From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Investigation into Methods and Concepts of Qualitative Research in Information System Research., , , , и . Computer and Information Science, 2 (4): 47-54 (2009)High Availability with Diagonal Replication in 2D Mesh (DR2M) Protocol for Grid Environment., , , , и . Computer and Information Science, 1 (2): 95-105 (2008)Analytical Studies and Experimental Examines for Flooding-Based Search Algorithms., , , и . ICICA (LNCS), том 7473 из Lecture Notes in Computer Science, стр. 299-306. Springer, (2012)Transaction Management in Mobile Databases., , , и . Database Technologies: Concepts, Methodologies, Tools, and Applications, IGI Global, (2009)Challenges in Matching Heterogeneous Relational Databases' Schemas., , , и . IKE, стр. 163-169. CSREA Press, (2010)Extracting Information from Semi-Structured Web Pages by Considering User's Context., , , , и . IKE, стр. 134-139. CSREA Press, (2010)A framework for caching relevant data items for checking integrity constraints of mobile database., , , и . ICDIM, стр. 476-482. IEEE, (2008)Security privacy access control for policy integration and conflict reconciliation in health care organizations collaborations., и . iiWAS, стр. 750-754. ACM, (2009)Data caching strategies for checking integrity constraints of mobile database., , и . iiWAS, стр. 186-192. ACM, (2008)Maintaining the Integrity Constraints of Mobile Databases with Event-Condition-Action (ECA) Rules.. MoMM, том 230 из books@ocg.at, стр. 87-96. Austrian Computer Society, (2007)