نتایج جستجو برای: integrity
تعداد نتایج: 70331 فیلتر نتایج به سال:
the analysis of vulnerability in networks generally involves some questions about how the underlying graph is connected. one is naturally interested in studying the types of disruption in the network that maybe caused by failures of certain links or nodes. in terms of a graph, the concept of connectedness is used in dierent forms to study many of the measures of vulnerability. when certain ver...
subsea structures such as manifolds, line pipes and flow lines are important investments. also because of the sensitivity of environmental issues, corrosion of these structures is of vital importance. subsea corrosion management is different from on-shore and shallow water off-shore corrosion management in mainly three factors: materials, corrosion management practice and cathodic protection. t...
Query folding is a technique for determining how a query may be answered using a given set of resources, which may include materialized views, cached results of previous queries, or queries answerable by other databases. The power of query folding can be considerably enhanced by taking into account integrity constraints that are known to hold on base relations. This paper describes an extension...
Database replication protocols check read-write and/or write-write conflicts. If there are none, then protocols propagate transactions to the database, assuming they will eventually commit. But commitment may fail due to integrity constraints violations. Also, the read actions of integrity checking may give raise to new conflicts. Thus, some more care must be taken if, in addition to the consis...
Assuring that system files have not been tampered with over time is a vital, but oftoverlooked, aspect of system security. File integrity checkers provide ways to assure the validity of files on a system. This paper concerns itself with a review of file integrity checkers. It pays particular attention to what the minimum requirements for an integrity checker are, the different approaches taken ...
This paper presents a solution to check referential integrity constraints and conjunctive global constraints in a relational multi database system. It also presents the experimental results obtained by implementing this solution over a PC cluster with Oracle9i DBMS. The goal of those experimentations is to measure the time spent to check global constraints in a distributed systems. The results ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید