Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Buffer Partitioning for the Nested Block Join Algorithm., , , and . ICDE, page 510-519. IEEE Computer Society, (1991)Analysis of Affinity Based Routing in Multi-System Data Sharing., , , and . Perform. Evaluation, 7 (2): 87-109 (1987)Encrypted Database Integrity in Database Service Provider Model., , and . Certification and Security in E-Services, volume 255 of IFIP Conference Proceedings, page 165-174. Kluwer, (2002)Efficient Execution of Aggregation Queries over Encrypted Relational Databases., , and . DASFAA, volume 2973 of Lecture Notes in Computer Science, page 125-136. Springer, (2004)Data Warehousing and Why it is the In-Thing.. COMAD, Tata McGraw-Hill, (1995)Performability comparison of configurable duplex systems., , and . Comput. Syst. Sci. Eng., 3 (4): 201-215 (1988)Modelling of Centralized Concurrency Control in a Multi-System Environment., , , , and . SIGMETRICS, page 183-191. ACM, (1985)Hardware Assisted Sorting in IBM's DB2 DBMS.. COMAD (b), Computer Society of India, (2005)Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model., , and . DBSec, volume 142 of IFIP, page 61-74. Kluwer/Springer, (2003)Automated Storage Management with QoS Guarantees., , , and . ICDE, page 150. IEEE Computer Society, (2006)