On Keys and Normal Forms
نویسنده
چکیده
منابع مشابه
Extending Existing Dependency Theory to Temporal Databases
Normal forms play a central role in the design of relational databases. Several normal forms for temporal relational databases have been proposed. These definitions are particular to specific temporal data models, which are numerous and incompatible. This paper attempts to rectify this situation. We define a consistent framework of temporal equivalents of the important conventional database des...
متن کاملEffect of different land use on Potassium forms and some soil properties in Kohgiluyeh and Boyer-Ahmad Province, Southwest Iran
The pasture and forest land use change to agricultural use can effect on many properties of the soil and its productivity. The present research aims to investigate various forms of K (soluble, exchangeable, non-exchangeable, and structural forms) and some soil properties in different land use of three areas including Choram, Kakan and Bahmaei in Kohgiluyeh and Buyer-Ahmad Province. Four profile...
متن کاملHealthy Diet in Children: Facts and Keys
Consuming a healthy diet throughout the lifecourse helps prevent malnutrition in all its forms as well as a range of Non-communicable diseases (NCDs) and conditions. But the increased production of processed food, rapid urbanization and changing lifestyles have led to a shift in dietary patterns. People are now consuming more foods high in energy, fats, free sugars or salt/sodium, and many do n...
متن کاملDiffie-Hellman technique: extended to multiple two-party keys and one multi-party key
Diffie –Hellman technique: extended to multiple two-party keys and one multi-party key Abstract: The two-party Diffie– Hellman (DH) key-exchanging technique is extended to generate (i) multiple two-party keys and (ii) one multi-party key. The participants in the former case exchange two public keys and generate 15 shared keys. Of these, 4 keys are called base keys, because they are used to gene...
متن کاملImproving BDD Cryptosystems in General Lattices
A prime goal of Lattice-based cryptosystems is to provide an enhanced security assurance by remaining secure with respect to quantum computational complexity, while remaining practical on conventional computer systems. In this paper, we define and analyze a superclass of GGH-style nearly-orthogonal bases for use in private keys, together with a subclass of Hermite Normal Forms for use in Miccia...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Inf. Process. Lett.
دوره 62 شماره
صفحات -
تاریخ انتشار 1997