|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5416 occurrences of 2387 keywords
|
|
|
Results
Found 9246 publication records. Showing 9246 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
34 | Vandana Gunupudi, Stephen R. Tate |
Performance Evaluation of Data Integrity Mechanisms for Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 62-69, 2004, IEEE Computer Society, 0-7695-2108-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Mobile Agents, Data Integrity, Internet Security |
34 | Austin Gilbert, Ajith Abraham, Marcin Paprzycki |
A System for Ensuring Data Integrity in Grid Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 435-439, 2004, IEEE Computer Society, 0-7695-2108-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
distributed trust, data integrity, reputation system, Grid security |
34 | Murat R. Becer, Ravi Vaidyanathan, Chanhee Oh, Rajendran Panda |
Signal integrity management in an SoC physical design flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPD ![In: Proceedings of the 2003 International Symposium on Physical Design, ISPD 2003, Monterey, CA, USA, April 6-9, 2003, pp. 39-46, 2003, ACM, 1-58113-650-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
noise avoidance, noise repair, signal integrity, crosstalk noise |
34 | Anne Doucet, Stéphane Gançarski, Claudia León, Marta Rukoz |
Checking Integrity Constraints in Multidatabase Systems with Nested Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoopIS ![In: Cooperative Information Systems, 9th International Conference, CoopIS 2001, Trento, Italy, September 5-7, 2001, Proceedings, pp. 316-328, 2001, Springer, 3-540-42524-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Integrity constraints, Consistency checking, Distributed transactions, Multidatabase systems, Nested transactions |
34 | Isabelle Mirbel, Barbara Pernici, Timos K. Sellis, S. Tserkezoglou, Michalis Vazirgiannis |
Checking the Temporal Integrity of Interactive Multimedia Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB J. ![In: VLDB J. 9(2), pp. 111-130, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Temporal integrity, Multimedia presentation, Constraint networks |
34 | Pietro Iglio |
TrustedBox: A Kernel-Level Integrity Checker. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 189-198, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
integrity checker |
34 | Andreas Diener, Andreas Dudler |
The integrity subsystem of a distributed database system for workstations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Conference on Computer Science ![In: Proceedings of the 13th ACM Annual Conference on Computer Science, New Orleans, Louisiana, USA, 1985, pp. 364-372, 1985, ACM, 0-89791-150-4. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
professional workstation, data integrity, distributed database, transaction, database design, data replication |
33 | Ruirui C. Huang, G. Edward Suh |
IVEC: off-chip memory integrity protection for both security and reliability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCA ![In: 37th International Symposium on Computer Architecture (ISCA 2010), June 19-23, 2010, Saint-Malo, France, pp. 395-406, 2010, ACM, 978-1-4503-0053-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
security, fault tolerance, reliability, error detection, error correction, memory systems |
33 | Luciano Caroprese, Sergio Greco, Ester Zumpano |
Active Integrity Constraints for Database Consistency Maintenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 21(7), pp. 1042-1058, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Xinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert |
Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSec ![In: Security and Privacy in Mobile Information and Communication Systems, First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers, pp. 71-82, 2009, Springer, 978-3-642-04433-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Javier García-García 0001, Carlos Ordonez 0001 |
Estimating and bounding aggregations in databases with referential integrity errors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DOLAP ![In: DOLAP 2008, ACM 11th International Workshop on Data Warehousing and OLAP, Napa Valley, California, USA, October 30, 2008, Proceedings, pp. 49-56, 2008, ACM, 978-1-60558-250-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
SQL, data quality, functions |
33 | María Idoia Ruiz-Fuertes, Francesc D. Muñoz-Escoí, Hendrik Decker, José Enrique Armendáriz-Iñigo, José Ramón González de Mendívil |
Integrity Dangers in Certification-Based Replication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops ![In: On the Move to Meaningful Internet Systems: OTM 2008 Workshops, OTM Confederated International Workshops and Posters, ADI, AWeSoMe, COMBEK, EI2N, IWSSA, MONET, OnToContent + QSI, ORM, PerSys, RDDS, SEMELS, and SWWS 2008, Monterrey, Mexico, November 9-14, 2008. Proceedings, pp. 924-933, 2008, Springer, 978-3-540-88874-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Weiqing Sun, R. Sekar 0001, Gaurav Poothia, Tejas Karandikar |
Practical Proactive Integrity Preservation: A Basis for Malware Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 2008 IEEE Symposium on Security and Privacy (SP 2008), 18-21 May 2008, Oakland, California, USA, pp. 248-262, 2008, IEEE Computer Society, 978-0-7695-3168-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Luciano Caroprese, Sergio Greco, Cristina Sirangelo, Ester Zumpano |
Declarative Semantics of Production Rules for Integrity Maintenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICLP ![In: Logic Programming, 22nd International Conference, ICLP 2006, Seattle, WA, USA, August 17-20, 2006, Proceedings, pp. 26-40, 2006, Springer, 3-540-36635-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Lorenz Froihofer, Johannes Osrael, Karl M. Göschka |
Trading Integrity for Availability by Means of Explicit Runtime Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: 30th Annual International Computer Software and Applications Conference, COMPSAC 2006, Chicago, Illinois, USA, September 17-21, 2006. Volume 2, pp. 14-17, 2006, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Zhao-Li Zhang, Fan Hong, Hai-Jun Xiao |
Verification of Strict Integrity Policy via Petri Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSNC ![In: Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29 - November 3, 2006, Papeete, Tahiti, French Polynesia, pp. 23, 2006, IEEE Computer Society, 0-7695-2699-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Jan Chomicki, Jerzy Marcinkowski |
On the Computational Complexity of Minimal-Change Integrity Maintenance in Relational Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inconsistency Tolerance ![In: Inconsistency Tolerance [result from a Dagstuhl seminar], pp. 119-150, 2005, Springer, 3-540-24260-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Christopher Popfinger, Stefan Conrad 0001 |
Maintaining Global Integrity in Federated Relational Databases Using Interactive Component Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (1) ![In: On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE, OTM Confederated International Conferences CoopIS, DOA, and ODBASE 2005, Agia Napa, Cyprus, October 31 - November 4, 2005, Proceedings, Part I, pp. 539-556, 2005, Springer, 3-540-29736-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Xiaolan Joy Zhang, Brian King |
Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings, pp. 474-481, 2005, Springer, 3-540-29001-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Christian Decker 0001, Michael Beigl, Albert Krohn, Philip Robinson, Uwe Kubach |
eSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pervasive ![In: Pervasive Computing, Second International Conference, PERVASIVE 2004, Vienna, Austria, April 21-23, 2004, Proceedings, pp. 254-268, 2004, Springer, 3-540-21835-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Peter G. Bishop, Robin E. Bloomfield, Tim Clement, Sofia Guerra, Claire Jones |
Integrity Static Analysis of COTS/SOUP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 22nd International Conference, SAFECOMP 2003, Edinburgh, UK, September 23-26, 2003, Proceedings, pp. 63-76, 2003, Springer, 3-540-20126-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Levent V. Orman |
Transaction Repair for Integrity Enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 13(6), pp. 996-1009, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
33 | Xiaochun Yang 0001, Ge Yu 0001, Guoren Wang |
Efficiently Mapping Integrity Constraints from Relational Database to XML Document. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADBIS ![In: Advances in Databases and Information Systems, 5th East European Conference, ADBIS 2001, Vilnius, Lithuania, September 25-28, 2001, Proceedings, pp. 338-351, 2001, Springer, 3-540-42555-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
33 | Can Türker, Gunter Saake |
Consistent Handling of Integrity Constraints and Extensional Assertions for Schema Integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADBIS ![In: Advances in Databases and Information Systems, Third East European Conference, ADBIS'99, Maribor, Slovenia, September 13-16, 1999, Proceedings, pp. 31-45, 1999, Springer, 3-540-66485-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
33 | Leopoldo E. Bertossi, Javier Pinto, Pablo Sáez, Deepak Kapur, Mahadevan Subramaniam |
Automating Proofs of Integrity Constraints in Situation Calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISMIS ![In: Foundations of Intelligent Systems, 9th International Symposium, ISMIS '96, Zakopane, Poland, June 9-13, 1996, Proceedings, pp. 212-222, 1996, Springer, 3-540-61286-6. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
33 | Magdi N. Kamel |
A Prototype Rule-Based Front End System for Integrity Enforcement in Relational Databases: An Application to the Naval Aircraft Flight Records Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 5th International Conference, DEXA '94, Athens, Greece, September 7 - 9, 1994, Proceedings, pp. 713-723, 1994, Springer, 3-540-58435-8. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
33 | Richard Taylor 0002 |
