Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Better Safe than Sorry: Visualizing, Predicting, and Successfully Guiding Courses of Study., , , and . BTW, volume P-331 of LNI, page 665-671. Gesellschaft für Informatik e.V., (2023)How to Databasify a Blockchain: the Case of Hyperledger Fabric., , , and . CoRR, (2018)RUMA has it: Rewired User-space Memory Access is Possible!, , and . Proc. VLDB Endow., 9 (10): 768-779 (2016)AnyOLAP: Analytical Processing of Arbitrary Data-Intensive Applications without ETL., , , and . Proc. VLDB Endow., 14 (12): 2823-2826 (2021)Towards Adaptive Storage Views in Virtual Memory., and . CIDR, www.cidrdb.org, (2023)chainifyDB: How to get rid of your Blockchain and use your DBMS instead., , , and . CIDR, www.cidrdb.org, (2021)Accelerating Analytical Processing in MVCC using Fine-Granular High-Frequency Virtual Snapshotting., , and . SIGMOD Conference, page 245-258. ACM, (2018)Accelerating Analytical Processing in MVCC using Fine-Granular High-Frequency Virtual Snapshotting., , and . CoRR, (2017)ChainifyDB: How to Blockchainify any Data Management System., , , and . CoRR, (2019)Talking Blockchains: The Perspective of a Database Researcher.. ICDE Workshops, page 72-75. IEEE, (2021)