Sciweavers

390 search results - page 16 / 78
» Japanese Dependency Analysis Using the Ancestor-Descendant R...
Sort
View
PODS
2010
ACM
197views Database» more  PODS 2010»
13 years 7 months ago
When data dependencies over SQL tables meet the logics of paradox and S-3
We study functional and multivalued dependencies over SQL tables with NOT NULL constraints. Under a no-information interpretation of null values we develop tools for reasoning. We...
Sven Hartmann, Sebastian Link
RE
2007
Springer
14 years 1 months ago
Secure and Dependable Patterns in Organizations: An Empirical Approach
Designing a secure and dependable system is not just a technical issue, it involves also a deep analysis of the organizational and the social environment in which the system will ...
Yudistira Asnar, Paolo Giorgini, Roberto Bonato, V...
IAT
2010
IEEE
13 years 5 months ago
An Agent Model for Analysis of Human Performance Quality
-- A human's performance in a complex task is highly dependent on the demands of the task, in the sense that highly demanding situations will often cause a degradation of perf...
Michel C. A. Klein, Rianne van Lambalgen, Jan Treu...
DRM
2003
Springer
14 years 19 days ago
Constructing a virtual primary key for fingerprinting relational data
Agrawal and Kiernan’s watermarking technique for database relations [1] and Li et al’s fingerprinting extension [6] both depend critically on primary key attributes. Hence, t...
Yingjiu Li, Vipin Swarup, Sushil Jajodia
WCET
2007
13 years 8 months ago
Finding DU-Paths for Testing of Multi-Tasking Real-Time Systems using WCET Analysis
Memory corruption is one of the most common software failures. For sequential software and multitasking software with synchronized data accesses, it has been shown that program fa...
Daniel Sundmark, Anders Pettersson, Christer Sandb...