An Integrity Check Value Algorithm for Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings, pp. 40-48, 1993, Springer, 3-540-57766-1. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
33 | François Bry, Rainer Manthey, Bern Martens |
Integrity Verification in Knowledge Bases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RCLP ![In: Logic Programming, First Russian Conference on Logic Programming, Irkutsk, Russia, September 14-18, 1990 - Second Russian Conference on Logic Programming, St. Petersburg, Russia, September 11-16, 1991, Proceedings, pp. 114-139, 1991, Springer, 3-540-55460-2. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
33 | Keith W. Miller 0001, Jeffrey M. Voas |
Information Integrity and IT Professionals' Integrity, Intertwined. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IT Prof. ![In: IT Prof. 10(6), pp. 35-40, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Srdjan Capkun, Mario Cagalj, Ram Kumar Rengaswamy, Ilias Tsigkogiannis, Jean-Pierre Hubaux, Mani B. Srivastava |
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 5(4), pp. 208-223, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, Ram Kumar Rengaswamy, Ilias Tsigkogiannis, Mani B. Srivastava |
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2006 IEEE Symposium on Security and Privacy (S&P 2006), 21-24 May 2006, Berkeley, California, USA, pp. 280-294, 2006, IEEE Computer Society, 0-7695-2574-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Leo Motus, R. Kinksaar, Tonu Naks, M. Pall |
Enhancing object modelling technique with timing analysis capabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 1st IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '95), November 6-10, 1995, Fort Lauderdale, Florida, USA, pp. 298-301, 1995, IEEE Computer Society, 0-8186-7123-8. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
enhanced object modelling technique, timing analysis capabilities, timing correctness, software implementation problems, specification problems, time-constraint elicitation, Q-model, noncontradiction analysis, time modelling requirements, performance, software engineering, real-time systems, real-time systems, data integrity, timing, scheduling algorithms, timing constraints, object-oriented methods, consistency checking, application domain, integrity checking, design problems |
30 | R. K. Shyamasundar, James W. Thatcher |
Language Constructs for Specifying Concurrency in CDL*. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 15(8), pp. 977-993, 1989. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
CDL* concurrency specification, dynamically allocating resources, CDL*, distributed programming languages, parallel programming, data integrity, data integrity, anonymity, specification languages, mutual exclusion, expressiveness, specification techniques, modular specification, language constructs, abstraction mechanisms, dynamic resource management |
30 | Michael Stonebraker, Eric N. Hanson, Spyros Potamianos |
The POSTGRES Rule Manager. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 14(7), pp. 897-907, 1988. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
priority rules, POSTGRES rule manager, rule subsystem, optimization, relational databases, relational databases, expert systems, expert systems, DBMS, query languages, knowledge engineering, knowledge engineering, integrity constraints, exceptions, forward-chaining, inferencing, referential integrity, backward-chaining |
30 | Surya Nepal, Shiping Chen 0001, Jinhui Yao, Danan Thilakanathan |
DIaaS: Data Integrity as a Service in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE CLOUD ![In: IEEE International Conference on Cloud Computing, CLOUD 2011, Washington, DC, USA, 4-9 July, 2011, pp. 308-315, 2011, IEEE Computer Society, 978-1-4577-0836-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
data integrity as a service, security, data integrity, cloud storage |
30 | Jasim A. Ghaeb |
Integrity Assurance Technique Using Determinant Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GPC Workshops ![In: Workshops at the Grid and Pervasive Computing Conference, GPC 2009, Geneva, Switzerland, May 4-8, 2009, pp. 160-164, 2009, IEEE Computer Society, 978-0-7695-3677-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Storage integrity, Security, Data integrity, Error detection |
30 | Levent V. Orman |
Differential Relational Calculus for Integrity Maintenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 10(2), pp. 328-341, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
integrity maintenance, formal differentiation, relational database, first-order logic, Database integrity |
30 | Riccardo Scandariato, Yoram Ofek, Paolo Falcarin, Mario Baldi |
Application-Oriented Trust in Distributed Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 434-439, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
trustworthy computing, Code integrity |
30 | Bernhard Jansen, HariGovind V. Ramasamy, Matthias Schunter |
Policy enforcement and compliance proofs for Xen virtual machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VEE ![In: Proceedings of the 4th International Conference on Virtual Execution Environments, VEE 2008, Seattle, WA, USA, March 5-7, 2008, pp. 101-110, 2008, ACM, 978-1-59593-796-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
virtual machines, trusted computing, integrity management |
30 | Jinhyung Kim, Dongwon Jeong, Yixin Jing, Doo-Kwon Baik |
QP-T: Query Pattern-Based RDB-to-XML Translation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (2) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part II, pp. 1844-1853, 2006, Springer, 3-540-48273-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Relational Schema Model, XML Shema Model, Referential Integrity Relation Information, Query Pattern |
30 | Hendrik Decker |
Abduction for Knowledge Assimilation in Deductive Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCCC ![In: Proceedings of 17th International Conference of the Chilean Computer Science Society (SCCC '97), November 12-14, 1997, Valpariso, Chile, pp. 48-57, 1997, IEEE Computer Society, 0-8186-8052-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
integrity maintenance, knowledge assimilation, SLDAI, SLD-based proof procedure, update request, hypothetical fact insertions, hypothetical fact deletions, base predicates, abductive logic programming, deductive databases, deductive databases, abduction |
30 | Yuejun Jiang |
An Autoepistemic Logical View of Knowledge Base. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSTTCS ![In: Foundations of Software Technology and Theoretical Computer Science, Ninth Conference, Bangalore, India, December 19-21, 1989, Proceedings, pp. 68-77, 1989, Springer, 3-540-52048-1. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
AI in Database, Incomplete knowledge, Complete Database, Nonstandard Logic, Modal logic, Deductive database, Integrity Constraints, Non-monotonic logic, Closed World Assumption, Possible worlds semantics, Autoepistemic logic |
29 | Yiannis Papadopoulos, Martin Walker, Mark-Oliver Reiser, Matthias Weber 0001, De-Jiu Chen, Martin Törngren, David Servat, Andreas Abele, Friedhelm Stappert, Henrik Lönn, L. Berntsson, Rolf Johansson 0002, Fulvio Tagliabo, Sandra Torchiaro, Anders Sandberg |
Automatic allocation of safety integrity levels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDCC-CARS ![In: 1st Workshop on Critical Automotive Applications: Robustness & Safety, CARS 2010 (EDCC Workshop), Valencia, Spain, 27 April 2010, pp. 7-10, 2010, ACM, 978-1-60558-915-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
CENELEC standards, HiP-HOPS, ISO 26262, SIL allocation, fault tree synthesis, safety integrity levels, IEC 61508 |
29 | Martim Carbone, Weidong Cui, Long Lu, Wenke Lee, Marcus Peinado, Xuxian Jiang |
Mapping kernel objects to enable systematic integrity checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 555-565, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
kernel integrity, memory analysis, malware, pointer analysis, introspection |
29 | Kamil Pietak, Adam Wos, Aleksander Byrski, Marek Kisiel-Dorohinicki |
Functional Integrity of Multi-agent Computational System Supported by Component-Based Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HoloMAS ![In: Holonic and Multi-Agent Systems for Manufacturing, 4th International Conference on Industrial Applications of Holonic and Multi-Agent Systems, HoloMAS 2009, Linz, Austria, August 31 - September 2, 2009. Proceedings, pp. 82-91, 2009, Springer, 978-3-642-03666-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
functional integrity, mutli-agent systems, components |
29 | Fangyong Hou, Nong Xiao, Yuhua Tang, Hongjun He, Fang Liu 0002 |
Protect Disk Integrity: Solid Security, Fine Performance and Fast Recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 169-178, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
hash tree, performance, integrity, consistency, disk |
29 | Fengwei Li, Qingfang Ye, Baohuai Sheng |
On Integrity of Harary Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COCOA ![In: Combinatorial Optimization and Applications, Third International Conference, COCOA 2009, Huangshan, China, June 10-12, 2009. Proceedings, pp. 269-278, 2009, Springer, 978-3-642-02025-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Harary Graph, Networks, Integrity, Independence Number |
29 | Dimitris Vartziotis, Alkis Poulis, Alexandros Minogiannis, Panagiotis Siozos, Iraklis Goudas, Jaron Samson, Michel Tossaint |
Feasibility of a GNSS-Probe for Creating Digital Maps of High Accuracy and Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MOBILIGHT ![In: Mobile Lightweight Wireless Systems, First International ICST Conference, MOBILIGHT 2009, Athens, Greece, May 18-20, 2009, Revised Selected Papers, pp. 387-396, 2009, Springer, 978-3-642-03818-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
GNSS, EGNOS, ADAS, Integrity, Accuracy, Digital Maps |
29 | Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani |
A type system for data-flow integrity on Windows Vista. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGPLAN Notices ![In: ACM SIGPLAN Notices 43(12), pp. 9-20, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data-flow integrity, hybrid type system, explicit substitution, dynamic access control |
29 | Katharine Chang, Kang G. Shin |
Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 11(3), pp. 14:1-14:35, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Distributed authentication, node revocation, program integrity verification, wireless sensor networks |
29 | Takaaki Yamada, Yoshiyasu Takahashi, Yasuhiro Fujii, Ryu Ebisawa, Hiroshi Yoshiura, Isao Echizen |
Evaluation of Integrity Verification System for Video Content Using Digital Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
New Directions in Intelligent Interactive Multimedia ![In: New Directions in Intelligent Interactive Multimedia, pp. 363-372, 2008, Springer, 978-3-540-68126-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
evaluation, video watermarking, integrity verification |
29 | Mark Thober, J. Aaron Pendergrass, C. Durward McDonell |
Improving coherency of runtime integrity measurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008, pp. 51-60, 2008, ACM, 978-1-60558-295-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
LKIM, coherency, XEN, copy-on-write, integrity measurement |
29 | Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani |
A type system for data-flow integrity on windows vista. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, PLAS 2008, Tucson, AZ, USA, June 8, 2008, pp. 89-100, 2008, ACM, 978-1-59593-936-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data-flow integrity, hybrid type system, explicit substitution, dynamic access control |
29 | Hamidah Ibrahim, Zarina Dzolkhifli, Praveen Madiraju |
Checking the Integrity Constraints of Mobile Databases with Three-Level Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BNCOD ![In: Sharing Data, Information and Knowledge, 25th British National Conference on Databases, BNCOD 25, Cardiff, UK, July 7-10, 2008. Proceedings, pp. 185-188, 2008, Springer, 978-3-540-70503-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
integrity constraints, Mobile databases, constraint checking |
29 | Juan A. Garay, Lorenz Huelsbergen |
Software integrity protection using timed executable agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 189-200, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
mobile code and agent security, software-based attestation, intrusion detection, data integrity, program analysis |
29 | Donald Joyce |
Raising awareness about academic integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 11th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2006, Bologna, Italy, June 26-28, 2006, pp. 350, 2006, ACM, 1-59593-055-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
academic integrity, policies, detection, response |
29 | Carson Kai-Sang Leung, Wookey Lee |
Efficient Update of Data Warehouse Views with Generalised Referential Integrity Differential Files. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BNCOD ![In: Flexible and Efficient Information Handling, 23rd British National Conference on Databases, BNCOD 23, Belfast, Northern Ireland, UK, July 18-20, 2006, Proceedings, pp. 199-211, 2006, Springer, 3-540-35969-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
referential integrity constraints, snowflake schema, galaxy schema, Data warehousing, view maintenance, self-maintainability |
29 | Taejoon Park, Kang G. Shin |
Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 4(3), pp. 297-309, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
program-integrity verification, a randomized hash function, sensor networks, Tamper-proofing |
29 | Richard F. Paige, Howard Chivers, John A. McDermid, Zoë R. Stephenson |
High-integrity extreme programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005, pp. 1518-1523, 2005, ACM, 1-58113-964-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
extreme programming, agile development, high-integrity systems |
29 | Aygul Mamut, Elkin Vumar |
A Note on the Integrity of Middle Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CJCDGCGT ![In: Discrete Geometry, Combinatorics and Graph Theory, 7th China-Japan Conference, CJCDGCGT 2005, Tianjin, China, November 18-20, 2005, Xi'an, China, November 22-24, 2005, Revised Selected Papers, pp. 130-134, 2005, Springer, 978-3-540-70665-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
vertex dominating number, integrity, independence number, covering number |
29 | Fabian Büttner, Hanna Bauerdick, Martin Gogolla |
Towards Transformation of Integrity Constraints and Database States. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 22-26 August 2005, Copenhagen, Denmark, pp. 823-828, 2005, IEEE Computer Society, 0-7695-2424-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
constraint transformation, UML, OCL, Integrity constraint, schema transformation, cardinality constraint |
29 | Carson Kai-Sang Leung, Wookey Lee |
