Using Checksums to Detect Data Corruption.
Daniel Barbará, Rajni Goel, Sushil Jajodia:
Using Checksums to Detect Data Corruption.
EDBT 2000: 136-149@inproceedings{DBLP:conf/edbt/BarbaraGJ00,
author = {Daniel Barbar{\'a} and
Rajni Goel and
Sushil Jajodia},
editor = {Carlo Zaniolo and
Peter C. Lockemann and
Marc H. Scholl and
Torsten Grust},
title = {Using Checksums to Detect Data Corruption},
booktitle = {Advances in Database Technology - EDBT 2000, 7th International
Conference on Extending Database Technology, Konstanz, Germany,
March 27-31, 2000, Proceedings},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {1777},
year = {2000},
isbn = {3-540-67227-3},
pages = {136-149},
ee = {db/conf/edbt/BarbaraGJ00.html, http://link.springer.de/link/service/series/0558/bibs/1777/17770136.htm},
crossref = {DBLP:conf/edbt/2000},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX
BibTeX
Citation Page
BibTeX
References
- [1]
- ...
- [2]
- Philip Bohannon, Rajeev Rastogi, S. Seshadri, Abraham Silberschatz, S. Sudarshan:
Using Codewords to Protect Database Data from a Class of Software Errors.
ICDE 1999: 276-285 BibTeX
- [3]
- Sudarshan S. Chawathe, Anand Rajaraman, Hector Garcia-Molina, Jennifer Widom:
Change Detection in Hierarchically Structured Information.
SIGMOD Conference 1996: 493-504 BibTeX
- [4]
- Jongmoo Choi, Sam H. Noh, Sang Lyul Min, Yookun Cho:
An Adaptive Block Management Scheme Using On-Line Detection of Block Reference Patterns.
IW-MMDBMS 1998: 172-179 BibTeX
- [5]
- Robert Durst, Terrence Champion, Brian Witten, Eric Miller, Luigi Spagnuolo:
Testing and Evaluating: Computer Intrusion Detection Systems.
Commun. ACM 42(7): 53-61(1999) BibTeX
- [6]
- Gene H. Kim, Eugene H. Spafford:
The Design and Implementation of Tripwire: A File System Integrity Checker.
ACM Conference on Computer and Communications Security 1994: 18-29 BibTeX
- [7]
- John P. McDermott, David M. Goldschlag:
Storage Jamming.
DBSec 1995: 365-381 BibTeX
- [8]
- ...
- [9]
- Ralph C. Merkle:
A Fast Software One-Way Hash Function.
J. Cryptology 3(1): 43-58(1990) BibTeX
- [10]
- Kenneth Salem, Daniel Barbará, Richard J. Lipton:
Probabilistic Dignosis of Hot Spots.
ICDE 1992: 30-39 BibTeX
BibTeX
ACM SIGMOD Anthology - DBLP:
[Home | Search: Author, Title | Conferences | Journals]
Lecture Notes in Computer Science: Copyright © by Springer
Digitization of EDBT/ICDT/MFDBS proceedings was supported by the EDBT Endowment.
ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sat May 16 23:08:51 2009