Results 41 to 50 of about 3,725,063 (205)

Integrity protection for code-on-demand mobile agents in e-commerce [PDF]

open access: yes, 2002
The mobile agent paradigm has been proposed as a promising solution to facilitate distributed computing over open and heterogeneous networks. Mobility, autonomy, and intelligence are identified as key features of mobile agent systems and enabling ...
Chan, TK, Guan, SU, Wang, TH
core   +1 more source

Data integration under integrity constraints [PDF]

open access: yesInformation Systems, 2002
Data integration systems provide access to a set of heterogeneous, autonomous data sources through a so-called global schema. There are basically two approaches for designing a data integration system. In the global-as-view approach, one defines the elements of the global schema as views over the sources, whereas in the local-as-view approach, one ...
Andrea Cali   +3 more
openaire   +3 more sources

Academic Integrity in an Ethical Context: INFO2009 Week 2 [PDF]

open access: yes, 2010
Reminder of ECS academic integrity tutorial, scenarios for small group discussion on 1) academic integrity 2) integrity in the workplace.
White, Su
core  

Huang Zongxi: Making it Safe Not to be Servile [PDF]

open access: yes, 2020
Integrity is often conceived as a heroic ideal: the person of integrity sticks to what they believe is right, regardless of the consequences. In this article, I defend a conception of ordinary integrity, for people who either do not desire or are unable ...
Field, Sandra Leonie
core  

Mnemonic discrimination relates to perforant path integrity: An ultra-high resolution diffusion tensor imaging study. [PDF]

open access: yes, 2016
Pattern separation describes the orthogonalization of similar inputs into unique, non-overlapping representations. This computational process is thought to serve memory by reducing interference and to be mediated by the dentate gyrus of the hippocampus ...
Bennett, Ilana J, Stark, Craig EL
core   +2 more sources

Active Integrity Constraints and Revision Programming [PDF]

open access: yes, 2000
We study active integrity constraints and revision programming, two formalisms designed to describe integrity constraints on databases and to specify policies on preferred ways to enforce them.
D Hestenes   +4 more
core   +1 more source

Phosphopeptide interactions of the Nbs1 N-terminal FHA-BRCT1/2 domains

open access: yesScientific Reports, 2021
Human Nbs1, a component of the MRN complex involved in DNA double strand break repair, contains a concatenated N-terminal FHA-BRCT1/2 sequence that supports interaction with multiple phosphopeptide binding partners.
Kyungmin Kim   +3 more
doaj   +1 more source

Structuring the process of integrity maintenance (extended version) [PDF]

open access: yes, 1997
Two different approaches have been traditionally considered for dealing with the process of integrity constraints enforcement: integrity checking and integrity maintenance.
Mayol Sarroca, Enric   +1 more
core   +1 more source

The Integrity of Thinking [PDF]

open access: yes, 2018
When we look at our political landscape today, I wonder where has our integrity gone? Teachers want to know how to explain (if that’s the right word) the language and behavior of the current American president to children in their ...
Tillmanns, Maria daVenza
core  

Lockdown: Dynamic Control-Flow Integrity

open access: yes, 2014
Applications written in low-level languages without type or memory safety are especially prone to memory corruption. Attackers gain code execution capabilities through such applications despite all currently deployed defenses by exploiting memory ...
Barresi, Antonio   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy