Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Zarina Dzolkhifli"'
Autor:
Zarina Dzolkhifli, Hamidah Ibrahim, Fatimah Sidi, Lilly Suriani Affendey, Siti Nurulain Mohd Rum, Ali A. Alwan
Publikováno v:
The 23rd International Conference on Information Integration and Web Intelligence.
Autor:
Wan Nurulsafawati Wan Manan, Tuan Muhammad Safiuddin, Zarina Dzolkhifli, Mohd Hafiz Mohd Hassin
Publikováno v:
Advanced Science Letters. 24:7446-7450
The emergent damage to computer network keeps increasing due to an extensive and prevalent connectivity on the Internet. Nowadays, attack detection strategies have become the most vital component in computer security despite the main preventive measu
Publikováno v:
Journal of Computing Science and Engineering. 3:260-277
In this paper we propose a model for checking integrity constraints of mobile databases called Three-Level (3-L) model, wherein the process of constraint checking to maintain the consistent state of mobile databases is realized at three different lev
Publikováno v:
International Journal of Interactive Mobile Technologies (iJIM); Vol. 3 (2009): Special Issue: Technical Basics; pp. 18-23
International Journal of Interactive Mobile Technologies, Vol 3, Iss S2, Pp 18-23 (2009)
ICDIM
International Journal of Interactive Mobile Technologies, Vol 3, Iss S2, Pp 18-23 (2009)
ICDIM
In a mobile environment, due to the various constraints inherited from limitations of wireless communication and mobile devices, checking for integrity constraints to maintain the consistent state of mobile databases is an important issue that needs
Publikováno v:
iiWAS
In a mobile environment, due to the various constraints inherited from limitations of wireless communication and mobile devices, checking for integrity constraints to maintain the consistent state of mobile databases is an important issue that needs
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783540705031
BNCOD
BNCOD
In a mobile environment, due to the various constraints inherited from limitations of wireless communication and mobile devices, checking for integrity constraints to maintain the consistent state of mobile databases is an important issue that needs
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ed11c8da0ff1219ef89966d852dae435
https://doi.org/10.1007/978-3-540-70504-8_18
https://doi.org/10.1007/978-3-540-70504-8_18
Publikováno v:
Distributed Computing and Internet Technology ISBN: 9783540897361
ICDCIT
ICDCIT
In a mobile environment, due to the various constraints inherited from limitations of wireless communication and mobile devices, checking for integrity constraints to maintain the consistent state of mobile databases is an important issue that needs
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::eb0f3a30c5e9dad6ad5366b336d18cc0
https://doi.org/10.1007/978-3-540-89737-8_16
https://doi.org/10.1007/978-3-540-89737-8_16
Publikováno v:
On the Move to Meaningful Internet Systems: OTM 2008 Workshops ISBN: 9783540888741
OTM Workshops
OTM Workshops
In this paper we propose Three-Level (3-L) model, wherein the process of constraint checking to maintain the consistent state of mobile databases is realized at three different levels. Sufficient and complete tests proposed in the previous works toge
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3af246bd1d5862d613c6acc92dc3261d
https://doi.org/10.1007/978-3-540-88875-8_78
https://doi.org/10.1007/978-3-540-88875-8_78