نتایج جستجو برای: integrity parameter

تعداد نتایج: 284470  

Journal: :Metascience 2022

Journal: :journal of algorithms and computation 0
mahmood shabankhah university of tehran, college of engineering, faculty of engineering science

the analysis of vulnerability in networks generally involves some questions about how the underlying graph is connected. one is naturally interested in studying the types of disruption in the network that maybe caused by failures of certain links or nodes. in terms of a graph, the concept of connectedness is used in di erent forms to study many of the measures of vulnerability. when certain ver...

Journal: :international journal of coastal and offshore engineering 0
reza javaherdashti safe-sight technology, surrey, uk,

subsea structures such as manifolds, line pipes and flow lines are important investments. also because of the sensitivity of environmental issues, corrosion of these structures is of vital importance. subsea corrosion management is different from on-shore and shallow water off-shore corrosion management in mainly three factors: materials, corrosion management practice and cathodic protection. t...

Journal: :Journal of the Japan Society for Precision Engineering 1989

Journal: :The Computer Journal 1976

1998
Jarek Gryz

Query folding is a technique for determining how a query may be answered using a given set of resources, which may include materialized views, cached results of previous queries, or queries answerable by other databases. The power of query folding can be considerably enhanced by taking into account integrity constraints that are known to hold on base relations. This paper describes an extension...

2008
María Idoia Ruiz-Fuertes Francesc D. Muñoz-Escoí Hendrik Decker José Enrique Armendáriz-Iñigo José Ramón González de Mendívil

Database replication protocols check read-write and/or write-write conflicts. If there are none, then protocols propagate transactions to the database, assuming they will eventually commit. But commitment may fail due to integrity constraints violations. Also, the read actions of integrity checking may give raise to new conflicts. Thus, some more care must be taken if, in addition to the consis...

2005
Yusuf M Motara Barry Irwin

Assuring that system files have not been tampered with over time is a vital, but oftoverlooked, aspect of system security. File integrity checkers provide ways to assure the validity of files on a system. This paper concerns itself with a review of file integrity checkers. It pays particular attention to what the minimum requirements for an integrity checker are, the different approaches taken ...

Journal: :CLEI Electron. J. 2006
Stéphane Gançarski Claudia León Hubert Naacke Marta Rukoz Pablo Santini

This paper presents a solution to check referential integrity constraints and conjunctive global constraints in a relational multi database system. It also presents the experimental results obtained by implementing this solution over a PC cluster with Oracle9i DBMS. The goal of those experimentations is to measure the time spent to check global constraints in a distributed systems. The results ...

Journal: :Journal of the Postgraduate Institute of Medicine 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید