نتایج جستجو برای: integrity approach

تعداد نتایج: 1352060  

1996
Alípio Mário Jorge Pavel Brazdil

: Many state-of-the-art ILP systems require large numbers of negative examples to avoid overgeneralization. This is a considerable disadvantage for many ILP applications, namely inductive program synthesis where relativelly small and sparse example sets are a more realistic scenario. Integrity constraints are first order clauses that can play the role of negative examples in an inductive proces...

2009
Zainul Charbiwala Sadaf Zahedi Younghun Kim Supriyo Chakraborty Mani B. Srivastava Ting He Chatschik Bisdikian

Data loss in wireless sensor systems is inevitable, either due to exogenous (such as transmission medium impediments) or endogenous (such as faulty sensors) causes. While there have been many attempts at coping with this issue, recent developments in the area of Compressive Sensing (CS) enable a new perspective. Since many natural signals are compressible, it is possible to employ CS, not only ...

2015
Qamar Rayees Khan Muheet Ahmed Butt Mohammad Asger Majid Zaman Carol J Fung Jie Zhang Francisco Maciá-Pérez Ing-Ray Chen MoonJeong Chang K. D. Loch H. H. Carr M. E. Warkentin Keecheon Kim

Information is considered to be an asset for any organizations. Malicious attacks/threats can compromise the security and trust of a system, which shall be controlled by introducing Intrusion Detection System. In order to offer maximum security for the confidential data and the corresponding data integrity, a novel Integrity model based Intrusion Detection system is proposed. Hence, the optimum...

1989
Martin Gogolla

An extended entity-relationship model concentrating nearly all concepts of known \semantic" data models and especially allowing arbitrary user de ned data types is introduced. The semantics of the model is described purely in algebraic terms mainly based on the notions of signature, algebra and extension. On this basis a calculus making intensive use of abstract data types is de ned and employe...

2003
Andrea Acquaviva Alessandro Bogliolo

We present a new approach to accurately evaluate signal integrity in digital integrated circuits while working at the logic level. Our approach makes use of fitting models to represent the key properties of drivers, interconnects and receivers and the effects of all noise sources (supply noise, timing uncertainty, crosstalk). Such models are then combined to evaluate the correctness of each bit...

2004
Alan Doig Stephanie McIvor

Much attention is given to the measurement of corruption, both between countries and across time. In part this is necessary to determine which countries face what types and levels of corruption – and consequential reforms – as well as the monitoring the success or otherwise of those reforms. What measures are most suited to the identification of the extent of, or seriousness of, country corrupt...

2000
Véronique Benzaken Serenella Cerrito Sébastien Praud

We address the problem of statically proving, at compilation time, whether the execution of a given transaction m is safe w.r.t. a dynamical integrity constraint in the framework of object oriented database systems. To do so, we formalize dynamical constraints with first order Linear Temporal Logic formulae and we use predicate transformer “à la Dijkstra”, combined with automatic demonstration....

2003
John G. P. Barnes

Follow up what we will offer in this article about high integrity software the spark approach to safety and security. You know really that this book is coming as the best seller book today. So, when you are really a good reader or you're fans of the author, it does will be funny if you don't have this book. It means that you have to get this book. For you who are starting to learn about somethi...

2006
Hendrik Decker Davide Martinenghi

We demonstrate that many, though not all integrity checking methods are able to tolerate inconsistency, without having been aware of it. We show that it is possible to use them to beneficial effect and without further ado, not only for preserving integrity in consistent databases, but also in databases that violate their constraints. This apparently relaxed attitude toward integrity and inconsi...

2002
Emilia Gómez Pedro Cano Leandro de C. T. Gomes Eloi Batlle Madeleine Bonnet

We introduce a method for audio-integrity verification based on a combination of watermarking and fingerprinting. An audio fingerprint is a perceptual digest that holds content information of a recording and allows one to identify it from other recordings. Integrity verification is performed by embedding the fingerprint into the audio signal itself by means of a watermark. The original fingerpr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید