Catálogo de publicaciones - revistas
ACM Computing Surveys (CSUR)
Resumen/Descripción – provisto por la editorial en inglés
A journal of the Association for Computing Machinery (ACM), which publishes surveys, tutorials, and special reports on all areas of computing research. Volumes are published yearly in four issues appearing in March, June, September, and December.Palabras clave – provistas por la editorial
No disponibles.
Disponibilidad
Institución detectada | Período | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | desde mar. 1969 / hasta dic. 2023 | ACM Digital Library |
Información
Tipo de recurso:
revistas
ISSN impreso
0360-0300
ISSN electrónico
1557-7341
Editor responsable
Association for Computing Machinery (ACM)
País de edición
Estados Unidos
Fecha de publicación
1969-
Cobertura temática
Tabla de contenidos
Ubiquitous B-Tree
Douglas Comer
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 121-137
Geographic Data Processing
George Nagy; Sharad Wagle
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 139-181
About This Issue…
Adele Goldberg
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 183
Relational Database Systemsr
Won Kim
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 187-211
Database Management Systems Development in the USSR
A. G. Dale
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 213-226
Data Security
Dorothy E. Denning; Peter J. Denning
<jats:p>The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest in the technical safeguards for data. There are four kinds of safeguards, each related to but distinct from the others. Access controls regulate which users may enter the system and subsequently which data sets an active user may read or write. Flow controls regulate the dissemination of values among the data sets accessible to a user. Inference controls protect statistical databases by preventing questioners from deducing confidential information by posing carefully designed sequences of statistical queries and correlating the responses. Statistical data banks are much less secure than most people believe. Data encryption attempts to prevent unauthorized disclosure of confidential information in transit or in storage. This paper describes the general nature of controls of each type, the kinds of problems they can and cannot solve, and their inherent limitations and weaknesses. The paper is intended for a general audience with little background in the area.</jats:p>
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 227-249
Models and Measurements for Quality Assessment of Software
Siba N. Mohanty
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 251-275
Surveyor's Forum: Heads I Win, Tails You Lose
Robert Fenichel
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 277
Surveyor's Forum: Heads I Win, Tails You Lose
Stuart H. Zweben
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 277-278
Surveyor's Forum: Projecting Problems
H. Christiaen
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 278-279