Author of the publication

Modelling of Centralized Concurrency Control in a Multi-System Environment.

, , , , and . SIGMETRICS, page 183-191. ACM, (1985)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model., , and . DBSec, volume 142 of IFIP, page 61-74. Kluwer/Springer, (2003)Encrypted Database Integrity in Database Service Provider Model., , and . Certification and Security in E-Services, volume 255 of IFIP Conference Proceedings, page 165-174. Kluwer, (2002)Performability comparison of configurable duplex systems., , and . Comput. Syst. Sci. Eng., 3 (4): 201-215 (1988)Optimal Buffer Partitioning for the Nested Block Join Algorithm., , , and . ICDE, page 510-519. IEEE Computer Society, (1991)Efficient Execution of Aggregation Queries over Encrypted Relational Databases., , and . DASFAA, volume 2973 of Lecture Notes in Computer Science, page 125-136. Springer, (2004)Data Warehousing and Why it is the In-Thing.. COMAD, Tata McGraw-Hill, (1995)Analysis of Affinity Based Routing in Multi-System Data Sharing., , , and . Perform. Evaluation, 7 (2): 87-109 (1987)Modelling of Centralized Concurrency Control in a Multi-System Environment., , , , and . SIGMETRICS, page 183-191. ACM, (1985)Hardware Assisted Sorting in IBM's DB2 DBMS.. COMAD (b), Computer Society of India, (2005)Automated Storage Management with QoS Guarantees., , , and . ICDE, page 150. IEEE Computer Society, (2006)