Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Check constraint

A check constraint is a type of integrity constraint in SQL which specifies a requirement that must be met by each row in a database table. The… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Basis data sangat dibutuhkan untuk penyimpanan sebuah data. Dalam perkembangannya basis data tidak hanya digunakan sebagai… Expand
Is this relevant?
2015
2015
1. ABSTRACT RDBMSs are designed to manage well-structured data requiring users to design a schema before storing and querying… Expand
  • table 1
  • figure 1
  • table 2
  • figure 2
Is this relevant?
2011
2011
Disparity acquisition is beneficial to various 3D multimedia applications, i.e., free viewpoint TV (FTV), 3DTV, and 3D scene… Expand
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
IIS*Case is a model driven software tool that provides information system modeling and prototype generation. It comprises visual… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2010
2010
IIS*Case is a software tool that provides information system modeling and prototypes generation. At the level of platform… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2009
2009
IIS*Case is a software tool that provides information system modeling and generating executable application prototypes. At the… Expand
  • figure 1
  • figure 2
  • table IV
Is this relevant?
2008
2008
We propose to integrate ACO in a Constraint Programming (CP) language. Basically, we use the CP language to describe the problem… Expand
  • figure 1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
In this letter, a modified weighted bit-flipping decoding algorithm for low-density parity-check codes is proposed. Improvement… Expand
  • figure 1
  • table I
  • figure 3
  • figure 4
Is this relevant?
2001
2001
The traditional role of integrity constraints is to protect the integrity of data, but integrity constraints can and do play… Expand
Is this relevant?
1986
1986
A system for generating direct manipulation office systems is described. In these systems, the user directly manipulates… Expand
  • figure I
  • figure 3
  • figure 5
  • figure 6
  • figure 7
Is this relevant?