Author of the publication

Permutation Based XML Compression.

, , and . WEBIST (Revised Selected Papers), volume 226 of Lecture Notes in Business Information Processing, page 63-78. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

C as a second language, and . Addison-Wesley series in computer science Addison-Wesley, Reading, Mass. u.a., Repr. with corr. edition, (1988)Computational Processes Generated by Programs with Recursive Procedures and Block Structures., and . MFCS, volume 45 of Lecture Notes in Computer Science, page 503-509. Springer, (1976)Annotated Trees and their Applications to XML Compression., , and . WEBIST (1), page 27-39. SciTePress, (2014)Parameterized Role-Based Access Control Policies for XML Documents., , and . Inf. Secur. J. A Glob. Perspect., 18 (6): 282-296 (2009)AETA: Algorithm Explanation Teaching Agent., , and . ITNG, page 616-621. IEEE Computer Society, (2007)On compilation of parallel programs.. FCT, page 295-300. Akademie-Verlag, Berlin, (1979)Complete Sequential Specification Allows for Concurrent Execution., and . ACM Conference on Computer Science, page 221-231. ACM, (1989)Globalizing Internet Websites., and . IMSA, page 53-58. IASTED/ACTA Press, (2005)Networked XML Compression by Encoding Pre-order Traversals., , and . WEBIST (Selected Papers), volume 189 of Lecture Notes in Business Information Processing, page 3-20. Springer, (2013)Analysis of Java Client/Server and Web Programming Tools for Development of Educational Systems.. WebNet, AACE, (1998)