Sciweavers

1830 search results - page 116 / 366
» Implementing a Tamper-Evident Database System
Sort
View
BMCBI
2008
133views more  BMCBI 2008»
13 years 10 months ago
SPIKE - a database, visualization and analysis tool of cellular signaling pathways
Background: Biological signaling pathways that govern cellular physiology form an intricate web of tightly regulated interlocking processes. Data on these regulatory networks are ...
Ran Elkon, Rita Vesterman, Nira Amit, Igor Ulitsky...
DEXAW
2005
IEEE
199views Database» more  DEXAW 2005»
14 years 3 months ago
Combining Multi-Agent-System Methodologies for Organic Computing Systems
As the complexity of computing systems steadily increases, self-managing systems – as Autonomic Computing Systems (ACS) proposed by IBM – are an adequate approach to minimize ...
Holger Kasinger, Bernhard Bauer
ACTAC
2008
94views more  ACTAC 2008»
13 years 10 months ago
Effect Preservation in Transaction Processing in Rule Triggering Systems
Rules provide an expressive means for implementing database behavior: They cope with changes and their ramifications. Rules are commonly used for integrity enforcement, i.e., for ...
Mira Balaban, Steffen Jurk
ICDCS
1999
IEEE
14 years 2 months ago
Run-time Detection in Parallel and Distributed Systems: Application to Safety-Critical Systems
There is growing interest in run-time detection as parallel and distributed systems grow larger and more complex. This work targets run-time analysis of complex, interactive scien...
Beth Plale, Karsten Schwan
VLDB
1991
ACM
81views Database» more  VLDB 1991»
14 years 1 months ago
On Maintaining Priorities in a Production Rule System
We present a priority system which is particularly suited for production rules coupled to databases. In this system, there are default priorities between all rules and overriding ...
Rakesh Agrawal, Roberta Cochrane, Bruce G. Lindsay