Artykuły w czasopismach na temat „Database transaction safety”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 48 najlepszych artykułów w czasopismach naukowych na temat „Database transaction safety”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Sheard, Tim, i David Stemple. "Automatic verification of database transaction safety". ACM Transactions on Database Systems 14, nr 3 (wrzesień 1989): 322–68. http://dx.doi.org/10.1145/68012.68014.
Pełny tekst źródłaLin, Jerry Chun-Wei, Matin Pirouz, Youcef Djenouri, Chien-Fu Cheng i Usman Ahmed. "Incrementally updating the high average-utility patterns with pre-large concept". Applied Intelligence 50, nr 11 (30.06.2020): 3788–807. http://dx.doi.org/10.1007/s10489-020-01743-y.
Pełny tekst źródłaChen, Chao, Abdelsalam (Sumi) Helal, Zhi Jin, Mingyue Zhang i Choonhwa Lee. "IoTranx: Transactions for Safer Smart Spaces". ACM Transactions on Cyber-Physical Systems 6, nr 1 (31.01.2022): 1–26. http://dx.doi.org/10.1145/3471937.
Pełny tekst źródłaRahmawati, Rianti, Anak Agung Gde Agung i Fitri Sukmawati. "Aplikasi Perhitungan Persediaan Bahan Baku dengan Metode Economic Order Quantity Berdasarkan Varian Produk". Jurnal Nasional Pendidikan Teknik Informatika (JANAPATI) 5, nr 1 (13.03.2016): 34. http://dx.doi.org/10.23887/janapati.v5i1.9915.
Pełny tekst źródłaHuang, Chen, Dan Wang, Zhen Wang i Jian Yun. "Development of Cultural Investment Trading Services Platform Based on Drupal Framework". Applied Mechanics and Materials 373-375 (sierpień 2013): 1647–51. http://dx.doi.org/10.4028/www.scientific.net/amm.373-375.1647.
Pełny tekst źródłaMohamed, Asghaiyer. "Network load traffic on MySQL atomic transaction database". Bulletin of Social Informatics Theory and Application 4, nr 1 (23.04.2020): 35–39. http://dx.doi.org/10.31763/businta.v4i1.188.
Pełny tekst źródłaVandevoort, Brecht, Bas Ketsman, Christoph Koch i Frank Neven. "Robustness against read committed for transaction templates". Proceedings of the VLDB Endowment 14, nr 11 (lipiec 2021): 2141–53. http://dx.doi.org/10.14778/3476249.3476268.
Pełny tekst źródłaHaoxiang, Wang, i Smys S. "A Survey on Digital Fraud Risk Control Management by Automatic Case Management System". March 2021 3, nr 1 (10.05.2021): 1–14. http://dx.doi.org/10.36548/jeea.2021.1.001.
Pełny tekst źródłaKuznetsov, Alexandr, Inna Oleshko, Vladyslav Tymchenko, Konstantin Lisitsky, Mariia Rodinko i Andrii Kolhatin. "Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain". International Journal of Computer Network and Information Security 13, nr 2 (8.04.2021): 1–15. http://dx.doi.org/10.5815/ijcnis.2021.02.01.
Pełny tekst źródłaOu, Jiarui, i Jianglin Zhang. "Data Mining and Meta-Analysis of Psoriasis Based on Association Rules". Journal of Healthcare Engineering 2022 (27.01.2022): 1–11. http://dx.doi.org/10.1155/2022/9188553.
Pełny tekst źródłaYu, Xiaona, Chunmei Zhang i Chengcheng Wang. "Construction of Hospital Human Resource Information Management System under the Background of Artificial Intelligence". Computational and Mathematical Methods in Medicine 2022 (4.08.2022): 1–11. http://dx.doi.org/10.1155/2022/8377674.
Pełny tekst źródłaWolfson, Ouri, i Mihalis Yannakakis. "Deadlock-freedom (and safety) of transactions in a distributed database". Journal of Computer and System Sciences 33, nr 2 (październik 1986): 161–78. http://dx.doi.org/10.1016/0022-0000(86)90017-6.
