Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Préserver l'intégrité d'une base de données déductive: une méthode et son implementation., and . BDA, page 9-20. INRIA, (1988)A Distributed Web Information Systems Platform Supporting High Responsiveness and Fault Tolerance., , , and . CAiSE Workshops (1), page 79-91. Faculty of Computer Science and Information Technology, Riga Technical University, Riga, Latvia, (2004)A Slick Procedure for Integrity Checking in Deductive Databases., and . ICLP, page 456-469. MIT Press, (1994)A General Procedure to Test Containment of Conjunctive Queries., , , and . INAP, page 1-10. The Prolog Association of Japan, (2001)Recovery Protocols for Replicated Databases - A Survey., , , and . AINA Workshops (1), page 220-227. IEEE Computer Society, (2007)Measure-Based Inconsistency-Tolerant Maintenance of Database Integrity.. SDKB, volume 7693 of Lecture Notes in Computer Science, page 149-173. Springer, (2011)A Middleware Architecture for Supporting Adaptable Replication of Enterprise Application Data., , , , and . TEAA, volume 3888 of Lecture Notes in Computer Science, page 29-43. Springer, (2005)How to Tackle Schema Validation by View Updating., , and . EDBT, volume 1057 of Lecture Notes in Computer Science, page 535-549. Springer, (1996)Maintaining Desirable Properties of Information by Inconsistency-Tolerant Integrity Management.. UNISCON, volume 137 of Lecture Notes in Business Information Processing, page 13-24. Springer, (2012)Non-linear Data Stream Compression: Foundations and Theoretical Results., and . HAIS (1), volume 7208 of Lecture Notes in Computer Science, page 622-634. Springer, (2012)