Results 21 to 30 of about 296,784 (294)

A dubiety-determining based model for database cumulated anomaly intrusion [PDF]

open access: yes, 2007
The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify data records under certain constraints deliberately hides his/her intentions ...
Lu, G, Lü, K, Yi, J
core   +1 more source

ETP-Mine: An Efficient Method for Mining Transitional Patterns [PDF]

open access: yes, 2010
A Transaction database contains a set of transactions along with items and their associated timestamps. Transitional patterns are the patterns which specify the dynamic behavior of frequent patterns in a transaction database.
Bhaskar, A., Kumar, B. Kiran
core   +2 more sources

Transaction reordering in replicated databases [PDF]

open access: yesProceedings of SRDS'97: 16th IEEE Symposium on Reliable Distributed Systems, 2002
The paper presents a fault tolerant lazy replication protocol that ensures 1-copy serializability at a relatively low cost. Unlike eager replication approaches, our protocol enables local transaction execution and does not lead to any deadlock situation.
F. Pedone, R. Guerraoui, A. Schiper
openaire   +1 more source

Efficient Cross-Chain Transaction Processing on Blockchains

open access: yesApplied Sciences, 2022
Blockchain has received great attention in academia and industry due to its decentralization and immutability. From the perspective of transaction processing, blockchain is a distributed shared ledger and database with the characteristics of ...
Wenqi Wang   +3 more
doaj   +1 more source

An N-List-Based Approach for Mining Frequent Inter-Transaction Patterns

open access: yesIEEE Access, 2020
Mining frequent inter-transaction patterns (ITPs) from large databases is both useful and of interest. Since frequent inter-transaction patterns (FITPs) are discovered across transactions in a transaction database (TD), the number of patterns is very ...
Thanh-Ngo Nguyen   +4 more
doaj   +1 more source

The Complexity of the Data Retrieval Process Using the Proposed Index Extension

open access: yesIEEE Access, 2022
Data retrieval, access, and tuple identification are inevitable in database processing, ensuring performance. The entities and relationships form a relational database.
Michal Kvet, Jozef Papan
doaj   +1 more source

Functionally Specified Distributed Transactions in Co-operative Scenarios [PDF]

open access: yes, 1995
Addresses the problem of specifying co-operative, distributed transactions in a manner that can be subject to verification and testing. Our approach combines the process-algebraic language LOTOS and the object-oriented database modelling language TM to ...
By, Rolf A. de   +2 more
core   +2 more sources

An interactive style of the testing database production for EIS

open access: yesActa Universitatis Agriculturae et Silviculturae Mendelianae Brunensis, 2006
Using a progressive Information Technology for development of Software Modules for Enterprise Information Systems brings a lot of practical and theoretical problems.
Milan Mišovič, Ivana Rábová
doaj   +1 more source

Machine learning approach to detect intruders in database based on hexplet data structure

open access: yesJournal of Electrical Systems and Information Technology, 2016
Most of valuable information resources for any organization are stored in the database; it is a serious subject to protect this information against intruders.
Saad M. Darwish
doaj   +1 more source

SALES LEVEL ANALYSIS USING THE ASSOCIATION METHOD WITH THE APRIORI ALGORITHM

open access: yesJurnal Riset Informatika, 2022
The company does not yet know the pattern of consumer purchases because so far, the sales transaction data has not been used correctly and does not have a unique method to determine consumer buying patterns.
Samuel Samuel   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy