Sciweavers

103 search results - page 8 / 21
» Checking Violation Tolerance of Approaches to Database Integ...
Sort
View
SCN
2011
Springer
292views Communications» more  SCN 2011»
13 years 2 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
CIKM
2008
Springer
13 years 9 months ago
A heuristic approach for checking containment of generalized tree-pattern queries
Query processing techniques for XML data have focused mainly on tree-pattern queries (TPQs). However, the need for querying XML data sources whose structure is very complex or not...
Pawel Placek, Dimitri Theodoratos, Stefanos Soulda...
STORAGESS
2005
ACM
14 years 1 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
PVLDB
2010
119views more  PVLDB 2010»
13 years 6 months ago
Chase Termination: A Constraints Rewriting Approach
Several database areas such as data exchange and integration share the problem of fixing database instance violations with respect to a set of constraints. The chase algorithm so...
Francesca Spezzano, Sergio Greco
CVPR
2009
IEEE
14 years 2 months ago
Textural Hausdorff Distance for wider-range tolerance to pose variation and misalignment in 2D face recognition
This paper addresses two critical but rarely concerned issues in 2D face recognition: wider-range tolerance to pose variation and misalignment. We propose a new Textural Hausdorff...
Sanqiang Zhao, Yongsheng Gao