|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5416 occurrences of 2387 keywords
|
|
|
Results
Found 9246 publication records. Showing 9246 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
34 | Vandana Gunupudi, Stephen R. Tate |
Performance Evaluation of Data Integrity Mechanisms for Mobile Agents. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
Mobile Agents, Data Integrity, Internet Security |
34 | Austin Gilbert, Ajith Abraham, Marcin Paprzycki |
A System for Ensuring Data Integrity in Grid Environments. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
distributed trust, data integrity, reputation system, Grid security |
34 | Murat R. Becer, Ravi Vaidyanathan, Chanhee Oh, Rajendran Panda |
Signal integrity management in an SoC physical design flow. |
ISPD |
2003 |
DBLP DOI BibTeX RDF |
noise avoidance, noise repair, signal integrity, crosstalk noise |
34 | Anne Doucet, Stéphane Gançarski, Claudia León, Marta Rukoz |
Checking Integrity Constraints in Multidatabase Systems with Nested Transactions. |
CoopIS |
2001 |
DBLP DOI BibTeX RDF |
Integrity constraints, Consistency checking, Distributed transactions, Multidatabase systems, Nested transactions |
34 | Isabelle Mirbel, Barbara Pernici, Timos K. Sellis, S. Tserkezoglou, Michalis Vazirgiannis |
Checking the Temporal Integrity of Interactive Multimedia Documents. |
VLDB J. |
2000 |
DBLP DOI BibTeX RDF |
Temporal integrity, Multimedia presentation, Constraint networks |
34 | Pietro Iglio |
TrustedBox: A Kernel-Level Integrity Checker. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
integrity checker |
34 | Andreas Diener, Andreas Dudler |
The integrity subsystem of a distributed database system for workstations. |
ACM Conference on Computer Science |
1985 |
DBLP DOI BibTeX RDF |
professional workstation, data integrity, distributed database, transaction, database design, data replication |
33 | Ruirui C. Huang, G. Edward Suh |
IVEC: off-chip memory integrity protection for both security and reliability. |
ISCA |
2010 |
DBLP DOI BibTeX RDF |
security, fault tolerance, reliability, error detection, error correction, memory systems |
33 | Luciano Caroprese, Sergio Greco, Ester Zumpano |
Active Integrity Constraints for Database Consistency Maintenance. |
IEEE Trans. Knowl. Data Eng. |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Xinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert |
Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms. |
MobiSec |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Javier García-García 0001, Carlos Ordonez 0001 |
Estimating and bounding aggregations in databases with referential integrity errors. |
DOLAP |
2008 |
DBLP DOI BibTeX RDF |
SQL, data quality, functions |
33 | María Idoia Ruiz-Fuertes, Francesc D. Muñoz-Escoí, Hendrik Decker, José Enrique Armendáriz-Iñigo, José Ramón González de Mendívil |
Integrity Dangers in Certification-Based Replication Protocols. |
OTM Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Weiqing Sun, R. Sekar 0001, Gaurav Poothia, Tejas Karandikar |
Practical Proactive Integrity Preservation: A Basis for Malware Defense. |
SP |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Luciano Caroprese, Sergio Greco, Cristina Sirangelo, Ester Zumpano |
Declarative Semantics of Production Rules for Integrity Maintenance. |
ICLP |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Lorenz Froihofer, Johannes Osrael, Karl M. Göschka |
Trading Integrity for Availability by Means of Explicit Runtime Constraints. |
COMPSAC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Zhao-Li Zhang, Fan Hong, Hai-Jun Xiao |
Verification of Strict Integrity Policy via Petri Nets. |
ICSNC |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Jan Chomicki, Jerzy Marcinkowski |
On the Computational Complexity of Minimal-Change Integrity Maintenance in Relational Databases. |
