integrity constraints for attributes that are derived from composition and inheritance hierarchies. The ru...
Belal Zaqaibeh, Hamidah Ibrahim, Ali Mamat, Md Nas...
SAS
2009
Springer
281views Formal Methods» more  SAS 2009»
16 years 20 days ago
A Verifiable, Control Flow Aware Constraint Analyzer for Bounds Check Elimination
The Java programming language requires that out-of-bounds array accesses produce runtime exceptions. In general, this requires a dynamic bounds check each time an array element is...
David Niedzielski, Jeffery von Ronne, Andreas Gamp...
ACTAC
2008
94views more  ACTAC 2008»
15 years 8 days ago
Effect Preservation in Transaction Processing in Rule Triggering Systems
Rules provide an expressive means for implementing database behavior: They cope with changes and their ramifications. Rules are commonly used for integrity enforcement, i.e., for ...
Mira Balaban, Steffen Jurk
115
Voted
ITC
2003
IEEE
148views Hardware» more  ITC 2003»
15 years 5 months ago
HyAC: A Hybrid Structural SAT Based ATPG for Crosstalk
As technology evolves into the deep sub-micron era, signal integrity problems are growing into a major challenge. An important source of signal integrity problems is the crosstalk...
Xiaoliang Bai, Sujit Dey, Angela Krstic