Author of the publication

A DBMS Prototype to Support Extended NF2 Relations: An Integrated View on Flat Tables and Hierarchies.

, , , , , , , , and . SIGMOD Conference, page 356-367. ACM Press, (1986)SIGMOD Record 15(2), June 1986.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ein effizientes Verfahren zur Fehlererkennung in sortierten Feldern und Listen.. Software-Fehlertoleranz und -Zuverlässigkeit, volume 83 of Informatik-Fachberichte, page 51-62. Springer, (1984)Modelle für die Leistunsanalyse von Hashtabellen mit "Separate Chaining".. Angew. Inform., 24 (9): 456-462 (1982)On the Use of Extendible Hashing Without Hashing., and . Inf. Process. Lett., 19 (1): 21-26 (1984)Quantitative Bewertung fehlertoleranter Hashtabellen-Implementierungen in Datenbanksystemen durch Simulationsreihen.. Simulationstechnik, volume 109 of Informatik-Fachberichte, page 147-151. Springer, (1985)Trends in Distributed and Cooperative Database Management., and . IBM Symposium: Database Systems of the 90s, volume 466 of Lecture Notes in Computer Science, page 263-293. Springer, (1990)A Lock Technique for Disjoint and Non-Disjoint Complex Objects., , , , and . EDBT, volume 416 of Lecture Notes in Computer Science, page 219-237. Springer, (1990)A DBMS Prototype to Support Extended NF2 Relations: An Integrated View on Flat Tables and Hierarchies., , , , , , , , and . SIGMOD Conference, page 356-367. ACM Press, (1986)SIGMOD Record 15(2), June 1986.Quantitative Bewertung fehlertoleranter B*-Baum-Implementierungen in Datenbanksystemen durch Simulationsreihen.. MMB, volume 110 of Informatik-Fachberichte, page 202-216. Springer, (1985)Sperren disjunkter, nicht-rekursiver komplexer Objekte mittels objekt- und anfragespezifischer Sperrgraphen., , , and . BTW, volume 204 of Informatik-Fachberichte, page 98-113. Springer, (1989)Duplicate Detection and Deletion in the Extended NF² Data Model., , and . FODO, volume 367 of Lecture Notes in Computer Science, page 83-100. Springer, (1989)