Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,827,957 papers from all fields of science
Search
Sign In
Create Free Account
Compound key
Known as:
Combination Primary Key
, Composite key
In database design, a compound key is a set of superkeys that is not minimal. A composite key is a set that contains a compound key and at least one…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Associative entity
Candidate key
Foreign key
Relational database
Expand
Broader (1)
Data modeling
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Beginning EJB in Java EE 8
Jonathan D. Wetherbee
,
Massimo Nardone
,
Chirag Rathod
,
R. Kodali
Apress
2018
Corpus ID: 44160584
Entity Class������������������������������������������������������������������������������������������������������������ 191…
Expand
2015
2015
Designing Securely and Reliably Connected Wireless Sensor Networks
Jun Zhao
,
Osman Yaugan
,
V. Gligor
arXiv.org
2015
Corpus ID: 17601864
In wireless sensor networks, the $q$-composite key predistribution scheme is a widely recognized way to secure communications…
Expand
2015
2015
Test case selection for regression testing of applications using web services based on WSDL specification changes
Prerna Singal
,
A. Mishra
,
Latika Singh
International Conference on Computing…
2015
Corpus ID: 10161895
There is much enthusiasm around web services in today's world. Web Services take the advantage of internet to communicate between…
Expand
2014
2014
Topological Properties of Wireless Sensor Networks Under the Q-Composite Key Predistribution Scheme With Unreliable Links (CMU-CyLab-14-002)
Jun Zhao
,
Osman Yağan
,
V. Gligor
2014
Corpus ID: 115304751
The seminal q-composite key predistribution scheme [3] (IEEE S&P 2003) is used prevalently for secure communications in large…
Expand
2013
2013
Active key management scheme to avoid clone attack in wireless sensor network
P. Sivasankar
,
Cse
,
M Ramakrishnan
International Conference on Computing…
2013
Corpus ID: 17869637
In Wireless sensor Network, the sensor nodes transmit critical information over the network; therefore, security services, such…
Expand
2013
2013
An Efficient Security Way of Authentication and Pair wise Key Distribution with Mobile Sinks in Wireless Sensor Networks
Hongmei Deng
,
W. Li
,
D. Agrawal
,
R. Govindan
,
Radford R. Juang
2013
Corpus ID: 17689264
: Wireless sensor networks (WSN) are the emerging application in many industrial and missile sector. Mobile sinks (MSs) are vital…
Expand
2010
2010
Perl Status Reporter (SRr) on Spatio-temporal Data Mining
Sugam Sharma
,
S. Gadia
2010
Corpus ID: 28003458
Perl Status Reporter (SRr) [1] is a data mining tool and in this research work we illustrate the use of SRr on spatio-temporal…
Expand
2010
2010
Cluster Based Composite Key Management in Mobile Ad Hoc Networks
J. Hubaux
,
L. Buttyán
,
+7 authors
Jingsha He
2010
Corpus ID: 61823220
Mobile ad hoc network is a wireless network without the support of network infrastructure. Security is one of the main challenge…
Expand
2007
2007
Keyboard automatic test system and its method
张传国
,
李海荣
,
王昌浩
2007
Corpus ID: 196001226
The present invention provides a keyboard automatic test system and its method, the system includes a keyboard unit and a…
Expand
1996
1996
Dynamic optimization of index scans restricted by Booleans
G. Antoshenkov
Proceedings of the Twelfth International…
1996
Corpus ID: 8308420
When index retrieval is restricted to a range or singleton, an index scan is not done in its entirety because key portions before…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required