Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Example of Knowledge-Based Query Processing in a CAD/CAM DBMS., , and . VLDB, page 363-370. Morgan Kaufmann, (1984)Fit for Purpose: Toward an Engineering Basis for Data Exchange Standards., , , and . IWEI, volume 144 of Lecture Notes in Business Information Processing, page 91-103. Springer, (2013)The Role of Schema Matching in Large Enterprises, , , , , , , and . CoRR, (2009)Towards Greater Expressiveness, Flexibility, and Uniformity in Access Control., , , and . SACMAT, page 217-219. ACM, (2018)Outerjoin Simplification and Reordering for Query Optimization., and . ACM Trans. Database Syst., 22 (1): 43-73 (1997)Fit for purpose: engineering principles for selecting an appropriate type of data exchange standard., , , , and . Inf. Syst. E Bus. Manag., 12 (4): 495-515 (2014)The Database Design and Evaluation Workbench (DDEW) Project at CCA., , , , , , and . IEEE Database Eng. Bull., 7 (4): 10-15 (1984)Surrogate Parenthood: Protected and Informative Graphs., , , , and . Proc. VLDB Endow., 4 (8): 518-527 (2011)A Database Designer's Workbench., , , , , , and . ER, page 347-360. North-Holland, (1986)Abstracting and Refining Authorization in SQL., and . Secure Data Management, volume 3178 of Lecture Notes in Computer Science, page 148-162. Springer, (2004)