Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simplifying schema mappings., , , and . ICDT, page 114-125. ACM, (2011)The Complexity of Set Constraints., , , and . CSL, volume 832 of Lecture Notes in Computer Science, page 1-17. Springer, (1993)An Automata-Theoretic Approach to Protocol Verification (Abstract).. Concurrency, volume 335 of Lecture Notes in Computer Science, page 73. Springer, (1988)Node Selection Query Languages for Trees., , , and . CoRR, (2015)Divination by program committee.. Commun. ACM, 60 (9): 7 (2017)Is information technology destroying the middle class?. Commun. ACM, 58 (2): 5 (2015)Science has only two legs.. Commun. ACM, 53 (9): 5 (2010)Why doesn't ACM have a SIG for theoretical computer science?. Commun. ACM, 58 (8): 5 (2015)Hypercriticality.. Commun. ACM, 53 (7): 5 (2010)On P, NP, and computational complexity.. Commun. ACM, 53 (11): 5 (2010)