Associative Hardware and Software Techniques for Integrity Control.
Resource URI: https://dblp.l3s.de/d2r/resource/publications/journals/tods/HongS81
Home
|
Example Publications
Property
Value
dcterms:
bibliographicCitation
<
http://dblp.uni-trier.de/rec/bibtex/journals/tods/HongS81
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Stanley_Y._W._Su
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Y._C._Hong
>
foaf:
homepage
<
http://dx.doi.org/doi.org%2F10.1145%2F319587.319594
>
foaf:
homepage
<
https://doi.org/10.1145/319587.319594
>
dc:
identifier
DBLP journals/tods/HongS81
(xsd:string)
dc:
identifier
DOI doi.org%2F10.1145%2F319587.319594
(xsd:string)
dcterms:
issued
1981
(xsd:gYear)
swrc:
journal
<
https://dblp.l3s.de/d2r/resource/journals/tods
>
rdfs:
label
Associative Hardware and Software Techniques for Integrity Control.
(xsd:string)
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Stanley_Y._W._Su
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Y._C._Hong
>
swrc:
number
3
(xsd:string)
swrc:
pages
416-440
(xsd:string)
is
dcterms:
references
of
<
https://dblp.l3s.de/d2r/resource/publications/conf/icde/Hong84
>
is
dcterms:
references
of
<
https://dblp.l3s.de/d2r/resource/publications/conf/vldb/CremersD83
>
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/books/aw/Date75
>
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/conf/isca/DeMartinisLSW76
>
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/conf/pacific/Graves75
>
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/conf/sigmod/ChamberlinB74
>
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/conf/sigmod/HammerS78
>
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/conf/sigmod/Stonebraker75
>
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/conf/vldb/EswaranC75
>
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/conf/vldb/HammerM75
>
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/conf/vldb/Su77
>
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/conf/vldb/SuL75
>
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/journals/cacm/Codd70
>
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/journals/cj/Florentin74
>
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/journals/csur/Verhofstad78
>
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/journals/tc/SuNEL79
>
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/journals/tods/AstrahanBCEGGKLMMPTWW76
>
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/journals/tods/LinSS76
>
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/journals/tods/SeveranceL76
>
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/journals/tods/SuE78
>
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/journals/tse/HongS82
>
owl:
sameAs
<
http://bibsonomy.org/uri/bibtexkey/journals/tods/HongS81/dblp
>
owl:
sameAs
<
http://dblp.rkbexplorer.com/id/journals/tods/HongS81
>
rdfs:
seeAlso
<
http://dblp.uni-trier.de/db/journals/tods/tods6.html#HongS81
>
rdfs:
seeAlso
<
https://doi.org/10.1145/319587.319594
>
dc:
subject
assertion and trigger, associative techniques, cellular-logic devices, database integrity, database management, integrity control
(xsd:string)
dc:
title
Associative Hardware and Software Techniques for Integrity Control.
(xsd:string)
dc:
type
<
http://purl.org/dc/dcmitype/Text
>
rdf:
type
swrc:Article
rdf:
type
foaf:Document
swrc:
volume
6
(xsd:string)