A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Dynamic integrity constraints definition and enforcement in databases: a classification framework
[chapter]
1997
Integrity and Internal Control in Information Systems
A dynamic constraint expresses conditions that involve facts of two or more states of the database. ...
The purpose of this paper is to present a brief survey of methods for dynamic constraint defmitionand enforcement. Also we classify and compare these methods with respect to several relevant features. ...
Acknowledgements The author is very grateful to Maria Ribera Sancho, Antoni Olive, Joan Antoni Pastor, Emic Mayol and the anonymous reviewers for their useful comments and suggestions. ...
doi:10.1007/978-0-387-35317-3_4
fatcat:gyyz3ehp2bfghfmlodgdf6eebq
Experiences documenting and preserving software constraints using aspects
2011
Proceedings of the tenth international conference on Aspect-oriented software development companion - AOSD '11
We present an analysis of common constraints found in our case study, a set of primitive aspects developed to help the enforcement of software constraints, and show how AOP has been incorporated into existing ...
We conclude with a discussion of strengths and limitations of AspectJ in supporting these constraints. ...
practical use of static and dynamic aspects to enforce and document some of those constraints; 3) a set of aspect primitives that can be used to express those constraints; and 4) a discussion of the strengths ...
doi:10.1145/1960314.1960321
dblp:conf/aosd/FilhoBH11
fatcat:wdllayvllfgx7k3yzfbi52uj7i
A Conservative Augmented Lagrangian Algorithm for the Dynamics of Constrained Mechanical Systems
2006
Mechanics based design of structures and machines
An important example is the dynamics of multibody systems, where these constraints arise from the modeling of joints that connect different bodies. ...
, thus providing an interesting alternative for the dynamical analysis of these type of systems. ...
V Φ vanishes, and therefore E = T , when constraints are exactly enforced. ...
doi:10.1080/15397730601044911
fatcat:wgwcmunm7rhklijc25avbvvreq
Intuitive Control of Dynamic Simulation Using Improved Implicit Constraint Enforcement
[chapter]
2005
Lecture Notes in Computer Science
Our improved implicit constraint enforcement technique is seamlessly integrated into a dynamic simulation system to achieve desirable motions during the simulation using constraint forces and doesn't require ...
The improved accuracy in constraint enforcement contributes to the effective and intuitive motion control in dynamic simulations. ...
Acknowledgement This research is partially supported by Colorado Advanced Software Institute (PO-P308432-0183-7) and NSF CAREER Award (ACI-0238521). ...
doi:10.1007/978-3-540-30585-9_35
fatcat:qqc7c2kh3vcwfjpt3ofzcglgge
Parallel handling of integrity constraints on fragmented relations
1990
Proceedings of the second international symposium on Databases in parallel and distributed systems - DPDS '90
Little attention has been paid however to the influence of relation fragmentation and parallelism on constraint handling. ...
Integrity constraint handling is considered an important issue in relational database management systems. Many studies were already conducted in this area. ...
of Amsterdam and the Centre for Mathematics and Computer Science Amsterdam in the development of our DBMS. ...
doi:10.1145/319057.319081
fatcat:ttfpvwlnnvcyjkgrseckzomhwy
Enhanced Second-order Implicit Constraint Enforcement for Dynamic Simulations
2008
KSII Transactions on Internet and Information Systems
In this paper, there is a reasonable discussion about the comparison of constraints error and the analysis of dynamic behavior using kinetic energy and potential energy. ...
This paper describes the numerical formulation of second-order implicit constraints enforcement. ...
Proposed Second-order Implicit Constraint Enforcement Scheme
First-order implicit constraint enforcement A mixed system of ordinary differential equations and algebraic expressions can be written using ...
doi:10.3837/tiis.2008.01.004
fatcat:mn7qw23pcrauphf6sivzoroucm
Augmented invariance control for systems with smoothness constraints
2016
2016 IEEE 55th Conference on Decision and Control (CDC)
In many applications, the controlled dynamical system is subject to constraints, e.g. to enforce a desired performance. There are various methods, which guarantee the enforcement of such constraints. ...
Augmentation of the dynamical system achieves a desired smoothness of the state whereas methods from invariance control are utilized to guarantee constraint enforcement. ...
enforcement as well as desired dynamics of the control input and smoothness of the system states. ...
doi:10.1109/cdc.2016.7799013
dblp:conf/cdc/KimmelJH16
fatcat:ujnocmzn25cl5gzqri6wsbhltu
Enforcing Role-Based Access Control Policies in Web Services with UML and OCL
2008
2008 Annual Computer Security Applications Conference (ACSAC)
One of the important aspects of RBAC is authorization constraints that express such organizational policies. ...
This authorization engine is implemented by means of the USE system, a validation tool for UML models and OCL constraints. ...
The OCL approach is formal and precise, and can express various kinds of authorization constraints, such as static and History-based SOD constraints, and context constraints. ...
doi:10.1109/acsac.2008.35
dblp:conf/acsac/SohrMBA08
fatcat:mcr55apvljcd3leqderyyennhy
Dynamic invariant detection for relational databases
2011
Proceedings of the Ninth International Workshop on Dynamic Analysis - WODA '11
Despite the many automated techniques that benefit from dynamic invariant detection, to date, none are able to capture and detect dynamic invariants at the interface of a program and its databases. ...
The second study reveals that all of these meaningful invariants are schema-enforceable using standards-compliant databases and many can be checked by databases with only limited schema constructs. ...
Making these implicit constraints explicit in the schema provides a much stronger assurance of data integrity as the RDBMS will enforce the constraints and reject data that violates a schema constraint ...
doi:10.1145/2002951.2002955
dblp:conf/issta/CobbJKH11
fatcat:m7uf6m5ctjgnfdoirr3rjugnpa
New Measures for the Quantization of Systems with Constraints
[article]
1996
arXiv
pre-print
Based on the results of a recent reexamination of the quantization of systems with first-class and second-class constraints from the point of view of coherent-state phase-space path integration, we give ...
well as extend the formalism to include cases of first-class constraints the operator form of which have a spectral gap about the value zero that characterizes the quantum constraint subspace. ...
Acknowledgements Thanks are expressed to J. Govaerts and S. Shabanov for their interest in the present formulation of the quantization of constrained systems. ...
arXiv:quant-ph/9607020v1
fatcat:dwjo3docefhltestuay4eq4ncq
Integrity control in relational database systems — an overview
1993
Data & Knowledge Engineering
This paper gives an overview of research regarding integrity control or integrity constraint handling in relational database management systems. ...
First, constraint handling is discussed by identifying a number of important research issues, and by treating each issue in detail. ...
The referees of the DKE journal are thanked for their comments on the first submitted version of this paper. ...
doi:10.1016/0169-023x(93)90008-d
fatcat:5jnsitez4fbfnhsgoqsfepc56y
Runtime Integrity for Cyber-Physical Infrastructures
[chapter]
2015
IFIP Advances in Information and Communication Technology
Trusted computing is a security paradigm that enables platforms to enforce the integrity of execution targets (code and data). However, protection under this paradigm is restricted to static threats. ...
This chapter proposes a dynamic framework that addresses runtime integrity threats that target software programs in cyber-physical systems. ...
DUE 1241525, CNS 1347113 and DGE 1538850. ...
doi:10.1007/978-3-319-26567-4_10
fatcat:igu4nujm7ngltgzsewvy4dpeiq
Implicit Constraint Enforcement for Rigid Body Dynamic Simulation
[chapter]
2006
Lecture Notes in Computer Science
The paper presents a simple, robust, and effective constraint enforcement scheme for rigid body dynamic simulation. ...
We describe the formulation of implicit constraint enforcement for both holonomic and non-holonomic cases in rigid body simulation. ...
with constraint gradient given by ( ) q q Φ =Β (14) The dynamic system will have only constraint forces as we wish to isolate the effect of constraint enforcement on stability. ...
doi:10.1007/11758501_67
fatcat:caec6j2225f7fkvq3kmnk72ryi
Towards realizing a formal RBAC model in real systems
2007
Proceedings of the 12th ACM symposium on Access control models and technologies - SACMAT '07
In this paper, we propose an empirical framework to integrate security model representation, security policy specification, and systematic validation of security model and policy, which would be eventually ...
We also describe how our framework can minimize the gap between security models and the development of secure systems. ...
-03ER25565) and Department of Defense (H98230-04-1-0210). ...
doi:10.1145/1266840.1266875
dblp:conf/sacmat/AhnH07
fatcat:vvrg3q4w6bdjhayuc6p5znlgtu
Integrals of Motion for Planar Multibody Formations with Internal Forces
2011
Journal of Guidance Control and Dynamics
Interest in the use of non-contacting forces between spacecraft has prompted many studies of the dynamics of such formations. ...
While the introduction of such a force potentially complicates the analysis of these systems, integrals of motion still exist for idealized cases. These integrals not only define ...
Requiring λ 2 to be zero effectively enforces this constraint. Substituting Eq. (34) into Eq. ( 25 ) and rearranging provides an expression of q2 in terms of only q 1 and known quantities. ...
doi:10.2514/1.53691
fatcat:rexavhzc55ftjkxjjk3c2mrzau
« Previous
Showing results 1 — 15 out of 185,042 results