Safety first (data security) (Englisch)
- Neue Suche nach: Greene, R.E.
- Neue Suche nach: Greene, R.E.
In:
Proceedings of the 5th
;
593-595
;
1990
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:Safety first (data security)
-
Weitere Titelangaben:Safety First (Datensicherheit)
-
Beteiligte:Greene, R.E. ( Autor:in )
-
Erschienen in:Proceedings of the 5th ; 593-595
-
Verlag:
- Neue Suche nach: IEEE Comput. Soc
-
Erscheinungsort:Los Alamitos
-
Erscheinungsdatum:1990
-
Format / Umfang:3 Seiten
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 0_1
-
Proceedings of the 5th Jerusalem Conference on Information Technology (JCIT). Next Decade in Information Technology (Cat. No.90TH0326-9)| 1990
- 1
-
Choosing the best storage technique for a main memory database systemGruenwald, L. / Eich, M.H. et al. | 1990
- 11
-
File system design using large memoriesStaelin, C. / Garcia-Molina, H. et al. | 1990
- 22
-
An interleaved file system for a highly distributed MIMD architectureFarber, Y. / Barak, A. et al. | 1990
- 32
-
A simulation generator for multiprocessor systemsIsraeli, A. / Nissim, T.A. et al. | 1990
- 43
-
Xputers: very high throughput by innovative computing principlesHartenstein, R.W. / Hirschbiel, A.G. / Weber, M. et al. | 1990
- 51
-
An efficient organization for large, network-based multicomputer systemsScheidig, H. / Schneider, M.F. / Spurk, R. et al. | 1990
- 65
-
Programming the data structure acceleratorZippel, R. et al. | 1990
- 76
-
The Supercomputer Toolkit and its applicationsAbelson, H. / Berlin, A.A. / Katzenelson, J. / McAllister, W.H. / Rozas, G.J. / Sussman, G.J. et al. | 1990
- 82
-
A special distributed system in a general programming environmentHeilper, A. / Marberg, J. et al. | 1990
- 89
-
Deadlock-avoidance in a page-parallel rasterizerBirk, Y. et al. | 1990
- 99
-
Log-driven backups: A recovery scheme for large memory database systemsLevy, E. / Silberschatz, A. et al. | 1990
- 110
-
Mutual exclusion revisitedSzymanski, B.K. et al. | 1990
- 118
-
Servers, processes and subprocesses: a critical evaluationBerbers, Y. / Verbaeten, P. et al. | 1990
- 127
-
Wasted resources in gang schedulingFeitelson, D.G. / Rudolph, L. et al. | 1990
- 137
-
User authentication by cognitive passwords: an empirical assessmentZviran, M. / Haga, W.J. et al. | 1990
- 146
-
Interacting processes: a language for coordinated distributed programmingFrancez, N. / Forman, I.R. et al. | 1990
- 162
-
Superposition and fairness in reactive system refinementBack, R.J.R. / Kurki-Suonio, R. et al. | 1990
- 173
-
Reasoning in CSP via the HOL theorem proverCamilleri, A.J. et al. | 1990
- 184
-
TAPIOCA: OCCAM rapid prototyping from Petri-netBreant, F. et al. | 1990
- 191
-
Methods and tools for modelling the behaviour of information-transport ports in distributed software configurationsPakstas, A. et al. | 1990
- 195
-
Bergate-a system for interconnecting local area networks via broadband ISDNGavras, A. / Butscher, B. / Luckenbach, T. / Xu, X. et al. | 1990
- 206
-
Parallelism in transport oriented communication protocolsZitterbart, M. et al. | 1990
- 214
-
Electronic data interchangeKreuwels, C.M.A. et al. | 1990
- 225
-
Algorithms and optic implementation for reconfigurable networksSchuster, A. / Ben-Asher, Y. et al. | 1990
- 236
-
Software uncertainty and the role of CASE in its minimisation and controlLehman, M.M. et al. | 1990
- 247
-
Some simple models of CASE tool integrationLewis, G.R. et al. | 1990
- 251
-
Automated retrieval of consistent documentation from requirement analysis to program codes for software maintenanceShun-Tzu Tsai / Chien-Chiao Yang et al. | 1990
- 261
-
Knowledge support for information system designGrosz, G. / Rolland, C. et al. | 1990
- 270
-
Location of checkpoints in fault-tolerant softwareSaglietti, F. et al. | 1990
- 278
-
Learning to recognize reusable software modules using an inductive classification systemEsteva, J.C. et al. | 1990
- 286
-
Software cost estimation modelsHeemstra, F.J. et al. | 1990
- 298
-
Functional C: an extended functional programming languageKim, M.J. / Jhon, C.S. et al. | 1990
- 303
-
A compumetrical approach to summarize benchmark resultsIgbaria, M. / Silver, M. et al. | 1990
- 315
-
Artificial intelligence and designAmarel, S. et al. | 1990
- 334
-
Translating telephone: problems and prospectsReddy, R. et al. | 1990
- 336
-
Logic programming with goal-directed searchDarlington, J.L. et al. | 1990
- 345
-
Junior Researcher: a discovery system that can solve the N queens problems (N>or=4) on a constant computational complexityGao, Q.S. / Hou, S.J. et al. | 1990
- 348
-
A general framework of constraint propagation for diagnostic systemsTsuchiya, R. / Ogino, T. et al. | 1990
- 353
-
Generating explanations from question pathsSarantinos, E. / Johnson, P. et al. | 1990
- 364
-
A study on the recognition of the Korean monothongs using artificial neural net modelsKiseok Kim / Inbum Kim / Heeyeung Hwang et al. | 1990
- 372
-
The computability of architectural designKalay, Y.E. et al. | 1990
- 380
-
Deducing linguistic structure from the statistics of large corporaBrill, E. / Magerman, D. / Marcus, M. / Santorini, B. et al. | 1990
- 391
-
What is an inference rule?Fagin, R. / Halpern, J.Y. / Vardi, M.Y. et al. | 1990
- 402
-
A fast NC algorithm to recognize P4-reducible graphsLin, R. / Olariu, S. et al. | 1990
- 414
-
How to keep a dynamic distributive directed graph acyclic and yet grant all requests of edge additionsEven, S. / Pnueli, Y. et al. | 1990
- 426
-
A parallel implementation of equational programmingDershowitz, N. / Lindenstrauss, N. et al. | 1990
- 436
-
One-page book embedding under vertex-neighborhood constraintsMoran, S. / Wolfsthal, Y. et al. | 1990
- 447
-
On the expressive power of program schemes with setsStolboushkin, A.P. et al. | 1990
- 456
-
Evaluation and comparison of text-manipulation systemsYovev, C.S. et al. | 1990
- 467
-
Optimal evaluation of vector expression treesRauber, T. et al. | 1990
- 474
-
Access control requirements for environmental information knowledge base systemsSteinke, G. et al. | 1990
- 481
-
Mapping data schemas to MDBMS architecture layersDurr, M. / Lang, S.M. et al. | 1990
- 491
-
Overlapping B+trees for temporal dataManolopoulos, Y. / Kapetanakis, G. et al. | 1990
- 500
-
New directions in database management systemsBeeri, C. et al. | 1990
- 507
-
Multidatabase performance evaluationBreitbart, Y. / Morales, H. / Silberschatz, A. / Thompson, G. et al. | 1990
- 531
-
Integration of different transaction models in federative distributed database systemsJohannsen, W. et al. | 1990
- 541
-
Heuristic-based semantic query optimizationSciore, E. / Siegel, M. et al. | 1990
- 551
-
SQL query modification algorithmsChou, D. / Segev, A. et al. | 1990
- 560
-
Notes on real-time distributed database systems stabilitySchreiber, F.A. et al. | 1990
- 565
-
Evaluation and improvement of query processing methods in wide and local area networkKrolikowski, Z. et al. | 1990
- 576
-
Concurrency control in distributed databases through dummy locksHalici, U. / Dogac, A. et al. | 1990
- 586
-
Using information technologyWohl, A.D. et al. | 1990
- 589
-
Organizing for simplicity: the role of information technologyRubin, R.M. et al. | 1990
- 593
-
Safety first (data security)Greene, R.E. et al. | 1990
- 596
-
Positioning I/S to achieve world-class quality performanceShrednick, H.R. et al. | 1990
- 598
-
Ensuring usability: Aetna's experienceSitkin, I.J. / Mason, L.H. et al. | 1990
- 600
-
The road to enterprise excellenceShore, E.B. et al. | 1990
- 602
-
Information technology risk managementGinzberg, M.J. / Moulton, R.T. et al. | 1990
- 609
-
Coordination: a new field of application for information technologyHolt, A. et al. | 1990
- 617
-
The current status of copyright and patent protection for computer softwareBrown, J.E. / Clapes, A.L. / Taylor, E.H. et al. | 1990
- 630
-
COPYCAT: a system for the distribution of copyright cataloging informationTurner, P.A. et al. | 1990
- 639
-
Desktop research-information management for the scholarRosenberg, V. et al. | 1990
- 644
-
Trends in using computers in educationCharp, S. et al. | 1990
- 647
-
Computer innovation in higher educationMelmed, A.S. et al. | 1990
- 650
-
Hardware and software compatibility issues (computers in education)Gattis, W.D. et al. | 1990
- 657
-
Integrating courseware with lessonware (computers in education)Osin, L. et al. | 1990
- 660
-
Computer assisted instruction and students' social orientationsKatz, Y.J. / Offir, B. et al. | 1990
- 665
-
Experience using a dynamic adaptive hidden-surface removal algorithm for volume rendering within a MIMD architectureStytz, M.R. / Frieder, O. et al. | 1990
- 677
-
A benchmark to scale behaviorally object-oriented database systemsKemper, A. / Chriesten, J. et al. | 1990
- 688
-
Televisualization: on the role of high-speed communication in the visualization of scienceAmitai, D. et al. | 1990
- 694
-
An overview of intelligent vehicle-highway systems (IVHS) activities in North AmericaChen, K. / Galler, B.A. et al. | 1990
- 702
-
Road transport informatics in Europe-a summary of current developmentsCatling, I. / McQueen, B. et al. | 1990
- 717
-
An interleaving model for real-timeHenzinger, T.A. / Manna, Z. / Pnueli, A. et al. | 1990
- 731
-
Reverse software engineering of concurrent programsGe, X. / Prywes, N. et al. | 1990
- 743
-
Expert Design AdvisorHowell, S.L. / Hwang, P.Q. / Nguyen, C.M. et al. | 1990
- 757
-
A temporal proof methodology for reactive systemsManna, Z. / Pnueli, A. et al. | 1990
- 774
-
A combinatorial approach to temporal reasoningBelfer, A. / Golumbic, M.C. et al. | 1990
- 781
-
The ACL data collection initiativeLiberman, M.Y. et al. | 1990
- 787
-
The making of an information retrieval interfaceMeadow, C.T. et al. | 1990