Exploitation of Referential Integrity Constraints for Efficient Update of Data Warehouse Views. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BNCOD ![In: Database: Enterprise, Skills and Innovation, 22nd British National Conference on Databases, BNCOD 22, Sunderland, UK, July 5-7, 2005, Proceedings, pp. 98-110, 2005, Springer, 3-540-26973-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
referential integrity constraints, Data warehousing, view maintenance, star schema, self-maintainability |
29 | Milena Milenkovic, Aleksandar Milenkovic, Emil Jovanov |
Hardware support for code integrity in embedded processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASES ![In: Proceedings of the 2005 International Conference on Compilers, Architecture, and Synthesis for Embedded Systems, CASES 2005, San Francisco, California, USA, September 24-27, 2005, pp. 55-65, 2005, ACM, 1-59593-149-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
attacks, code integrity, code injection |
29 | Wen-Kui Chang, Chun-Yuan Chen |
Integrity-Enhanced Verification Scheme for Software-Intensive Organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATVA ![In: Automated Technology for Verification and Analysis: Second International Conference, ATVA 2004, Taipei, Taiwan, ROC, October 31-November 3, 2004. Proceedings, pp. 402-414, 2004, Springer, 3-540-23610-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Software Capability Level, Software Integrity Level, ISO 9001:2000, Software Process Improvement (SPI), CMMI, Software Verification and Validation |
29 | Song Yuan, Sorin A. Huss |
Audio watermarking algorithm for real-time speech integrity and authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 6th workshop on Multimedia & Security, MM&Sec 2004, Magdeburg, Germany, September 20-21, 2004, pp. 220-226, 2004, ACM, 1-58113-854-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
integrity and source origin authentication, real-time multimedia communication and internet telephony, speech watermarking |
29 | Wenfei Fan, Leonid Libkin |
On XML integrity constraints in the presence of DTDs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 49(3), pp. 368-406, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
XML, XML, Consistency, integrity constraints, DTDs, implication |
29 | Eladio Domínguez, Jorge Lloret, María Antonia Zapata |
Integrity Constraint Enforcement by Means of Trigger Templates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADVIS ![In: Advances in Information Systems, Second International Conference, ADVIS 2002, Izmir, Turkey, October 23-25, 2002, Proceedings, pp. 54-64, 2002, Springer, 3-540-00009-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Integrity constraint enforcement, Trigger generation, Trigger template, Active database systems |
29 | Timothy Fraser |
LOMAC: Low Water-Mark Integrity Protection for COTS Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, 2000, pp. 230-245, 2000, IEEE Computer Society, 0-7695-0665-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
low water-mark, linux security, access control, integrity, mandatory access control, security policy model |
29 | Anne Doucet, Stéphane Gançarski, Claudia León, Marta Rukoz |
Nested Transactions with Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMLDO - Selected Papers ![In: Transactions and Database Dynamics, Eight International Workshop on Foundations of Models and Languages for Data and Objects, Schloß Dagstuhl, Germany, September 27-30, 1999, Selected Papers, pp. 130-149, 1999, Springer, 3-540-67201-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
partial abort, integrity constraints, nested transactions |
29 | Steve Michell, Mark Saaltink |
Guidance on the Use of Ada95 in High Integrity Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ada-Europe ![In: Reliable Software Technologies - Ada-Europe '98, 1998 Ada-Europe International Conference on Reliable Software Technologies, Uppsala, Sweden, June 8-12, 1998, Proceedings, pp. 276-287, 1998, Springer, 3-540-64536-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
HRG, Ada, critical systems, predictable systems, high integrity systems |
29 | Ann Q. Gates, C. Kubo Della-Piana |
The identification of integrity constraints in requirements for context monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECBS ![In: 1997 Workshop on Engineering of Computer-Based Systems (ECBS '97), March 24-28, 1997, Monterey, CA, USA, pp. 498-506, 1997, IEEE Computer Society, 0-8186-7889-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
application-specific knowledge, specialized knowledge, software engineering, formal specification, requirements, integrity constraints, development team, context monitoring |
29 | X. C. Dellanoy, C. Del Vigna |
Binary Integrity Constraints Against Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 7th International Conference, DEXA '96, Zurich, Switzerland, September 9-13, 1996, Proceedings, pp. 264-275, 1996, Springer, 3-540-61656-X. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Discretionary Models of Confidentiality, Integrity Constraints, Relational Model, Covert Channel |
29 | Anne Doucet, Stéphane Gançarski, Geneviève Jomier, Sophie Monties |
