Sciweavers

978 search results - page 21 / 196
» Synthesizing Database Transactions
Sort
View
135
Voted
INFOSCALE
2007
ACM
15 years 4 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
VLDB
1991
ACM
220views Database» more  VLDB 1991»
15 years 6 months ago
A Performance Evaluation of Multi-Level Transaction Management
Multi-level transactions are a variant of open nested transactions in which the subtransactions correspond to operations at different levels of a layered system architecture. The ...
Christof Hasse, Gerhard Weikum
155
Voted
ICEIS
2003
IEEE
15 years 8 months ago
Distributed Overload Control for Real-Time Replicated Database Systems
: In order to meet their temporal constraints, current applications such as Web-based services and electronic commerce use the technique of data replication. To take the replicatio...
Samia Saad-Bouzefrane, Claude Kaiser
137
Voted
ADBIS
1998
Springer
180views Database» more  ADBIS 1998»
15 years 6 months ago
Designing Persistence for Real-Time Distributed Object Systems
An implementation of persistent object store for real-time systems with strict processing time constraints is a challenging task, because many traditional database techniques, e.g....
Igor Nekrestyanov, Boris Novikov, Ekaterina Pavlov...
127
Voted
FSKD
2007
Springer
102views Fuzzy Logic» more  FSKD 2007»
15 years 4 months ago
Statistical and Fuzzy Approach for Database Security
A new type of database anomaly is described by addressing the concept of Cumulated Anomaly in this paper. Dubiety-Determining Model (DDM), which is a detection model basing on sta...
Gang Lu, Junkai Yi, Kevin Lü