Sciweavers

103 search results - page 7 / 21
» Checking Violation Tolerance of Approaches to Database Integ...
Sort
View
PRDC
1999
IEEE
13 years 11 months ago
Cost of Ensuring Safety in Distributed Database Management Systems
Generally, applications employing Database Management Systems (DBMS) require that the integrity of the data stored in the database be preserved during normal operation as well as ...
Maitrayi Sabaratnam, Svein-Olaf Hvasshovd, Ø...
SAFECOMP
2007
Springer
14 years 1 months ago
Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees
In existing security model-checkers the intruder’s behavior is defined as a message deducibility rule base governing use of eavesdropped information, with the aim to find out a m...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
ISCA
2006
IEEE
148views Hardware» more  ISCA 2006»
14 years 1 months ago
Tolerating Dependences Between Large Speculative Threads Via Sub-Threads
Thread-level speculation (TLS) has proven to be a promising method of extracting parallelism from both integer and scientific workloads, targeting speculative threads that range ...
Christopher B. Colohan, Anastassia Ailamaki, J. Gr...
TGC
2005
Springer
14 years 1 months ago
Engineering Runtime Requirements-Monitoring Systems Using MDA Technologies
The Model-Driven Architecture (MDA) technology toolset includes a language for describing the structure of meta-data, the MOF, and a language for describing consistency properties ...
James Skene, Wolfgang Emmerich
AI
2007
Springer
13 years 7 months ago
Metatheory of actions: Beyond consistency
Traditionally, consistency is the only criterion for the quality of a theory in logicbased approaches to reasoning about actions. This work goes beyond that and contributes to the...
Andreas Herzig, Ivan José Varzinczak