Inconsistency Tolerance |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Christopher Popfinger, Stefan Conrad 0001 |
Maintaining Global Integrity in Federated Relational Databases Using Interactive Component Systems. |
OTM Conferences (1) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Xiaolan Joy Zhang, Brian King |
Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Christian Decker 0001, Michael Beigl, Albert Krohn, Philip Robinson, Uwe Kubach |
eSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity. |
Pervasive |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Peter G. Bishop, Robin E. Bloomfield, Tim Clement, Sofia Guerra, Claire Jones |
Integrity Static Analysis of COTS/SOUP. |
SAFECOMP |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Levent V. Orman |
Transaction Repair for Integrity Enforcement. |
IEEE Trans. Knowl. Data Eng. |
2001 |
DBLP DOI BibTeX RDF |
|
33 | Xiaochun Yang 0001, Ge Yu 0001, Guoren Wang |
Efficiently Mapping Integrity Constraints from Relational Database to XML Document. |
ADBIS |
2001 |
DBLP DOI BibTeX RDF |
|
33 | Can Türker, Gunter Saake |
Consistent Handling of Integrity Constraints and Extensional Assertions for Schema Integration. |
ADBIS |
1999 |
DBLP DOI BibTeX RDF |
|
33 | Leopoldo E. Bertossi, Javier Pinto, Pablo Sáez, Deepak Kapur, Mahadevan Subramaniam |
Automating Proofs of Integrity Constraints in Situation Calculus. |
ISMIS |
1996 |
DBLP DOI BibTeX RDF |
|
33 | Magdi N. Kamel |
A Prototype Rule-Based Front End System for Integrity Enforcement in Relational Databases: An Application to the Naval Aircraft Flight Records Database. |
DEXA |
1994 |
DBLP DOI BibTeX RDF |
|
33 | Richard Taylor 0002 |
An Integrity Check Value Algorithm for Stream Ciphers. |
CRYPTO |
1993 |
DBLP DOI BibTeX RDF |
|
33 | François Bry, Rainer Manthey, Bern Martens |
Integrity Verification in Knowledge Bases. |
RCLP |
1991 |
DBLP DOI BibTeX RDF |
|
33 | Keith W. Miller 0001, Jeffrey M. Voas |
Information Integrity and IT Professionals' Integrity, Intertwined. |
IT Prof. |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Srdjan Capkun, Mario Cagalj, Ram Kumar Rengaswamy, Ilias Tsigkogiannis, Jean-Pierre Hubaux, Mani B. Srivastava |
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels. |
IEEE Trans. Dependable Secur. Comput. |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, Ram Kumar Rengaswamy, Ilias Tsigkogiannis, Mani B. Srivastava |
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels. |
S&P |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Leo Motus, R. Kinksaar, Tonu Naks, M. Pall |
Enhancing object modelling technique with timing analysis capabilities. |
ICECCS |
1995 |
DBLP DOI BibTeX RDF |
enhanced object modelling technique, timing analysis capabilities, timing correctness, software implementation problems, specification problems, time-constraint elicitation, Q-model, noncontradiction analysis, time modelling requirements, performance, software engineering, real-time systems, real-time systems, data integrity, timing, scheduling algorithms, timing constraints, object-oriented methods, consistency checking, application domain, integrity checking, design problems |
30 | R. K. Shyamasundar, James W. Thatcher |
Language Constructs for Specifying Concurrency in CDL*. |
IEEE Trans. Software Eng. |
1989 |
DBLP DOI BibTeX RDF |
CDL* concurrency specification, dynamically allocating resources, CDL*, distributed programming languages, parallel programming, data integrity, data integrity, anonymity, specification languages, mutual exclusion, expressiveness, specification techniques, modular specification, language constructs, abstraction mechanisms, dynamic resource management |
30 | Michael Stonebraker, Eric N. Hanson, Spyros Potamianos |
The POSTGRES Rule Manager. |
IEEE Trans. Software Eng. |
1988 |
DBLP DOI BibTeX RDF |
priority rules, POSTGRES rule manager, rule subsystem, optimization, relational databases, relational databases, expert systems, expert systems, DBMS, query languages, knowledge engineering, knowledge engineering, integrity constraints, exceptions, forward-chaining, inferencing, referential integrity, backward-chaining |
30 | Surya Nepal, Shiping Chen 0001, Jinhui Yao, Danan Thilakanathan |
DIaaS: Data Integrity as a Service in the Cloud. |
IEEE CLOUD |
2011 |
DBLP DOI BibTeX RDF |
data integrity as a service, security, data integrity, cloud storage |
30 | Jasim A. Ghaeb |
Integrity Assurance Technique Using Determinant Approach. |
GPC Workshops |
2009 |
DBLP DOI BibTeX RDF |
Storage integrity, Security, Data integrity, Error detection |
30 | Levent V. Orman |
Differential Relational Calculus for Integrity Maintenance. |
IEEE Trans. Knowl. Data Eng. |
1998 |
DBLP DOI BibTeX RDF |
integrity maintenance, formal differentiation, relational database, first-order logic, Database integrity |
30 | Riccardo Scandariato, Yoram Ofek, Paolo Falcarin, Mario Baldi |
Application-Oriented Trust in Distributed Computing. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
trustworthy computing, Code integrity |
30 | Bernhard Jansen, HariGovind V. Ramasamy, Matthias Schunter |
Policy enforcement and compliance proofs for Xen virtual machines. |
VEE |
2008 |
DBLP DOI BibTeX RDF |
virtual machines, trusted computing, integrity management |
30 | Jinhyung Kim, Dongwon Jeong, Yixin Jing, Doo-Kwon Baik |
QP-T: Query Pattern-Based RDB-to-XML Translation. |
OTM Workshops (2) |
2006 |
DBLP DOI BibTeX RDF |
Relational Schema Model, XML Shema Model, Referential Integrity Relation Information, Query Pattern |
30 | Hendrik Decker |
Abduction for Knowledge Assimilation in Deductive Databases. |
SCCC |
1997 |
DBLP DOI BibTeX RDF |
integrity maintenance, knowledge assimilation, SLDAI, SLD-based proof procedure, update request, hypothetical fact insertions, hypothetical fact deletions, base predicates, abductive logic programming, deductive databases, deductive databases, abduction |
30 | Yuejun Jiang |
An Autoepistemic Logical View of Knowledge Base. |
FSTTCS |
1989 |
DBLP DOI BibTeX RDF |
AI in Database, Incomplete knowledge, Complete Database, Nonstandard Logic, Modal logic, Deductive database, Integrity Constraints, Non-monotonic logic, Closed World Assumption, Possible worlds semantics, Autoepistemic logic |
29 | Yiannis Papadopoulos, Martin Walker, Mark-Oliver Reiser, Matthias Weber 0001, De-Jiu Chen, Martin Törngren, David Servat, Andreas Abele, Friedhelm Stappert, Henrik Lönn, L. Berntsson, Rolf Johansson 0002, Fulvio Tagliabo, Sandra Torchiaro, Anders Sandberg |
Automatic allocation of safety integrity levels. |
EDCC-CARS |
2010 |
DBLP DOI BibTeX RDF |
CENELEC standards, HiP-HOPS, ISO 26262, SIL allocation, fault tree synthesis, safety integrity levels, IEC 61508 |
29 | Martim Carbone, Weidong Cui, Long Lu, Wenke Lee, Marcus Peinado, Xuxian Jiang |
Mapping kernel objects to enable systematic integrity checking. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
kernel integrity, memory analysis, malware, pointer analysis, introspection |
29 | Kamil Pietak, Adam Wos, Aleksander Byrski, Marek Kisiel-Dorohinicki |
Functional Integrity of Multi-agent Computational System Supported by Component-Based Implementation. |
HoloMAS |
2009 |
DBLP DOI BibTeX RDF |
functional integrity, mutli-agent systems, components |
29 | Fangyong Hou, Nong Xiao, Yuhua Tang, Hongjun He, Fang Liu 0002 |
Protect Disk Integrity: Solid Security, Fine Performance and Fast Recovery. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
hash tree, performance, integrity, consistency, disk |
29 | Fengwei Li, Qingfang Ye, Baohuai Sheng |
On Integrity of Harary Graphs. |
COCOA |
2009 |
DBLP DOI BibTeX RDF |
Harary Graph, Networks, Integrity, Independence Number |
29 | Dimitris Vartziotis, Alkis Poulis, Alexandros Minogiannis, Panagiotis Siozos, Iraklis Goudas, Jaron Samson, Michel Tossaint |
Feasibility of a GNSS-Probe for Creating Digital Maps of High Accuracy and Integrity. |
MOBILIGHT |
2009 |
DBLP DOI BibTeX RDF |
GNSS, EGNOS, ADAS, Integrity, Accuracy, Digital Maps |
29 | Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani |
A type system for data-flow integrity on Windows Vista. |
ACM SIGPLAN Notices |
2008 |
DBLP DOI BibTeX RDF |
data-flow integrity, hybrid type system, explicit substitution, dynamic access control |
29 | Katharine Chang, Kang G. Shin |
Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
Distributed authentication, node revocation, program integrity verification, wireless sensor networks |
29 | Takaaki Yamada, Yoshiyasu Takahashi, Yasuhiro Fujii, Ryu Ebisawa, Hiroshi Yoshiura, Isao Echizen |
Evaluation of Integrity Verification System for Video Content Using Digital Watermarking. |
New Directions in Intelligent Interactive Multimedia |
2008 |
DBLP DOI BibTeX RDF |
evaluation, video watermarking, integrity verification |
29 | Mark Thober, J. Aaron Pendergrass, C. Durward McDonell |
Improving coherency of runtime integrity measurement. |
STC |
2008 |
DBLP DOI BibTeX RDF |
LKIM, coherency, XEN, copy-on-write, integrity measurement |
29 | Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani |
A type system for data-flow integrity on windows vista. |
PLAS |
2008 |
DBLP DOI BibTeX RDF |
data-flow integrity, hybrid type system, explicit substitution, dynamic access control |
29 | Hamidah Ibrahim, Zarina Dzolkhifli, Praveen Madiraju |
Checking the Integrity Constraints of Mobile Databases with Three-Level Model. |
BNCOD |
2008 |
DBLP DOI BibTeX RDF |
integrity constraints, Mobile databases, constraint checking |
29 | Juan A. Garay, Lorenz Huelsbergen |
Software integrity protection using timed executable agents. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
mobile code and agent security, software-based attestation, intrusion detection, data integrity, program analysis |
29 | Donald Joyce |
Raising awareness about academic integrity. |
ITiCSE |
2006 |
DBLP DOI BibTeX RDF |
academic integrity, policies, detection, response |
29 | Carson Kai-Sang Leung, Wookey Lee |
Efficient Update of Data Warehouse Views with Generalised Referential Integrity Differential Files. |
BNCOD |
2006 |
DBLP DOI BibTeX RDF |
referential integrity constraints, snowflake schema, galaxy schema, Data warehousing, view maintenance, self-maintainability |
29 | Taejoon Park, Kang G. Shin |
Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks. |
IEEE Trans. Mob. Comput. |
2005 |
DBLP DOI BibTeX RDF |
program-integrity verification, a randomized hash function, sensor networks, Tamper-proofing |
29 | Richard F. Paige, Howard Chivers, John A. McDermid, Zoë R. Stephenson |
High-integrity extreme programming. |
SAC |
2005 |
DBLP DOI BibTeX RDF |
extreme programming, agile development, high-integrity systems |
29 | Aygul Mamut, Elkin Vumar |
A Note on the Integrity of Middle Graphs. |
CJCDGCGT |
2005 |
DBLP DOI BibTeX RDF |
vertex dominating number, integrity, independence number, covering number |
29 | Fabian Büttner, Hanna Bauerdick, Martin Gogolla |
Towards Transformation of Integrity Constraints and Database States. |
DEXA Workshops |
2005 |
DBLP DOI BibTeX RDF |
constraint transformation, UML, OCL, Integrity constraint, schema transformation, cardinality constraint |
29 | Carson Kai-Sang Leung, Wookey Lee |
Exploitation of Referential Integrity Constraints for Efficient Update of Data Warehouse Views. |
BNCOD |
2005 |
DBLP DOI BibTeX RDF |
referential integrity constraints, Data warehousing, view maintenance, star schema, self-maintainability |
29 | Milena Milenkovic, Aleksandar Milenkovic, Emil Jovanov |
Hardware support for code integrity in embedded processors. |
CASES |
2005 |
DBLP DOI BibTeX RDF |
attacks, code integrity, code injection |
29 | Wen-Kui Chang, Chun-Yuan Chen |
Integrity-Enhanced Verification Scheme for Software-Intensive Organizations. |
ATVA |
2004 |
DBLP DOI BibTeX RDF |
Software Capability Level, Software Integrity Level, ISO 9001:2000, Software Process Improvement (SPI), CMMI, Software Verification and Validation |
29 | Song Yuan, Sorin A. Huss |
Audio watermarking algorithm for real-time speech integrity and authentication. |
MM&Sec |
2004 |
DBLP DOI BibTeX RDF |
integrity and source origin authentication, real-time multimedia communication and internet telephony, speech watermarking |
29 | Wenfei Fan, Leonid Libkin |
On XML integrity constraints in the presence of DTDs. |
J. ACM |
2002 |
DBLP DOI BibTeX RDF |
XML, XML, Consistency, integrity constraints, DTDs, implication |
29 | Eladio Domínguez, Jorge Lloret, María Antonia Zapata |
Integrity Constraint Enforcement by Means of Trigger Templates. |
ADVIS |
2002 |
DBLP DOI BibTeX RDF |
Integrity constraint enforcement, Trigger generation, Trigger template, Active database systems |
29 | Timothy Fraser |
LOMAC: Low Water-Mark Integrity Protection for COTS Environments. |
S&P |
2000 |
DBLP DOI BibTeX RDF |
low water-mark, linux security, access control, integrity, mandatory access control, security policy model |
29 | Anne Doucet, Stéphane Gançarski, Claudia León, Marta Rukoz |
Nested Transactions with Integrity Constraints. |
FMLDO - Selected Papers |
1999 |
DBLP DOI BibTeX RDF |
partial abort, integrity constraints, nested transactions |
29 | Steve Michell, Mark Saaltink |
Guidance on the Use of Ada95 in High Integrity Systems. |
Ada-Europe |
1998 |
DBLP DOI BibTeX RDF |
HRG, Ada, critical systems, predictable systems, high integrity systems |
29 | Ann Q. Gates, C. Kubo Della-Piana |
The identification of integrity constraints in requirements for context monitoring. |
ECBS |
1997 |
DBLP DOI BibTeX RDF |
application-specific knowledge, specialized knowledge, software engineering, formal specification, requirements, integrity constraints, development team, context monitoring |
29 | X. C. Dellanoy, C. Del Vigna |
Binary Integrity Constraints Against Confidentiality. |
DEXA |
1996 |
DBLP DOI BibTeX RDF |
Discretionary Models of Confidentiality, Integrity Constraints, Relational Model, Covert Channel |
29 | Anne Doucet, Stéphane Gançarski, Geneviève Jomier, Sophie Monties |
Integrity Constraints in Multiversion Databases. |
BNCOD |
1996 |
DBLP DOI BibTeX RDF |
database, consistency, integrity constraints, versions |
29 | Udo W. Lipeck |
Transformation of Dynamic Integrity Constraints into Transaction Specifications. |
ICDT |
1988 |
DBLP DOI BibTeX RDF |
pre/postconditions, constraint simplification, integrity, monitoring, temporal logic, transactions, dynamic constraints, transition graphs |
29 | Li Jiang, Lingdi Ping, Xuezeng Pan |
Handling Dynamic Information Release. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
languages, Computer security, information flow, security-type systems |
29 | Andrew Yang, Rajit Chandra, Simon Burke, Javier A. DeLaCruz, Sribalan Santhanam, Uming Ko |
Entering the hot zone - can you handle the heat and be cool? |
DAC |
2006 |
DBLP DOI BibTeX RDF |
IC packaging, thermal effects, low power |
29 | C. B. Balogh, M. E. Balogh |
A relational data model to represent meaning in natural language sentences (abstract only). |
ACM Conference on Computer Science |
1987 |
DBLP DOI BibTeX RDF |
|
29 | Olivier Le-Marchand, Philippe Bonnifait, Javier Ibañez-Guzmán, David Bétaille |
Vehicle localization integrity based on trajectory monitoring. |
IROS |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Fabrizio Baiardi, Diego Cilea, Daniele Sgandurra, Francesco Ceccarelli |
Measuring Semantic Integrity for Remote Attestation. |
TRUST |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Michel Banâtre, Fabien Allard, Paul Couderc |
Ubi-Check: A Pervasive Integrity Checking System. |
NEW2AN |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Wei-Shinn Ku, Ling Hu, Cyrus Shahabi, Haixun Wang |
Query Integrity Assurance of Location-Based Services Accessing Outsourced Spatial Databases. |
SSTD |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Zarina Dzolkhifli, Hamidah Ibrahim, Lilly Suriani Affendey |
Analyzing Integrity Tests for Data Caching in Mobile Databases. |
ICDCIT |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Francesc D. Muñoz-Escoí, María Idoia Ruiz-Fuertes, Hendrik Decker, José Enrique Armendáriz-Iñigo, José Ramón González de Mendívil |
Extending Middleware Protocols for Database Replication with Integrity Support. |
OTM Conferences (1) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Yang Yang, Huanguo Zhang, Li Wan, Bingyu Zou |
Design and Implementation of an Integrity Measurement System Based on Windows Trusted Computing Platform. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Luciano Caroprese, Miroslaw Truszczynski |
Declarative Semantics for Active Integrity Constraints. |
ICLP |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Zarina Dzolkhifli, Hamidah Ibrahim, Lilly Suriani Affendey, Praveen Madiraju |
A framework for caching relevant data items for checking integrity constraints of mobile database. |
ICDIM |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Hendrik Decker, Davide Martinenghi |
A Relaxed Approach to Integrity and Inconsistency in Databases. |
LPAR |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Johannes Osrael, Lorenz Froihofer, Karl M. Göschka |
A Replication Model for Trading Data Integrity against Availability. |
PRDC |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Hendrik Decker, Davide Martinenghi |
Checking Violation Tolerance of Approaches to Database Integrity. |
ADVIS |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Davide Martinenghi, Henning Christiansen 0001 |
Transaction Management with Integrity Checking. |
DEXA |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Hendrik Decker |
Total Unbiased Multivalued Paraconsistent Semantics of Database Integrity. |
DEXA Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Michelangelo Giansiracusa, Selwyn Russell, Andrew J. Clark, John Hynd |
An Improved Execution Integrity Solution for Mobile Agents. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Avishai Wool |
A note on the fragility of the "Michael" message integrity code. |
IEEE Trans. Wirel. Commun. |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Davide Martinenghi |
Simplification of Integrity Constraints with Aggregates and Arithmetic Built-Ins. |
FQAS |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Fangyong Hou, Zhiying Wang, Yuhua Tang, Zhen Liu |
Protecting integrity and confidentiality for data communication. |
ISCC |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Fangyong Hou, Zhiying Wang, Yuhua Tang, Jifeng Liu |
Verify Memory Integrity Basing on Hash Tree and MAC Combined Approach. |
EUC |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Luiz Camolesi Jr. |
Survivability and Applicability in Database Constraints: Temporal Boundary to Data Integrity Scenarios. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Henning Christiansen 0001, Davide Martinenghi |
Simplification of Integrity Constraints for Data Integration. |
FoIKS |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Nisar Ahmed, Mohammad H. Tehranipour, Mehrdad Nourani |
Extending JTAG for Testing Signal Integrity in SoCs. |
DATE |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire |
Hop integrity in computer networks. |
IEEE/ACM Trans. Netw. |
2002 |
DBLP DOI BibTeX RDF |
SYN attack, message modification, message replay, smurf attack, security, internet, authentication, network protocol, router, denial-of-service attack |
Displaying result #101 - #200 of 9246 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|