Integrity Constraints in Multiversion Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BNCOD ![In: Advances in Databases, 14th British National Conferenc on Databases, BNCOD 14, Edinburgh, UK, July 3-5, 1996, Proceedings, pp. 56-73, 1996, Springer, 3-540-61442-7. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
database, consistency, integrity constraints, versions |
29 | Udo W. Lipeck |
Transformation of Dynamic Integrity Constraints into Transaction Specifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDT ![In: ICDT'88, 2nd International Conference on Database Theory, Bruges, Belgium, August 31 - September 2, 1988, Proceedings, pp. 322-337, 1988, Springer, 3-540-50171-1. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
pre/postconditions, constraint simplification, integrity, monitoring, temporal logic, transactions, dynamic constraints, transition graphs |
29 | Li Jiang, Lingdi Ping, Xuezeng Pan |
Handling Dynamic Information Release. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings, pp. 64-76, 2007, Springer, 978-3-540-76787-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
languages, Computer security, information flow, security-type systems |
29 | Andrew Yang, Rajit Chandra, Simon Burke, Javier A. DeLaCruz, Sribalan Santhanam, Uming Ko |
Entering the hot zone - can you handle the heat and be cool? ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 43rd Design Automation Conference, DAC 2006, San Francisco, CA, USA, July 24-28, 2006, pp. 174-175, 2006, ACM, 1-59593-381-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
IC packaging, thermal effects, low power |
29 | C. B. Balogh, M. E. Balogh |
A relational data model to represent meaning in natural language sentences (abstract only). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Conference on Computer Science ![In: Proceedings of the 15th ACM Annual Conference on Computer Science, St. Louis, Missouri, USA, February 16-19, 1987, pp. 368, 1987, ACM, 0-89791-218-7. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
29 | Olivier Le-Marchand, Philippe Bonnifait, Javier Ibañez-Guzmán, David Bétaille |
Vehicle localization integrity based on trajectory monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IROS ![In: 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems, October 11-15, 2009, St. Louis, MO, USA, pp. 3453-3458, 2009, IEEE, 978-1-4244-3803-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Fabrizio Baiardi, Diego Cilea, Daniele Sgandurra, Francesco Ceccarelli |
Measuring Semantic Integrity for Remote Attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings, pp. 81-100, 2009, Springer, 978-3-642-00586-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Michel Banâtre, Fabien Allard, Paul Couderc |
Ubi-Check: A Pervasive Integrity Checking System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NEW2AN ![In: Smart Spaces and Next Generation Wired/Wireless Networking, 9th International Conference, NEW2AN 2009 and Second Conference on Smart Spaces, ruSMART 2009, St. Petersburg, Russia, September 15-18, 2009. Proceedings, pp. 89-96, 2009, Springer, 978-3-642-04188-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Wei-Shinn Ku, Ling Hu, Cyrus Shahabi, Haixun Wang |
Query Integrity Assurance of Location-Based Services Accessing Outsourced Spatial Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSTD ![In: Advances in Spatial and Temporal Databases, 11th International Symposium, SSTD 2009, Aalborg, Denmark, July 8-10, 2009, Proceedings, pp. 80-97, 2009, Springer, 978-3-642-02981-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Zarina Dzolkhifli, Hamidah Ibrahim, Lilly Suriani Affendey |
Analyzing Integrity Tests for Data Caching in Mobile Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, 5th International Conference, ICDCIT 2008, New Delhi, India, December 10-12, 2008. Proceedings, pp. 157-165, 2008, Springer, 978-3-540-89736-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Francesc D. Muñoz-Escoí, María Idoia Ruiz-Fuertes, Hendrik Decker, José Enrique Armendáriz-Iñigo, José Ramón González de Mendívil |
Extending Middleware Protocols for Database Replication with Integrity Support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (1) ![In: On the Move to Meaningful Internet Systems: OTM 2008, OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part I, pp. 607-624, 2008, Springer, 978-3-540-88870-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Yang Yang, Huanguo Zhang, Li Wan, Bingyu Zou |
Design and Implementation of an Integrity Measurement System Based on Windows Trusted Computing Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 229-233, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Luciano Caroprese, Miroslaw Truszczynski |
Declarative Semantics for Active Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICLP ![In: Logic Programming, 24th International Conference, ICLP 2008, Udine, Italy, December 9-13 2008, Proceedings, pp. 269-283, 2008, Springer, 978-3-540-89981-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Zarina Dzolkhifli, Hamidah Ibrahim, Lilly Suriani Affendey, Praveen Madiraju |
