Results 21 to 30 of about 296,784 (294)
A dubiety-determining based model for database cumulated anomaly intrusion [PDF]
The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify data records under certain constraints deliberately hides his/her intentions ...
Lu, G, Lü, K, Yi, J
core +1 more source
ETP-Mine: An Efficient Method for Mining Transitional Patterns [PDF]
A Transaction database contains a set of transactions along with items and their associated timestamps. Transitional patterns are the patterns which specify the dynamic behavior of frequent patterns in a transaction database.
Bhaskar, A., Kumar, B. Kiran
core +2 more sources
Transaction reordering in replicated databases [PDF]
The paper presents a fault tolerant lazy replication protocol that ensures 1-copy serializability at a relatively low cost. Unlike eager replication approaches, our protocol enables local transaction execution and does not lead to any deadlock situation.
F. Pedone, R. Guerraoui, A. Schiper
openaire +1 more source
Efficient Cross-Chain Transaction Processing on Blockchains
Blockchain has received great attention in academia and industry due to its decentralization and immutability. From the perspective of transaction processing, blockchain is a distributed shared ledger and database with the characteristics of ...
Wenqi Wang +3 more
doaj +1 more source
An N-List-Based Approach for Mining Frequent Inter-Transaction Patterns
Mining frequent inter-transaction patterns (ITPs) from large databases is both useful and of interest. Since frequent inter-transaction patterns (FITPs) are discovered across transactions in a transaction database (TD), the number of patterns is very ...
Thanh-Ngo Nguyen +4 more
doaj +1 more source
The Complexity of the Data Retrieval Process Using the Proposed Index Extension
Data retrieval, access, and tuple identification are inevitable in database processing, ensuring performance. The entities and relationships form a relational database.
Michal Kvet, Jozef Papan
doaj +1 more source
Functionally Specified Distributed Transactions in Co-operative Scenarios [PDF]
Addresses the problem of specifying co-operative, distributed transactions in a manner that can be subject to verification and testing. Our approach combines the process-algebraic language LOTOS and the object-oriented database modelling language TM to ...
By, Rolf A. de +2 more
core +2 more sources
An interactive style of the testing database production for EIS
Using a progressive Information Technology for development of Software Modules for Enterprise Information Systems brings a lot of practical and theoretical problems.
Milan Mišovič, Ivana Rábová
doaj +1 more source
Machine learning approach to detect intruders in database based on hexplet data structure
Most of valuable information resources for any organization are stored in the database; it is a serious subject to protect this information against intruders.
Saad M. Darwish
doaj +1 more source
SALES LEVEL ANALYSIS USING THE ASSOCIATION METHOD WITH THE APRIORI ALGORITHM
The company does not yet know the pattern of consumer purchases because so far, the sales transaction data has not been used correctly and does not have a unique method to determine consumer buying patterns.
Samuel Samuel +4 more
doaj +1 more source

