Sciweavers

978 search results - page 21 / 196
» Synthesizing Database Transactions
Sort
View
INFOSCALE
2007
ACM
13 years 11 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
VLDB
1991
ACM
220views Database» more  VLDB 1991»
14 years 1 months ago
A Performance Evaluation of Multi-Level Transaction Management
Multi-level transactions are a variant of open nested transactions in which the subtransactions correspond to operations at different levels of a layered system architecture. The ...
Christof Hasse, Gerhard Weikum
ICEIS
2003
IEEE
14 years 3 months ago
Distributed Overload Control for Real-Time Replicated Database Systems
: In order to meet their temporal constraints, current applications such as Web-based services and electronic commerce use the technique of data replication. To take the replicatio...
Samia Saad-Bouzefrane, Claude Kaiser
ADBIS
1998
Springer
180views Database» more  ADBIS 1998»
14 years 2 months ago
Designing Persistence for Real-Time Distributed Object Systems
An implementation of persistent object store for real-time systems with strict processing time constraints is a challenging task, because many traditional database techniques, e.g....
Igor Nekrestyanov, Boris Novikov, Ekaterina Pavlov...
FSKD
2007
Springer
102views Fuzzy Logic» more  FSKD 2007»
13 years 11 months ago
Statistical and Fuzzy Approach for Database Security
A new type of database anomaly is described by addressing the concept of Cumulated Anomaly in this paper. Dubiety-Determining Model (DDM), which is a detection model basing on sta...
Gang Lu, Junkai Yi, Kevin Lü