Pełny tekst źródłaLin, Jerry Chun-Wei, Wensheng Gan, Tzung-Pei Hong i Jingliang Zhang. "Updating the Built Prelarge Fast Updated Sequential Pattern Trees with Sequence Modification". International Journal of Data Warehousing and Mining 11, nr 1 (styczeń 2015): 1–22. http://dx.doi.org/10.4018/ijdwm.2015010101.
Pełny tekst źródłaDhika, Harry, Merita Ayu Sri Maharani i Atikah Atikah. "PERANCANGAN SISTEM INFORMASI PEMBAYARAN SERVIS ELEKTRONIK TOKO MS COMPUTER MENGGUNAKAN JAVA DAN MYSQL". SINTECH (Science and Information Technology) Journal 4, nr 1 (21.04.2021): 59–66. http://dx.doi.org/10.31598/sintechjournal.v4i1.703.
Pełny tekst źródłaChakraborty, A., M. K. Garg, A. K. Majumdar i S. Sural. "Attack recovery from malicious transactions in distributed database systems". International Journal of Information and Computer Security 2, nr 2 (2008): 197. http://dx.doi.org/10.1504/ijics.2008.018519.
Pełny tekst źródłaPrashar, Deepak, Nishant Jha, Sudan Jha, Yongju Lee i Gyanendra Prasad Joshi. "Blockchain-Based Traceability and Visibility for Agricultural Products: A Decentralized Way of Ensuring Food Safety in India". Sustainability 12, nr 8 (24.04.2020): 3497. http://dx.doi.org/10.3390/su12083497.
Pełny tekst źródłaElleuch, Islam, Achraf Makni i Rafik Bouaziz. "Cooperative Overtaking Assistance System Based on V2V Communications and RTDB". Computer Journal 62, nr 10 (10.04.2019): 1426–49. http://dx.doi.org/10.1093/comjnl/bxz026.
Pełny tekst źródłaAdane, Dattatraya, i Harmeet Kaur Khanuja. "Monitor and detect suspicious transactions with database forensics and Dempster-Shafer theory of evidence". International Journal of Electronic Security and Digital Forensics 12, nr 2 (2020): 154. http://dx.doi.org/10.1504/ijesdf.2020.10027593.
Pełny tekst źródłaKhanuja, Harmeet Kaur, i Dattatraya Adane. "Monitor and detect suspicious transactions with database forensics and Dempster-Shafer theory of evidence". International Journal of Electronic Security and Digital Forensics 12, nr 2 (2020): 154. http://dx.doi.org/10.1504/ijesdf.2020.106302.
Pełny tekst źródłaWang, Qun, i Ting Xue. "Tunnel Security Management Based on Association Rule Mining under Hadoop Platform". Mathematical Problems in Engineering 2022 (10.08.2022): 1–11. http://dx.doi.org/10.1155/2022/8508273.
Pełny tekst źródłaAnggraini, Ria, i Andri Andri. "Sistem Informasi Webstore Online Pada Toko DK Corner Menggunakan Metode Web Design Responsive Bootstrap". Jurnal Nasional Ilmu Komputer 2, nr 3 (20.11.2021): 180–92. http://dx.doi.org/10.47747/jurnalnik.v2i3.532.
Pełny tekst źródłaTouil, Hamza, Nabil El Akkad i Khalid Satori. "H-Rotation: Secure Storage and Retrieval of Passphrases on the Authentication Process". International Journal of Safety and Security Engineering 10, nr 6 (31.12.2020): 785–96. http://dx.doi.org/10.18280/ijsse.100609.
Pełny tekst źródłaTouil, Hamza, Nabil El Akkad i Khalid Satori. "H-Rotation: Secure Storage and Retrieval of Passphrases on the Authentication Process". International Journal of Safety and Security Engineering 10, nr 6 (31.12.2020): 785–96. http://dx.doi.org/10.18280/ijsse.100609.
Pełny tekst źródłaKaur, Amanpreet, Gurpreet Singh, Vinay Kukreja, Sparsh Sharma, Saurabh Singh i Byungun Yoon. "Adaptation of IoT with Blockchain in Food Supply Chain Management: An Analysis-Based Review in Development, Benefits and Potential Applications". Sensors 22, nr 21 (25.10.2022): 8174. http://dx.doi.org/10.3390/s22218174.
