Sciweavers

805 search results - page 22 / 161
» On the Role of Integrity Constraints in Data Integration
Sort
View
SCP
1998
138views more  SCP 1998»
14 years 9 months ago
A Hierarchy of Constraint Systems for Data-Flow Analysis of Constraint Logic-Based Languages
Many interesting analyses for constraint logic-based languages are aimed at the detection of monotonic properties, that is to say, properties that are preserved as the computation...
Roberto Bagnara
ACSAC
2005
IEEE
15 years 3 months ago
An Integrity Verification Scheme for DNS Zone file based on Security Impact Analysis
The Domain Name System (DNS) is the world’s largest distributed computing system that performs the key function of translating user-friendly domain names to IP addresses through...
Ramaswamy Chandramouli, Scott Rose
DATE
2003
IEEE
92views Hardware» more  DATE 2003»
15 years 2 months ago
An Integrated Approach for Improving Cache Behavior
The widening gap between processor and memory speeds renders data locality optimization a very important issue in data-intensive embedded applications. Throughout the years hardwa...
Gokhan Memik, Mahmut T. Kandemir, Alok N. Choudhar...
IEEEARES
2006
IEEE
15 years 3 months ago
Availability Constraints for Avionic Data Buses
— The three traditional objectives of computer security are confidentiality, integrity and availability [8]. Availability can be defined as the prevention of denial of service. C...
Alban Gabillon, Laurent Gallon
IMCSIT
2010
14 years 7 months ago
Modelling, Optimization and Execution of Workflow Applications with Data Distribution, Service Selection and Budget Constraints
Abstract--The paper proposes a model which allows integration of services published by independent providers into scientific or business workflows. Optimization algorithms are prop...
Pawel Czarnul