Results 41 to 50 of about 3,725,063 (205)
Integrity protection for code-on-demand mobile agents in e-commerce [PDF]
The mobile agent paradigm has been proposed as a promising solution to facilitate distributed computing over open and heterogeneous networks. Mobility, autonomy, and intelligence are identified as key features of mobile agent systems and enabling ...
Chan, TK, Guan, SU, Wang, TH
core +1 more source
Data integration under integrity constraints [PDF]
Data integration systems provide access to a set of heterogeneous, autonomous data sources through a so-called global schema. There are basically two approaches for designing a data integration system. In the global-as-view approach, one defines the elements of the global schema as views over the sources, whereas in the local-as-view approach, one ...
Andrea Cali +3 more
openaire +3 more sources
Academic Integrity in an Ethical Context: INFO2009 Week 2 [PDF]
Reminder of ECS academic integrity tutorial, scenarios for small group discussion on 1) academic integrity 2) integrity in the workplace.
White, Su
core
Huang Zongxi: Making it Safe Not to be Servile [PDF]
Integrity is often conceived as a heroic ideal: the person of integrity sticks to what they believe is right, regardless of the consequences. In this article, I defend a conception of ordinary integrity, for people who either do not desire or are unable ...
Field, Sandra Leonie
core
Mnemonic discrimination relates to perforant path integrity: An ultra-high resolution diffusion tensor imaging study. [PDF]
Pattern separation describes the orthogonalization of similar inputs into unique, non-overlapping representations. This computational process is thought to serve memory by reducing interference and to be mediated by the dentate gyrus of the hippocampus ...
Bennett, Ilana J, Stark, Craig EL
core +2 more sources
Active Integrity Constraints and Revision Programming [PDF]
We study active integrity constraints and revision programming, two formalisms designed to describe integrity constraints on databases and to specify policies on preferred ways to enforce them.
D Hestenes +4 more
core +1 more source
Phosphopeptide interactions of the Nbs1 N-terminal FHA-BRCT1/2 domains
Human Nbs1, a component of the MRN complex involved in DNA double strand break repair, contains a concatenated N-terminal FHA-BRCT1/2 sequence that supports interaction with multiple phosphopeptide binding partners.
Kyungmin Kim +3 more
doaj +1 more source
Structuring the process of integrity maintenance (extended version) [PDF]
Two different approaches have been traditionally considered for dealing with the process of integrity constraints enforcement: integrity checking and integrity maintenance.
Mayol Sarroca, Enric +1 more
core +1 more source
The Integrity of Thinking [PDF]
When we look at our political landscape today, I wonder where has our integrity gone? Teachers want to know how to explain (if that’s the right word) the language and behavior of the current American president to children in their ...
Tillmanns, Maria daVenza
core
Lockdown: Dynamic Control-Flow Integrity
Applications written in low-level languages without type or memory safety are especially prone to memory corruption. Attackers gain code execution capabilities through such applications despite all currently deployed defenses by exploiting memory ...
Barresi, Antonio +2 more
core +1 more source

