Filters








63,601 Hits in 7.5 sec

CAT Detect (Computer Activity Timeline Detection): A tool for detecting inconsistency in computer activity timelines

Andrew Marrington, Ibrahim Baggili, George Mohay, Andrew Clark
2011 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
Rules base for experiments The software prototype incorporates a small set of rules to check for temporal inconsistency.  ...  Applied to computer activity time-lining, the real time, if not the timestamp, of the execution event must be after the real time of the login event.  ... 
doi:10.1016/j.diin.2011.05.007 fatcat:j5ljbxtrqffkfdq3kg3cwonrc4

A Framework to Detect Deviations During Process Enactment

Sean Thompson, Torab Torabi, Purva Joshi
2007 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007)  
We present a framework designed to detect deviations in enacting process "on the fly" consisting of a definition engine in which boundary values and process constraints are set, a monitoring engine which  ...  Detecting deviations "on the fly" provides an opportunity to determine the precise point in the process where the deviation occurred plus a faster and more accurate diagnosis of any issues or problems  ...  Activity conditions are in turn made up of N number of rule sets. For a condition to pass, at least one rule set defined in the condition must pass.  ... 
doi:10.1109/icis.2007.18 dblp:conf/ACISicis/ThompsonTJ07 fatcat:d6w5oqpn3vgilcmgsirc32yto4

Managing Constraint Violations in Administrative Information Systems [chapter]

Isabelle Boydens, Alain Pirotte, Esteban Zimanyi
1998 Data Mining and Reverse Engineering  
The paper focuses on a motivating case study, the analysis of constraint violations in database management at the Belgian agency for social security.  ...  This paper motivates a comprehensive methodological framework for dealing with some aspects of real-world complexity in information system analysis and design.  ...  These questions bear some resemblance with properties of sets of rules in active databases. They are elaborated upon in the next section.  ... 
doi:10.1007/978-0-387-35300-5_15 fatcat:4q3sh5mknnadrnri2fhtqfjyiy

Automatic Synthesis of Data Cleansing Activities
english

Mario Mezzanzanica, Roberto Boselli, Mirko Cesarini, Fabio Mercorio
2013 Proceedings of the 2nd International Conference on Data Technologies and Applications  
Then, we formally introduce the concept of universal cleanser, i.e. an object which summarises the set of all cleansing actions for each feasible data inconsistency (according to a given consistency model  ...  The consistent evolution of the data is checked using a model defined on the basis of domain knowledge.  ...  Here we focus on consistency, which takes into account the violation of semantic rules defined over a set of data items.  ... 
doi:10.5220/0004491101380149 dblp:conf/data/MezzanzanicaBCM13 fatcat:wjaicesjpjdbvdellvyz7rytvy

A Debugging Approach for Trigger-Action Programming

Luigi De Russis, Alberto Monge Roffarello
2018 Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems - CHI '18  
The goal is to assists end users during the composition of trigger-action rules by: a) highlighting possible problems that the rules may generate, and b) allowing their step-by-step simulation.  ...  Nowadays, end users can customize their technological devices and web applications by means of trigger-action rules, defined through End-User Development (EUD) tools.  ...  works the evaluation of the SCPN approach for run-time check and simulation of large sets of rules.  ... 
doi:10.1145/3170427.3188641 dblp:conf/chi/RussisR18 fatcat:rwk7tsm3rfhhtkhejh6533zhge

A Paradigm for Active Database Management Systems

Manvendra Yadav, Sonia Kumari
2016 International Journal Of Engineering And Computer Science  
Active database management systems are invoked by synchronous events generated by user or application programs as well as external asynchronous data change events such as a change in sensor value or time  ...  In this paper gives the introduction of active DBMS[12] and discussed how it is different from passive DBMS.  ...  We here make a distinction between active database systems [3] and other rule based systems such as reactive systems (sometimes called real-time expert systems) and knowledgebased systems [1] (often  ... 
doi:10.18535/ijecs/v5i1.20 fatcat:7nsxfflorfhillrml3dyk7yyfa

repAIrC: A Tool for Ensuring Data Consistency - By Means of Active Integrity Constraints

Luís Cruz-Filipe, Michael Franz, Artavazd Hakhverdyan, Marta Ludovico, Isabel Nunes, Peter Schneider-Kamp
2015 Proceedings of the 7th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management  
This paper describes a tool to validate an SQL database with respect to a given set of active integrity constraints, proposing possible repairs in case the database is inconsistent.  ...  to find repairs of inconsistent databases efficiently in parallel.  ...  CONCLUSIONS AND FUTURE WORK We presented a working prototype of a tool, called repAIrC, to check integrity of real-world SQL databases with respect to a given set of active integrity constraints, and to  ... 
doi:10.5220/0005586400170026 dblp:conf/ic3k/Cruz-FilipeFHLN15 fatcat:tjmbivvzmndbnbst3pmguan3ke

