ACM SIGMOD Anthology ACM SIGMOD dblp.uni-trier.de

Using Checksums to Detect Data Corruption.

Daniel Barbará, Rajni Goel, Sushil Jajodia: Using Checksums to Detect Data Corruption. EDBT 2000: 136-149
@inproceedings{DBLP:conf/edbt/BarbaraGJ00,
  author    = {Daniel Barbar{\'a} and
               Rajni Goel and
               Sushil Jajodia},
  editor    = {Carlo Zaniolo and
               Peter C. Lockemann and
               Marc H. Scholl and
               Torsten Grust},
  title     = {Using Checksums to Detect Data Corruption},
  booktitle = {Advances in Database Technology - EDBT 2000, 7th International
               Conference on Extending Database Technology, Konstanz, Germany,
               March 27-31, 2000, Proceedings},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {1777},
  year      = {2000},
  isbn      = {3-540-67227-3},
  pages     = {136-149},
  ee        = {db/conf/edbt/BarbaraGJ00.html, http://link.springer.de/link/service/series/0558/bibs/1777/17770136.htm},
  crossref  = {DBLP:conf/edbt/2000},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX
BibTeX

Online Edition: Springer LINK

Citation Page BibTeX

References

[1]
...
[2]
Philip Bohannon, Rajeev Rastogi, S. Seshadri, Abraham Silberschatz, S. Sudarshan: Using Codewords to Protect Database Data from a Class of Software Errors. ICDE 1999: 276-285 BibTeX
[3]
Sudarshan S. Chawathe, Anand Rajaraman, Hector Garcia-Molina, Jennifer Widom: Change Detection in Hierarchically Structured Information. SIGMOD Conference 1996: 493-504 BibTeX
[4]
Jongmoo Choi, Sam H. Noh, Sang Lyul Min, Yookun Cho: An Adaptive Block Management Scheme Using On-Line Detection of Block Reference Patterns. IW-MMDBMS 1998: 172-179 BibTeX
[5]
Robert Durst, Terrence Champion, Brian Witten, Eric Miller, Luigi Spagnuolo: Testing and Evaluating: Computer Intrusion Detection Systems. Commun. ACM 42(7): 53-61(1999) BibTeX
[6]
Gene H. Kim, Eugene H. Spafford: The Design and Implementation of Tripwire: A File System Integrity Checker. ACM Conference on Computer and Communications Security 1994: 18-29 BibTeX
[7]
John P. McDermott, David M. Goldschlag: Storage Jamming. DBSec 1995: 365-381 BibTeX
[8]
...
[9]
Ralph C. Merkle: A Fast Software One-Way Hash Function. J. Cryptology 3(1): 43-58(1990) BibTeX
[10]
Kenneth Salem, Daniel Barbará, Richard J. Lipton: Probabilistic Dignosis of Hot Spots. ICDE 1992: 30-39 BibTeX
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
Lecture Notes in Computer Science: Copyright © by Springer
Digitization of EDBT/ICDT/MFDBS proceedings was supported by the EDBT Endowment.
ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sat May 16 23:08:51 2009