نتایج جستجو برای: integrity approach
تعداد نتایج: 1352060 فیلتر نتایج به سال:
: Many state-of-the-art ILP systems require large numbers of negative examples to avoid overgeneralization. This is a considerable disadvantage for many ILP applications, namely inductive program synthesis where relativelly small and sparse example sets are a more realistic scenario. Integrity constraints are first order clauses that can play the role of negative examples in an inductive proces...
Data loss in wireless sensor systems is inevitable, either due to exogenous (such as transmission medium impediments) or endogenous (such as faulty sensors) causes. While there have been many attempts at coping with this issue, recent developments in the area of Compressive Sensing (CS) enable a new perspective. Since many natural signals are compressible, it is possible to employ CS, not only ...
Information is considered to be an asset for any organizations. Malicious attacks/threats can compromise the security and trust of a system, which shall be controlled by introducing Intrusion Detection System. In order to offer maximum security for the confidential data and the corresponding data integrity, a novel Integrity model based Intrusion Detection system is proposed. Hence, the optimum...
An extended entity-relationship model concentrating nearly all concepts of known \semantic" data models and especially allowing arbitrary user de ned data types is introduced. The semantics of the model is described purely in algebraic terms mainly based on the notions of signature, algebra and extension. On this basis a calculus making intensive use of abstract data types is de ned and employe...
We present a new approach to accurately evaluate signal integrity in digital integrated circuits while working at the logic level. Our approach makes use of fitting models to represent the key properties of drivers, interconnects and receivers and the effects of all noise sources (supply noise, timing uncertainty, crosstalk). Such models are then combined to evaluate the correctness of each bit...
Much attention is given to the measurement of corruption, both between countries and across time. In part this is necessary to determine which countries face what types and levels of corruption – and consequential reforms – as well as the monitoring the success or otherwise of those reforms. What measures are most suited to the identification of the extent of, or seriousness of, country corrupt...
We address the problem of statically proving, at compilation time, whether the execution of a given transaction m is safe w.r.t. a dynamical integrity constraint in the framework of object oriented database systems. To do so, we formalize dynamical constraints with first order Linear Temporal Logic formulae and we use predicate transformer “à la Dijkstra”, combined with automatic demonstration....
Follow up what we will offer in this article about high integrity software the spark approach to safety and security. You know really that this book is coming as the best seller book today. So, when you are really a good reader or you're fans of the author, it does will be funny if you don't have this book. It means that you have to get this book. For you who are starting to learn about somethi...
We demonstrate that many, though not all integrity checking methods are able to tolerate inconsistency, without having been aware of it. We show that it is possible to use them to beneficial effect and without further ado, not only for preserving integrity in consistent databases, but also in databases that violate their constraints. This apparently relaxed attitude toward integrity and inconsi...
We introduce a method for audio-integrity verification based on a combination of watermarking and fingerprinting. An audio fingerprint is a perceptual digest that holds content information of a recording and allows one to identify it from other recordings. Integrity verification is performed by embedding the fingerprint into the audio signal itself by means of a watermark. The original fingerpr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید