Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

C as a second language, and . Addison-Wesley series in computer science Addison-Wesley, Reading, Mass. u.a., Repr. with corr. edition, (1988)Annotated Trees and their Applications to XML Compression., , and . WEBIST (1), page 27-39. SciTePress, (2014)Computational Processes Generated by Programs with Recursive Procedures and Block Structures., and . MFCS, volume 45 of Lecture Notes in Computer Science, page 503-509. Springer, (1976)Parameterized Role-Based Access Control Policies for XML Documents., , and . Inf. Secur. J. A Glob. Perspect., 18 (6): 282-296 (2009)AETA: Algorithm Explanation Teaching Agent., , and . ITNG, page 616-621. IEEE Computer Society, (2007)Globalizing Internet Websites., and . IMSA, page 53-58. IASTED/ACTA Press, (2005)On compilation of parallel programs.. FCT, page 295-300. Akademie-Verlag, Berlin, (1979)Complete Sequential Specification Allows for Concurrent Execution., and . ACM Conference on Computer Science, page 221-231. ACM, (1989)Networked XML Compression by Encoding Pre-order Traversals., , and . WEBIST (Selected Papers), volume 189 of Lecture Notes in Business Information Processing, page 3-20. Springer, (2013)Permutation Based XML Compression., , and . WEBIST (Revised Selected Papers), volume 226 of Lecture Notes in Business Information Processing, page 63-78. Springer, (2014)