Quantifying Integrity Impacts in Security Risk Scoring Models

Eli Weintraub
2017 International Journal of Advanced Computer Science and Applications  
In this work a quantitative integrity impact measure is defined, formulated, illustrated and evaluated. The proposed measure is based on the real database configuration.  ...  One possible result of attacks is damaging the database. Estimations of attacks' impacts on database integrity are not found in literature, besides intuitive managers' assessments.  ...  Checking the validity of the integrity constraints needs validation of the constraints to database contents to compute the amount of degrading in integrity rules.  ... 
doi:10.14569/ijacsa.2017.081229 fatcat:6bg2k5e2hzbghbmh5rt63t7jru

Towards dependable data repairing with fixing rules

Jiannan Wang, Nan Tang
2014 Proceedings of the 2014 ACM SIGMOD international conference on Management of data - SIGMOD '14  
We develop e cient algorithms to check whether a set of fixing rules is consistent, and discuss approaches to resolve inconsistent fixing rules.  ...  A fixing rule contains an evidence pattern, a set of negative patterns, and a fact value.  ...  ., checking all pairs of rules, as well as its 10 real cases where it terminated when some pair was detected to be inconsistent.  ... 
doi:10.1145/2588555.2610494 dblp:conf/sigmod/WangT14 fatcat:xgp657gs3jd4xkkzffvwehhhhi

Integrity Checking and Maintenance with Active Rules in XML Databases

Henning Christiansen, Maria Rekouts
2007 24th British National Conference on Databases (BNCOD'07)  
Triggers, or active rules, which are widely used in previous technologies for the purpose are still rather untested in XML databases.  ...  We show examples developed in the Sedna XML database system which provides a running implementation of XML triggers.  ...  Introduction Active rules or triggers in databases can be difficult to work with due to their complex semantics, but welldesigned triggers are very effective for detection and prevention of inconsistencies  ... 
doi:10.1109/bncod.2007.13 dblp:conf/bncod/ChristiansenR07 fatcat:qy5drshurvfpncqqamkfrw625i

Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations [chapter]

Sean Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert France
2013 Lecture Notes in Computer Science  
It presents the design, application and limitations of a software prototype called the Virtual Machine (VM) Log Auditor that helps in detecting inconsistencies within the activity timelines for a VM history  ...  The security and privacy concerns of this infrastructure arising from the large co-location of tenants are, however, significant and pose considerable challenges in its widespread deployment.  ...  Rule Base for Experiments The VM log auditor software prototype incorporates a small set of rules to check for VM temporal inconsistency.  ... 
doi:10.1007/978-3-642-39256-6_7 fatcat:6pvr6j6sfzeavcpvgdb4yml7ki

How to Stay Ontop of Your Data: Databases, Ontologies and More [chapter]

Diego Calvanese, Benjamin Cogrel, Sarah Komla-Ebri, Davide Lanti, Martin Rezk, Guohui Xiao
2015 Lecture Notes in Computer Science  
Then, we will show how to use Ontop to check inconsistencies and exploit SWRL ontologies.  ...  In this demo, we use the recently developed NPD benchmark (+4 billion triples) to demonstrate the features of Ontop.  ...  This gives rise to the setting of Ontology-Based Data Access (OBDA) [2] , illustrated in Fig. 1 .  ... 
doi:10.1007/978-3-319-25639-9_4 fatcat:luiuwu6la5gubnkbwsw2xtferq

A Model Driven Framework for Automatic Detection and Tracking Inconsistencies

A. Ananda Rao, T. V. Rajini Kanth, G. Ramesh
2016 Journal of Software  
Towards this end, in our previous work, we proposed a framework named Extensible Real Time Software Design Inconsistency Checker (XRTSDIC) for checking software design inconsistencies.  ...  Software design model inconsistencies precipitate into flaws in system that can be avoided at the time of design of the system.  ...  checks inconsistencies manually 7, 9, 12, 13 Dynamic check Real time checking of inconsistencies against changes 6, 10, 11 Automatic maintenance Modelling tool makes required changes to  ... 
doi:10.17706/jsw.11.6.538-553 fatcat:t23byqqzwzhjpfiourf2wrvcf4

An AI Planning System for Data Cleaning [chapter]

Roberto Boselli, Mirko Cesarini, Fabio Mercorio, Mario Mezzanzanica
2017 Lecture Notes in Computer Science  
We also report a real-life application of our approach.  ...  Data Cleaning represents a crucial and error prone activity in KDD that might have unpredictable effects on data analytics, affecting the believability of the whole KDD process.  ...  Introdution and Motivation A challenging issue in data quality is to automatically check the quality of a source dataset and then to identify cleaning activities, namely a sequence of actions able to cleanse  ... 
doi:10.1007/978-3-319-71273-4_29 fatcat:3j3deyqqjzfkhdbjjmhio77msy

Increasing Supply-Chain Visibility with Rule-Based RFID Data Analysis

Alexander Ilic, Thomas Andersen, Florian Michahelles
2009 IEEE Internet Computing  
The generic consistency rules we proposed here could be applied in a real-time analytics system and could process streams of RFID data to trigger alerts or notifications as soon as inconsistencies occur  ...  Every time a pair of events fails a check, the analysis engine generates a new inconsistency event within the location of e i .  ... 
doi:10.1109/mic.2009.10 fatcat:fsjl5rzpxzdnnlgs7knd45cyxe
« Previous Showing results 1 — 15 out of 63,601 results