Pełny tekst źródłaAmbarwati, Ambarwati. "Rancang Bangun Sistem Penjualan Furniture Menggunakan Metode Exponential Smoothing". Journal of Computer System and Informatics (JoSYC) 2, nr 4 (31.08.2021): 280–87. http://dx.doi.org/10.47065/josyc.v2i4.816.
Pełny tekst źródłaGîrbacia, F., D. Voinea, R. Boboc, M. Duguleană i C. C. Postelnicu. "Toward blockchain adoption for the automotive industry". IOP Conference Series: Materials Science and Engineering 1220, nr 1 (1.01.2022): 012026. http://dx.doi.org/10.1088/1757-899x/1220/1/012026.
Pełny tekst źródłaPeng, Wang, Nuzul Azam Haron, Aidi Hizami Alias i Teik Hua Law. "Leadership in Construction: A Scientometric Review". Buildings 12, nr 11 (31.10.2022): 1825. http://dx.doi.org/10.3390/buildings12111825.
Pełny tekst źródłaSudarto, Ferry, Mulyati Mulyati, Eka Purnama Harahap i Fira Arbaimaniar Nurul. "Design Of Property Sales Information System PT.Quality Property Indonesia". Aptisi Transactions on Management (ATM) 4, nr 2 (4.06.2020): 150–57. http://dx.doi.org/10.33050/atm.v4i2.1272.
Pełny tekst źródłaMorikawa, Landon H., Sailesh V. Tummala, Joseph C. Brinkman, Skye A. Buckner Petty i Anikar Chhabra. "Effect of a Condensed NBA Season on Injury Risk: An Analysis of the 2020 Season and Player Safety". Orthopaedic Journal of Sports Medicine 10, nr 9 (1.09.2022): 232596712211211. http://dx.doi.org/10.1177/23259671221121116.
Pełny tekst źródłaLondhe, Alka, P. V. R. D. Prasada Rao, Shrikant Upadhyay i Rituraj Jain. "Extracting Behavior Identification Features for Monitoring and Managing Speech-Dependent Smart Mental Illness Healthcare Systems". Computational Intelligence and Neuroscience 2022 (6.05.2022): 1–14. http://dx.doi.org/10.1155/2022/8579640.
Pełny tekst źródłade la Peña, Nuria, i Heywood Fleisig. "Romania: Law on Security Interests in Personal Property and Commentaries". Review of Central and East European Law 29, nr 2 (2004): 133–217. http://dx.doi.org/10.1163/157303504774062411.
Pełny tekst źródłaBerman, Jules J. "Zero-Check: A Zero-Knowledge Protocol for Reconciling Patient Identities Across Institutions". Archives of Pathology & Laboratory Medicine 128, nr 3 (1.03.2004): 344–46. http://dx.doi.org/10.5858/2004-128-344-zazpfr.
Pełny tekst źródłaYeung, A. W. K. "The “As Low As Reasonably Achievable” (ALARA) principle: a brief historical overview and a bibliometric analysis of the most cited publications". Radioprotection 54, nr 2 (kwiecień 2019): 103–9. http://dx.doi.org/10.1051/radiopro/2019016.
Pełny tekst źródłaWijayanti, Kusumaningrum, i Qurratul Aini. "The Influence of Transformational Leadership Style to Nurse Job Satisfaction and Performance in Hospital". Journal of World Science 1, nr 7 (20.07.2022): 485–99. http://dx.doi.org/10.36418/jws.v1i7.69.
Pełny tekst źródłaWijayanti, Kusumaningrum, i Qurratul Aini. "The Influence of Transformational Leadership Style to Nurse Job Satisfaction and Performance in Hospital". Journal of World Science 1, nr 7 (20.07.2022): 485–99. http://dx.doi.org/10.58344/jws.v1i7.69.
Pełny tekst źródłaDeng, Yinjuan, Shangping Wang, Qian Zhang i Jifang Wang. "A Secure and Efficient Access Control Scheme for Shared IoT Devices over Blockchain". Mobile Information Systems 2022 (31.12.2022): 1–21. http://dx.doi.org/10.1155/2022/4496486.
