Author of the publication

Cost Analysis of Selected Database Restoration Techniques.

, and . ER, page 783-805. North-Holland, (1983)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Extended Entity-Relationship (E²R) Database Specification and its Automatic Verification and Transformation into the Logical Relational Design., and . ER, page 533-549. North-Holland, (1987)Opportunistic Networks: Challenges in Specializing the P2P Paradigm., , and . DEXA Workshops, page 722-726. IEEE Computer Society, (2006)Feature analysis of selected database recovery techniques., and . AFIPS National Computer Conference, volume 50 of AFIPS Conference Proceedings, page 543-554. AFIPS Press, (1981)Vulnerabilities and Threats in Distributed Systems., and . ICDCIT, volume 3347 of Lecture Notes in Computer Science, page 146-157. Springer, (2004)A Taxonomy of Specialized Ad Hoc Networks and Systems for Emergency Applications.. MobiQuitous, page 1-8. IEEE Computer Society, (2007)Autonomous Transaction Processing Using Data Dependency in Mobile Environments., , , and . FTDCS, page 138-144. IEEE Computer Society, (2003)An Approach to Identity Management in Clouds without Trusted Third Parties., and . CoRR, (2019)Cost Analysis of Selected Database Restoration Techniques., and . ER, page 783-805. North-Holland, (1983)On optimal scheduling of integrity assertions in a transaction processing system., and . Int. J. Parallel Program., 10 (5): 315-330 (1981)Design issues and an architecture for a heterogenous multidatabase system., , and . ACM Conference on Computer Science, page 74-79. ACM, (1987)