نتایج جستجو برای: integrity

تعداد نتایج: 70331  

2015
Changsong Liu

REFERENTIAL GROUNDING TOWARDS MEDIATING SHARED PERCEPTUAL BASIS IN SITUATED DIALOGUE

2012
Muhammad Salman Nafees Ur Rehman Muhammad Shahid

This paper describes integrity mechanism between OLTPs and offline data. Normally every RDBMS supports five Integrity Constraints (ICs) namely primary key or composite key, unique key, foreign key, not null and check constraints. Online database integrity is achieved through these five ICs. However, as per the retention period data is backed up and removed from the OLTPs for space and performan...

2002
Fang Wei-Kleiner Georg Lausen

This paper considers the problem of containment of conjunctive queries CQ with disjunctive integrity constraints Query containment problem in the pres ence of integrity constraints has been studied broadly especially with functional and inclusion dependencies However to handle incomplete information in the database disjunctions are needed to be expressed as integrity constraints In this paper w...

2001
Jeevani Samantha Goonetillake Tom W. Carnduff W. Alex Gray

Concurrent Engineering (CE) is a product development approach which requires collaborative multidisciplinary team environment with efective communication. Due to the evolutionary nature of the engineering design process it is necessary to provide support for version management. The version model should be provided with an integrity checking mechanism to assure the consistency of object versions...

Journal: :Theor. Comput. Sci. 2001
Mark Levene George Loizou

Functional dependencies (FDs) and inclusion dependencies (INDs) are the most fundamental integrity constraints that arise in practice in relational databases. A given set of FDs does not interact with a given set of INDs if logical implication of any FD can be determined solely by the given set of FDs, and logical implication of any IND can be determined solely by the given set of INDs. The set...

Journal: :IJITN 2015
Xuejun Cai Chaohai Xie Xiaojun Wen

In digital forensics, the issue of data integrity protection for increasingly widespread applied SSD (Solid State Disk, SSD) is to be resolved. Based on Combinatorial Group Theory, mapping data objects in SSD validation process and test object in combination group testing methods, using the non-adaptive mode to the initial calculation, stored procedures, and re-calculate, verify process, and ca...

2004
Millist W. Vincent Michael Schrefl Jixue Liu Chengfei Liu Solen Dogen

Integrity constraints play a fundamental role in defining semantics in both conventional databases and in XML documents. In this paper we generalize previous approaches to defining inclusion dependencies in XML. Previous approaches have considered only the case where the paths on the l.h.s. are child attributes of the same node and the paths on the r.h.s. of the dependency are child attributes ...

2013
Ingo Feinerer Enrico Franconi Paolo Guagliardo

Horizontal decomposition is the process of splitting a relation into sub-relations, called fragments, each containing a subset of the rows of the original relation. In this paper, we consider horizontal decomposition in a setting where some of the attributes in the database schema are interpreted over a specific domain, on which a set of special predicates and functions is defined. We study the...

Journal: :IJBIS 2012
Feras Hanandeh Emad Eddien Abdallah Sahar Idwan Izzat Alsmadi

With the increased use of the applications that deal with massive collections of data, integrity checking became a critical problem. Efficient checking could be achieved by deriving a simplified form of the integrity constraints against the new database state before the update operation is performed. Most of the research projects in this area are concentrated on deriving sufficient integrity te...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید