Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pathways Database System: An Integrated Set of Tools for Biological Pathways., , , , , , and . SAC, page 96-102. ACM, (2003)Statistical Estimators for Relational Algebra Expressions., , and . PODS, page 276-287. ACM, (1988)Automating the Organization of Presentations for Playout Management in Multimedia Databases., and . IW-MMDBMS, page 28-36. IEEE-CS Press, (1996)On content-driven search-keyword suggesters for literature digital libraries., and . JCDL, page 21-24. ACM, (2008)Advances in agile manufacturing., , , , , , , , , and . ICRA, page 1216-1222. IEEE, (1997)Anti-Tamper Databases: Querying Encrypted Databases., , and . DBSec, volume 142 of IFIP, page 133-146. Kluwer/Springer, (2003)Multivalued Dependency Inferences in Multilevel Relational Database Systems., and . DBSec, page 293-300. North-Holland, (1989)Progressive Evaluation of XML Queries for Online Aggregation and Progress Indicator., , , and . DEXA, volume 5690 of Lecture Notes in Computer Science, page 382-395. Springer, (2009)Modifying Datbase Queries and Error Constraints., and . DEXA, volume 720 of Lecture Notes in Computer Science, page 277-288. Springer, (1993)Auditing for secure statistical databases., and . ACM Annual Conference, page 53-59. ACM, (1981)