A framework for caching relevant data items for checking integrity constraints of mobile database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIM ![In: Third IEEE International Conference on Digital Information Management (ICDIM), November 13-16, 2008, London, UK, Proceedings, pp. 476-482, 2008, IEEE, 978-1-4244-2917-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Hendrik Decker, Davide Martinenghi |
A Relaxed Approach to Integrity and Inconsistency in Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LPAR ![In: Logic for Programming, Artificial Intelligence, and Reasoning, 13th International Conference, LPAR 2006, Phnom Penh, Cambodia, November 13-17, 2006, Proceedings, pp. 287-301, 2006, Springer, 3-540-48281-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Johannes Osrael, Lorenz Froihofer, Karl M. Göschka |
A Replication Model for Trading Data Integrity against Availability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 18-20 December, 2006, University of California, Riverside, USA, pp. 377-378, 2006, IEEE Computer Society, 0-7695-2724-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Hendrik Decker, Davide Martinenghi |
Checking Violation Tolerance of Approaches to Database Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADVIS ![In: Advances in Information Systems, 4th International Conference, ADVIS 2006, Izmir, Turkey, October 18-20, 2006, Proceedings, pp. 139-148, 2006, Springer, 3-540-46291-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Davide Martinenghi, Henning Christiansen 0001 |
Transaction Management with Integrity Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 16th International Conference, DEXA 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, pp. 606-615, 2005, Springer, 3-540-28566-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Hendrik Decker |
Total Unbiased Multivalued Paraconsistent Semantics of Database Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 22-26 August 2005, Copenhagen, Denmark, pp. 813-817, 2005, IEEE Computer Society, 0-7695-2424-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Michelangelo Giansiracusa, Selwyn Russell, Andrew J. Clark, John Hynd |
An Improved Execution Integrity Solution for Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings, pp. 170-183, 2005, Springer, 3-540-26547-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Avishai Wool |
A note on the fragility of the "Michael" message integrity code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 3(5), pp. 1459-1462, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Davide Martinenghi |
Simplification of Integrity Constraints with Aggregates and Arithmetic Built-Ins. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FQAS ![In: Flexible Query Answering Systems, 6th International Conference, FQAS 2004, Lyon, France, June 24-26, 2004, Proceedings, pp. 348-361, 2004, Springer, 3-540-22160-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Fangyong Hou, Zhiying Wang, Yuhua Tang, Zhen Liu |
Protecting integrity and confidentiality for data communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28 - July 1, 2004, Alexandria, Egypt, pp. 357-362, 2004, IEEE Computer Society, 0-7803-8623-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Fangyong Hou, Zhiying Wang, Yuhua Tang, Jifeng Liu |
Verify Memory Integrity Basing on Hash Tree and MAC Combined Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC ![In: Embedded and Ubiquitous Computing, International Conference EUC 2004, Aizu-Wakamatsu City, Japan, August 25-27, 2004, Proceedings, pp. 869-878, 2004, Springer, 3-540-22906-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Luiz Camolesi Jr. |
Survivability and Applicability in Database Constraints: Temporal Boundary to Data Integrity Scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 518-522, 2004, IEEE Computer Society, 0-7695-2108-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Henning Christiansen 0001, Davide Martinenghi |
Simplification of Integrity Constraints for Data Integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FoIKS ![In: Foundations of Information and Knowledge Systems, Third International Symposium, FoIKS 2004, Wilhelminenberg Castle, Austria, February 17-20, 2004, Proceedings, pp. 31-48, 2004, Springer, 3-540-20965-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Nisar Ahmed, Mohammad H. Tehranipour, Mehrdad Nourani |
Extending JTAG for Testing Signal Integrity in SoCs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 2003 Design, Automation and Test in Europe Conference and Exposition (DATE 2003), 3-7 March 2003, Munich, Germany, pp. 10218-10223, 2003, IEEE Computer Society, 0-7695-1870-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire |
Hop integrity in computer networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 10(3), pp. 308-319, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
SYN attack, message modification, message replay, smurf attack, security, internet, authentication, network protocol, router, denial-of-service attack |
Displaying result #101 - #200 of 9246 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|