Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,716,035 papers from all fields of science
Search
Sign In
Create Free Account
System integrity
Known as:
Integrity (disambiguation)
In telecommunications, the term system integrity has the following meanings: 1. * That condition of a system wherein its mandated operational and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Automated information system
Computer hardware
Configuration management
Data integrity
Expand
Broader (3)
Computer security
Reliability engineering
Systems engineering
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Fire alarm system
高桥正树
,
坪川克秀
2013
Corpus ID: 3018221
The present invention provides a fire alarm system regardless of the size of their size, can prevent the occurrence of adverse…
Expand
2013
2013
A Framework of an Improved Model for Evaluation of Instructors' Performance in Higher Institutions of Learning
Aranuwa Felix Ola
,
S. Palaniappan
2013
Corpus ID: 67763675
The development of an improved and intelligent model for evaluation of instructors' performance in higher institutions of…
Expand
2010
2010
Anchor Leg System Integrity - From Design Through Service Life
A. Duggal
2010
Corpus ID: 54935397
This paper focuses on the authors’ experience with the long-term performance of anchor leg components for floating production…
Expand
2009
2009
Mitigation of Severe Accident Consequences Using Inherent Safety Principles
R. Wigeland
,
J. Cahalan
2009
Corpus ID: 109551175
Sodium-cooled fast reactors are designed to have a high level of safety. Events of high probability of occurrence are typically…
Expand
2008
2008
CHOOSING THE RIGHT TECHNOLOGY FOR A DIGITAL AUTOMATION ARCHITECTURE
R. Timoney
,
Ceo Fieldbus
2008
Corpus ID: 15000920
Fig. 1. Fieldbus technology is now replacing the traditional 4-20 mA platform as the basis for modern plant automation…
Expand
2006
2006
Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks
Sebastian Gajek
,
A. Sadeghi
,
Christian Stüble
,
M. Winandy
2006
Corpus ID: 8834570
Identity theft through phishing attacks has fostered to a major concern of Internet users.
2004
2004
Validating access control policies with Alloy
Waël Hassan
,
L. Logrippo
,
M. Mankai
2004
Corpus ID: 17483684
We present two projects that are being developed in our research group. The first is on inconsistency detection in XACML policies…
Expand
2003
2003
Technical considerations for the validation of electronic spreadsheets for complying with 21 CFR Part 11
T. Phan
2003
Corpus ID: 52971822
Electronic spreadsheets are a valuable and pervasive industry tool but have yet to catch up with regulatory compliance demands…
Expand
2000
2000
Multi-purpose time analyzer and monitor for Deep Space Network time synchronization
J. Gonzalez
,
M. Calhoun
,
S. Cole
,
R. Tjoelker
2000
Corpus ID: 109812520
Abstract : We report the development of a multi-purpose, automated, and continuously operating Time Analyzer to measure and…
Expand
1999
1999
Non-repudiation evidence generation for CORBA using XML
M. Wichert
,
David B. Ingham
,
Steve J. Caughey
Asia-Pacific Computer Systems Architecture…
1999
Corpus ID: 283905
Focuses on the provision of a non-repudiation service for CORBA. The current OMG specification of a CORBA non-repudiation service…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE