Sciweavers

463 search results - page 57 / 93
» Integrating Dependent Sensory Data
Sort
View
VTS
2000
IEEE
89views Hardware» more  VTS 2000»
14 years 6 days ago
Fault Escapes in Duplex Systems
Hardware duplication techniques are widely used for concurrent error detection in dependable systems to ensure high availability and data integrity. These techniques are vulnerabl...
Subhasish Mitra, Nirmal R. Saxena, Edward J. McClu...
CHES
2010
Springer
210views Cryptology» more  CHES 2010»
13 years 9 months ago
Flash Memory 'Bumping' Attacks
This paper introduces a new class of optical fault injection attacks called bumping attacks. These attacks are aimed at data extraction from secure embedded memory, which usually s...
Sergei Skorobogatov
SIGMOD
2004
ACM
105views Database» more  SIGMOD 2004»
14 years 8 months ago
Query Processing for SQL Updates
A rich set of concepts and techniques has been developed in the context of query processing for the efficient and robust execution of queries. So far, this work has mostly focused...
César A. Galindo-Legaria, Stefano Stefani, ...
ACTAC
2008
94views more  ACTAC 2008»
13 years 8 months ago
Effect Preservation in Transaction Processing in Rule Triggering Systems
Rules provide an expressive means for implementing database behavior: They cope with changes and their ramifications. Rules are commonly used for integrity enforcement, i.e., for ...
Mira Balaban, Steffen Jurk
CJ
1999
80views more  CJ 1999»
13 years 7 months ago
Resolving Executing-Committing Conflicts in Distributed Real-time Database Systems
In a distributed real-time database system (DRTDBS), a commit protocol is required to ensure transaction failure atomicity. If data conflicts occur between executing and committin...
Kam-yiu Lam, Chung-Leung Pang, Sang Hyuk Son, Jian...