Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

O-O, What's Happening to DB2?, , , , , , , and . SIGMOD Conference, page 511-512. ACM Press, (1999)SIGMOD Record 28(2), June 1999.Counting Ordered Trees by Permuting Their Parts.. The American Mathematical Monthly, 113 (4): 329-335 (2006)An Abstract Object-Oriented Query Execution Language.. DBPL, page 176-199. Springer, (1993)Exploiting Upper and Lower Bounds In Top-Down Query Optimization., , , , , , , , , and . IDEAS, page 20-33. IEEE Computer Society, (2001)Dartmouth Internet Security Testbed (DIST): Building a Campus-wide Wireless Testbed., , , , , , and . CSET, USENIX Association, (2009)Rapid Bushy Join-order Optimization with Cartesian Products., and . SIGMOD Conference, page 35-46. ACM Press, (1996)A Call to Order., and . PODS, page 1-16. ACM Press, (1993)Object View Hierarchies in DB2 UDB., , and . EDBT, volume 1777 of Lecture Notes in Computer Science, page 478-492. Springer, (2000)O-O, What Have They Done to DB2?, , , , , , , and . VLDB, page 542-553. Morgan Kaufmann, (1999)Map: a scalable monitoring system for dependable 802.11 wireless networks., , , , , , , , , and 1 other author(s). IEEE Wirel. Commun., 15 (5): 10-18 (2008)