Author of the publication

Recovery Guarantees for General Multi-Tier Applications.

, , and . ICDE, page 543-554. IEEE Computer Society, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predictive Analytics with Microsoft Azure Machine Learning - Build and Deploy Actionalbe Solutions in Minutes, Second Edition., , and . Apress, (2015)Emerging Trends and Converging Technologies in Data Intensive Scalable Computing.. SSDBM, volume 6187 of Lecture Notes in Computer Science, page 4-5. Springer, (2010)Building Reliable Data Pipelines for Managing Community Data Using Scientific Workflows., , , , and . eScience, page 321-328. IEEE Computer Society, (2009)Phoenix: Making Applications Robust., and . SIGMOD Conference, page 562-564. ACM Press, (1999)SIGMOD Record 28(2), June 1999.Consistent Streaming Through Time: A Vision for Event Stream Processing, , , and . CoRR, (2006)Event Correlation and Pattern Detection in CEDR., and . EDBT Workshops, volume 4254 of Lecture Notes in Computer Science, page 919-930. Springer, (2006)Provenance for Scientific Workflows Towards Reproducible Research., , , , , and . IEEE Data Eng. Bull., 33 (3): 50-58 (2010)Flexible Coordination of E-Services., and . TES, volume 3324 of Lecture Notes in Computer Science, page 69-79. Springer, (2004)Cloud technologies for bioinformatics applications., , , , , , and . SC-MTAGS, ACM, (2009)Special Issue: The First Provenance Challenge, , , , , , , , , and 40 other author(s). Concurrency and Computation: Practice & Experience, Special Issue on The First Provenance Challenge, 20 (5): 409-418 (April 2008)CORE A.