Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Range Sum Queries in Dynamic OLAP Data Cubes., , , and . CODAS, page 79-86. IEEE Computer Society, (2001)Variable Sized Partitions for Range Query Algorithms., , , , and . DEXA, volume 2453 of Lecture Notes in Computer Science, page 193-202. Springer, (2002)Verify Updating Trigger Correctness., and . DEXA, volume 1677 of Lecture Notes in Computer Science, page 382-391. Springer, (1999)Analysis of pre-computed partition top method for range top-k queries in OLAP data cubes., , , and . CIKM, page 60-67. ACM, (2002)Improving Integrity Constraint Checking for Stratified Deductive Databases., and . DEXA, volume 856 of Lecture Notes in Computer Science, page 591-600. Springer, (1994)Updatability in Federated Database Systems., , and . DEXA, volume 2113 of Lecture Notes in Computer Science, page 2-11. Springer, (2001)A Path Removing Technique for Detecting Trigger Termination., and . EDBT, volume 1377 of Lecture Notes in Computer Science, page 341-355. Springer, (1998)Unrolling Cycles to Decide Trigger Termination., and . VLDB, page 483-493. Morgan Kaufmann, (1999)Learning Fingerprints for a Database Intrusion Detection System., , and . ESORICS, volume 2502 of Lecture Notes in Computer Science, page 264-280. Springer, (2002)Designing Good Semi-Structured Databases and Conceptual Modeling., , , and . ER, volume 1728 of Lecture Notes in Computer Science, page 131-145. Springer, (1999)