Abstract
A scheme is described in which semantic nets are adapted to assist secure data acquisition. The nets are stored in a deductive database. They are normally used for system specification.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Threadgold, R., The Specification of Real Time Software, Proceedings of Expert Systems 90, the Tenth Annual Technical Conference of the British Computer Society Specialist Group on Expert Systems, London, September 1990, Cambridge University Press 1990.
SSADM Version 4 Reference Manual, NCC Blackwell Ltd 108 Cowley Road, Oxford, OX4 1JF. 1990.
3 The official MASCOT handbook, Computer Division, N Building, RSRE, 29 St. Andrews Rd., Gt. Malvern, Worcs.
Baron, N., Computer Languages, The Penguin Group, 27 Wrights Lane, London W8 5TZ. 1988.
Lipsshutz, S., Theory and problems of set theory and related topics. Schaum Publishing Co. New York. 1964.
Copi, I. M., Introduction to logic. The MacMillan Company, New York. Collier-MacMillan Ltd. London. 1972.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1991 Computational Mechanics Publications
About this chapter
Cite this chapter
Threadgold, R. (1991). Controlling Database Integrity. In: Rzevski, G., Adey, R.A. (eds) Applications of Artificial Intelligence in Engineering VI. Springer, Dordrecht. https://doi.org/10.1007/978-94-011-3648-8_15
Download citation
DOI: https://doi.org/10.1007/978-94-011-3648-8_15
Publisher Name: Springer, Dordrecht
Print ISBN: 978-1-85166-678-2
Online ISBN: 978-94-011-3648-8
eBook Packages: Springer Book Archive