ACM SIGMOD Anthology ACM SIGMOD dblp.uni-trier.de

Integrity Maintenance in A Telecommunications Switch.

Timothy Griffin, Howard Trickey: Integrity Maintenance in A Telecommunications Switch. IEEE Data Eng. Bull. 17(2): 43-46(1994)
@article{DBLP:journals/debu/GriffinT94,
  author    = {Timothy Griffin and
               Howard Trickey},
  title     = {Integrity Maintenance in A Telecommunications Switch},
  journal   = {IEEE Data Eng. Bull.},
  volume    = {17},
  number    = {2},
  year      = {1994},
  pages     = {43-46},
  ee        = {db/journals/debu/GriffinT94.html},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

Abstract

AT&T's telecommunications switch 5ESS® uses an embedded relational database for controlling all aspects of its operation, making data integrity crucial for its proper functioning. We describe a system for maintaining data integrity that is being developed for the 5ESS.

Copyright © 1994 by the author(s). Abstract used with permission.


ACM SIGMOD Anthology

CDROM Version: Load the CDROM "Volume 1 Issue 2, SIGMOD '75-'92" and ... DVD Version: Load ACM SIGMOD Anthology DVD 2" and ... BibTeX

Online Edition:

Data Engineering Bulletin June 1994: Database Constraint Management (Jennifer Widom, ed.)
( letter+figures , letter-figures , A4+figures , A4-figures , PDF+figures)

References

[1]
Philip A. Bernstein, Barbara T. Blaustein, Edmund M. Clarke: Fast Maintenance of Semantic Integrity Assertions Using Redundant Aggregate Data. VLDB 1980: 126-136 BibTeX
[2]
Mukesh Dalal: Efficient Propositional Constraint Propagation. AAAI 1992: 409-414 BibTeX
[3]
...
[4]
Ashish Gupta, Jennifer Widom: Local Verification of Global Integrity Constraints in Distributed Databases. SIGMOD Conference 1993: 49-58 BibTeX
[5]
Lawrence J. Henschen, William McCune, Shamim A. Naqvi: Compiling Constraint-Checking Programs from First-Order Formulas. Advances in Data Base Theory 1982: 145-169 BibTeX
[6]
C. A. R. Hoare: An Axiomatic Basis for Computer Programming. Commun. ACM 12(10): 576-580(1969) BibTeX
[7]
...
[8]
Arding Hsu, Tomasz Imielinski: Integrity Checking for Multiple Updates. SIGMOD Conference 1985: 152-168 BibTeX
[9]
William McCune, Lawrence J. Henschen: Maintaining state constraints in relational databases: a proof theoretic basis. J. ACM 36(1): 46-68(1989) BibTeX
[10]
Jean-Marie Nicolas: Logic for Improving Integrity Checking in Relational Data Bases. Acta Inf. 18: 227-253(1982) BibTeX
[11]
Robert Paige: Applications of Finite Differencing to Database Integrity Control and Query/Transaction Optimization. Advances in Data Base Theory 1982: 171-209 BibTeX
[12]
Xiaolei Qian: An Effective Method for Integrity Constraint Simplification. ICDE 1988: 338-345 BibTeX
[13]
...
[14]
Xiaolei Qian: An Axiom System for Database Transactions. Inf. Process. Lett. 36(4): 183-189(1990) BibTeX
[15]
David W. Stemple, Subhasish Mazumdar, Tim Sheard: On the Modes and Meaning of Feedback to Transaction Designers. SIGMOD Conference 1987: 374-386 BibTeX

Referenced by

  1. Michael Benedikt, H. Jerome Keisler: Expressive Power of Unary Counters. ICDT 1997: 291-305
  2. Timothy Griffin, Leonid Libkin: Incremental Maintenance of Views with Duplicates. SIGMOD Conference 1995: 328-339
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
Bulletin of the IEEE Computer Society Technical Committee on Data Engineering: Copyright © by IEEE,
ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sat May 16 23:56:12 2009