نتایج جستجو برای: data integrity

تعداد نتایج: 2461987  

1996
Anne Doucet Stéphane Gançarski Geneviève Jomier Sophie Monties

In this paper, the extension of integrity constraint mechanisms in order to maintain consistency in multiversion databases is studied. Unlike monoversion databases, a multiversion database represents several states of the modeled universe. Thus, both the notion of consistency and the means to maintain it have to be extended. This goal requires studying new integrity constraints induced by versi...

2014
G. Schuh

The quality of production feedback data gathered on the shop-floor is regularly reduced by various data inconsistencies and errors which impair detailed scheduling accuracy. In this paper, an approach for reducing these inconsistencies in production feedback data by deriving errorspecific integrity rules is presented and validated through a simulation study.

2001
Xavier Hannotin Paolo Maggi Riccardo Sisto

This paper shows how cryptographic protocols for mobile agent data integrity properties can be formally specified by using spi calculus, an extension of calculus with cryptographic properties. In particular, by means of a case study, it is shown how a specification technique initially conceived only for classical cryptographic protocols can be used in the context of mobile agents as well. Our c...

2015
Sergio Greco Ester Zumpano

Data integration aims at providing a uniform integrated access to multiple heterogeneous information sources, which were designed independently for autonomous applications and whose contents are strictly related. There are several ways to integrate databases or possibly distributed information sources, but whatever integration architecture we choose, the heterogeneity of the sources to be integ...

Journal: :Information & Software Technology 1995
Peter Sawyer Ian Sommerville

This paper describes a model for developing applications of active object-oriented databases based on three orthogonal concepts; methods, guards and actions and a tool which implements these ideas called MGA. MGA objects are active; they have guards which constrain the object's state, actions which maintain database integrity when the object's state changes and methods through which the object ...

1999
Enric Mayol Ernest Teniente

During the process of updating a database, two interrelated problems could arise. On one hand, when an update is applied to the database, integrity constraints could become violated, thus falsifying database consistency. In this case, the integrity constraint maintenance approach tries to obtain additional updates to be applied to re-establish database consistency. On the other hand, when an up...

2003
Andrea Calì

Data integration consists in providing a uniform access to a set of data sources, through a unified representation of the data called global schema; a mapping specifies the relationship between the global schema and the sources. Integrity constraints (ICs) are expressed on the global schema to better represent the domain of interest; in general, ICs are not satisfied by the data at the sources....

2001
Andrew J. Worth Nikos Makris David N. Kennedy Verne S. Caviness

Quantitative measurements of macroscopic neural anatomy that are obtained from MRI scans are beginning to be used in clinical trials. This paper describes procedures and software features that ensure the demonstrable validity of these measurements. In addition to describing mechanisms that provide data integrity and security throughout the image analysis pipeline, we present “SegMentor”, a syst...

2008
Laurent Perrussel Jerusa Marchi Guilherme Bittencourt

Belief merging aims at building a common belief set issued from multiple belief sets. The quality of the resulting set is usually considered in terms of a closeness criterion between the initial belief sets and an integrity constraint with respect to the aim of the merging procedure. The notion of distance between belief sets is thus a crucial issue when we face the merging problem. The aim of ...

2010
Pavol Sovis Florian Kohlar Jörg Schwenk

OpenID is a user-centric and decentralized Single Sign-On system. It enables users to sign into Relying Partiesby providing an authentication assertion from an OpenID Provider. It is supported by many leading internet companies and there are over a billion accounts capable of using OpenID. We present a security analysis of OpenID and the corresponding extensions and reveal several vulnerabiliti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید