نتایج جستجو برای: integrity approach

تعداد نتایج: 1352060  

1997
Enric Mayol Ernest Teniente

Two different approaches have been traditionally considered for dealing with the process of integrity constraints enforcement: integrity checking and integrity maintenance. However, while previous research in the first approach has mainly addressed efficiency issues, research in the second approach has been mainly concentrated in being able to generate all possible repairs that falsify an integ...

Muhammad Imran Nazar Muhammad Ranjha Rao Khurram Ayoub

The main objective of the present study was to formulate gastroretentive effervescent sustained release drug delivery systems of risperidone floating tablets with the help of Methocel® K15, Ethocel® standard 7FP premium, Eudragit ® RS100 sustained release polymers to improve its safety profile, bioavailability and patient compliance. Risperidone floating tablets were formulated by wet granulati...

2008
Andreas Eckhardt Sven Laumer Tim Weitzel

In the history of adoption research, subjective norm mostly remains as the unloved child, being significant in this analysis and not significant in that analysis. Already Davis et al. had to exclude subjective norm of the Technology Acceptance Model due to theoretical and measurement problems. Overall the results of subjective norm as an antecedent for behavioral intention in IS research are qu...

Journal: :International Journal of Navigation and Observation 2014

Journal: :Security and Communication Networks 2021

With the great achievements of deep learning technology, neural network models have emerged as a new type intellectual property. Neural models’ design and training require considerable computational resources time. Watermarking is potential solution for achieving copyright protection integrity without excessively compromising accuracy stability. In this work, we develop multipurpose watermarkin...

2003
Jianyong Zhang Peng Liu

Current database survivability technologies focus on maintaining data integrity and availability in the face of attacks. They are very limited in satisfying differentiated information assurance requirements of various database services under sustained attacks. This paper takes the first steps towards delivering database services with information assurance guarantees. In particular, (a) we intro...

Journal: :International Journal of Security and Networks 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید