|
|
|
|
|
|
Date Reviewed |
|
|
1 - 10 of 13
reviews
|
|
|
|
|
|
|
|
Public key infrastructure: building trusted applications and Web services Vacca J., CRC Press, Inc., Boca Raton, FL, 2004. 408 pp. Type: Book (9780849308222)
Looking at the cover of this book, one gets the impression that Vacca is the author. But, among the 26 chapters, we also find authors ranging from Jean Carlo Binder (chapter 1, “Public Key Infrastructures: What Are They?&...
|
Aug 5 2004 |
|
|
|
|
|
|
Transforming cabbage into turnip: polynomial algorithm for sorting signed permutations by reversals Hannenhalli S., Pevzner P. Journal of the ACM 46(1): 1-27, 1999. Type: Article
One of the wonders that may be contemplated in the world ofgenetics is the fact that, although related organisms have very similargenes, these genes are not arranged in the same order along thechromosomes. The differences in order are ...
|
Oct 1 1999 |
|
|
|
|
|
|
Database security Castano S., Fugini M., Martella G., Samarati P. (ed), ACM Press/Addison-Wesley Publ. Co., New York, NY, 1994. Type: Book (9780201593754)
Some years ago I decided to try to understand security. I collected a number of offprints on the subject and became reasonably aware of many of the topics described in this book. I never acquired much confidence in the field, however, ...
|
Aug 1 1996 |
|
|
|
|
|
|
Automatic generation of production rules for integrity maintenance Ceri S., Fraternali P., Paraboschi S., Tanca L. ACM Transactions on Database Systems 19(3): 367-422, 1994. Type: Article
The interest of this paper lies in the possibility that much less effort will be required to look for and correct violations of integrity than is usual with current database management systems. The research centers on the components of...
|
Oct 1 1995 |
|
|
|
|
|
|
Information modeling Edmond D., Prentice-Hall, Inc., Upper Saddle River, NJ, 1992. Type: Book (9780134577487)
At first this book gave me the impression that SQL had somehow become integrated with the formal specification notation Z (work on casting entity-relationship modeling and other aspects of systems analysis into Z has already appeared i...
|
Jan 1 1995 |
|
|
|
|
|
|
Information systems Knapp J. Computer personnel research (, St. Louis, MO, Apr 1-3, 1993) 261993. Type: Proceedings
In this thoughtful paper, Knapp presents the results of two surveys conducted by a department of data processing and information systems located near Chicago. The intention was to compare what is taught in colleges with what happens in...
|
Oct 1 1994 |
|
|
|
|
|
|
Multi-relations in Z Hayes I. Acta Informatica 29(1): 33-62, 1992. Type: Article
In manufacturing, a product is made of assemblies and assemblies are made of components. The author presents a mathematical theory for an abstraction of this manufacturing situation. The theory contemplates more complexity by permittin...
|
Aug 1 1993 |
|
|
|
|
|
|
The Z notation Spivey J., Prentice Hall International (UK) Ltd., Hertfordshire, UK, 1992. Type: Book (9780139785290)
The Z notation (pronounced “Zed”) is used in the formal specification of information systems. This book is a reference manual for Z....
|
Jul 1 1993 |
|
|
|
|
|
|
Design of the Mneme persistent object store Moss J. ACM Transactions on Information Systems 8(2): 103-139, 2001. Type: Article
The persistent object store whose design criteria and initial prototype are described here is part of a larger project to develop techniques for integrating programming languages and database features. Moss claims that separation of t...
|
Jul 1 1991 |
|
|
|
|
|
|
Polynomial-time implication problems for unary inclusion dependencies Cosmadakis S., Kanellakis P. (ed), Vardi M. Journal of the ACM 37(1): 15-46, 1990. Type: Article
This research paper in database theory presents results on the decidability of implication of unary inclusion dependencies (UINDs), embedded implicational dependencies (EIDs), and several of their subclasses. The subclasses include fun...
|
Mar 1 1991 |
|
|
|
|
|
|
|
|
|
|
|