Pełny tekst źródłaShandrivska, O., i N. Shynkarenko. "APPLIED RISK ASSESSMENT IN THE SYSTEM OF SOCIO-ECONOMIC PROCESSES IN CYBERSPACE". Journal of Lviv Polytechnic National University. Series of Economics and Management Issues 4, nr 2 (10.11.2020): 94–105. http://dx.doi.org/10.23939/semi2020.02.094.
Pełny tekst źródłaIbatulin, M., O. Varchenko, I. Svynous, O. Klymchuk, O. Drahan i I. Herasymenko. "Factors of ensuring the competitiveness of Ukraine’s pig breeding production in external markets". Agricultural Science and Practice 6, nr 2 (15.07.2019): 29–46. http://dx.doi.org/10.15407/agrisp6.02.029.
Pełny tekst źródłaSiek, Konrad, i Paweł T. Wojciechowski. "Last-use opacity: a strong safety property for transactional memory with prerelease support". Distributed Computing, 17.04.2022. http://dx.doi.org/10.1007/s00446-022-00420-2.
Pełny tekst źródłaYounis, Mohammed Issam, i Athraa H. Alwan. "Design and Implementation of an IoT-based Transactional System for Quality Management". Iraqi Journal of Science, 27.02.2021, 658–75. http://dx.doi.org/10.24996/ijs.2021.62.2.30.
Pełny tekst źródła"A Novel Gmtds Algorithm for Dynamic Management of Transaction under Different Workload Condition". International Journal of Recent Technology and Engineering 8, nr 6 (30.03.2020): 1697–706. http://dx.doi.org/10.35940/ijrte.f7650.038620.
Pełny tekst źródła"Eauction Web & App Synced Smart Agriculture using Iot". International Journal of Recent Technology and Engineering 8, nr 2S4 (27.08.2019): 209–12. http://dx.doi.org/10.35940/ijrte.b1039.0782s419.
Pełny tekst źródłaRao, Abishek B., Jammula Surya Kiran i Poornalatha G. "Application of market–basket analysis on healthcare". International Journal of System Assurance Engineering and Management, 27.08.2021. http://dx.doi.org/10.1007/s13198-021-01298-2.
Pełny tekst źródłaMrs. J. Sathiya Jothi, Dr. K. Mohan, Ms. P. Abirami, Ms. J. Bhuvaneswari i Ms. S. Dhiviya. "Identifying the Genuineness of the Product using Blockchain Technology". International Journal of Advanced Research in Science, Communication and Technology, 30.05.2022, 539–44. http://dx.doi.org/10.48175/ijarsct-4538.
Pełny tekst źródłaULUKÖK, Esra, i Ethem MERDAN. "LAISSEZ-FAIRE LEADERSHIP: A MAP OF THE FIELD AND A BIBLIOMETRIC ANALYSIS". Uluslararası Ekonomi, İşletme ve Politika Dergisi, 21.09.2022. http://dx.doi.org/10.29216/ueip.1137885.
Pełny tekst źródłaZahar, Syakirah, Zilal Saari, Farahwahida Mohd Yusof i Siti Mariam Ali. "Shariah Compliance Human Milk Sharing Online Application". UMRAN - International Journal of Islamic and Civilizational Studies 6, nr 2-2 (7.10.2019). http://dx.doi.org/10.11113/umran2019.6n2-2.387.
Pełny tekst źródłaChien, William, Josenor De Jesus, Ben Taylor, Victor Dods, Leo Alekseyev, Diane Shoda i Perry B. Shieh. "The Last Mile: DSCSA Solution Through Blockchain Technology: Drug Tracking, Tracing, and Verification at the Last Mile of the Pharmaceutical Supply Chain with BRUINchain". Blockchain in Healthcare Today, 12.03.2020. http://dx.doi.org/10.30953/bhty.v3.134.
Pełny tekst źródłaLyubchenko, Irina. "NFTs and Digital Art". M/C Journal 25, nr 2 (25.04.2022). http://dx.doi.org/10.5204/mcj.2891.
Pełny tekst źródła