Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Safe Web Queries., and . APWeb, volume 3007 of Lecture Notes in Computer Science, page 677-686. Springer, (2004)Safe Database Queries with External Functions., and . IDEAS, page 260-269. IEEE Computer Society, (1999)Algebraic Equivalences Among Nested Relational Expressions., and . CIKM, page 234-243. ACM, (1994)Expressive Power of Query Languages for Constraint Complex Value Databases.. DASFAA (2), volume 6588 of Lecture Notes in Computer Science, page 195-209. Springer, (2011)A Logic-Based Approach to Mining Inductive Databases., , , and . International Conference on Computational Science (1), volume 4487 of Lecture Notes in Computer Science, page 270-277. Springer, (2007)Technical Correspondence: "Differential Dependencies: Reasoning and Discovery" Revisited., , , and . ACM Trans. Database Syst., 40 (2): 14:1-14:18 (2015)On Translation of Complex Value Calculus Queries with Arithmatic Operators., , and . CODAS, page 492-495. World Scientific, (1996)Building Fair Predictive Models., , , , , , and . Australasian Conference on Artificial Intelligence, volume 12576 of Lecture Notes in Computer Science, page 216-229. Springer, (2020)Multiple Path Join for Nested Relational Databases., and . Australasian Database Conference, page 30-44. Global Publications Service, Singapore; Distributed by World Scientific, (1994)Safety, domain independence and translation of complex value database queries., , and . Inf. Sci., 178 (12): 2507-2533 (2008)