Sciweavers

501 search results - page 15 / 101
» Simplification of Integrity Constraints for Data Integration
Sort
View
SCP
1998
138views more  SCP 1998»
14 years 9 months ago
A Hierarchy of Constraint Systems for Data-Flow Analysis of Constraint Logic-Based Languages
Many interesting analyses for constraint logic-based languages are aimed at the detection of monotonic properties, that is to say, properties that are preserved as the computation...
Roberto Bagnara
ACSAC
2005
IEEE
15 years 3 months ago
An Integrity Verification Scheme for DNS Zone file based on Security Impact Analysis
The Domain Name System (DNS) is the world’s largest distributed computing system that performs the key function of translating user-friendly domain names to IP addresses through...
Ramaswamy Chandramouli, Scott Rose
ISCAPDCS
2004
14 years 10 months ago
A VFSA Scheduler for Radiative Transfer Data in Climate Models
Scheduling and load-balancing techniques play an integral role in reducing the overall execution time of scientific applications on clustered multi-node systems. The increasing co...
S. P. Muszala, Gita Alaghband, Daniel A. Connors, ...
ICDE
2012
IEEE
277views Database» more  ICDE 2012»
12 years 12 months ago
Aggregate Query Answering on Possibilistic Data with Cardinality Constraints
— Uncertainties in data arise for a number of reasons: when the data set is incomplete, contains conflicting information or has been deliberately perturbed or coarsened to remov...
Graham Cormode, Divesh Srivastava, Entong Shen, Ti...
IEEEARES
2006
IEEE
15 years 3 months ago
Availability Constraints for Avionic Data Buses
— The three traditional objectives of computer security are confidentiality, integrity and availability [8]. Availability can be defined as the prevention of denial of service. C...
Alban Gabillon, Laurent Gallon