From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Two Can Keep A Secret: A Distributed Architecture for Secure Database Services., , , , , , , , и . CIDR, стр. 186-199. (2005)Scheduling Real-Time Transactions with Disk Resident Data., и . VLDB, стр. 385-396. Morgan Kaufmann, (1989)Contrasting Controlled Vocabulary and Tagging: Do Experts Choose the Right Names to Label the Wrong Things?, и . Second ACM International Conference on Web Search and Data Mining (WSDM 2009), Late Breaking Results Session, стр. 1--4. Stanford InfoLab, (февраля 2009)Data caching issues in an information retrieval system, , и . ACM Trans. Database Syst., 15 (3): 359--384 (1990)Web Spam Taxonomy, и . AIRWeb, стр. 39-47. (2005)Evaluating Response Time in a Faulty Distributed Computing System., и . IEEE Trans. Computers, 34 (2): 101-109 (1985)The Asilomar Report on Database Research, , , , , , , , , и 6 other автор(ы). SIGMOD Record, 27 (4): 74--80 (декабря 1998)The Vulnerability of Voting Mechanisms., и . Symposium on Reliability in Distributed Software and Database Systems, стр. 45-53. IEEE Computer Society, (1984)Extracting structured data from Web pages, , и . ACM SIGMOD international conference on Management of data, (2003)Multicasting a Web Repository., и . WebDB, стр. 25-30. (2001)