Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Explainable security for relational databases., , and . SIGMOD Conference, page 1411-1422. ACM, (2014)Characterization of the Interaction of XML Functional Dependencies with DTDs., and . ICDT, volume 4353 of Lecture Notes in Computer Science, page 119-133. Springer, (2007)Beyond isolation: research opportunities in declarative data-driven coordination., , , , and . SIGMOD Record, 39 (1): 27-32 (2010)Cooperative Update Exchange in the Youtopia System., and . Proc. VLDB Endow., 2 (1): 193-204 (2009)Kleene Algebra and Bytecode Verification., and . Electron. Notes Theor. Comput. Sci., 141 (1): 221-236 (2005)Out of Sight, Out of Place: Detecting and Assessing Swapped Arguments., , , and . SCAM, page 227-237. IEEE, (2020)Coordination through querying in the youtopia system., , , , , and . SIGMOD Conference, page 1331-1334. ACM, (2011)Entangled queries: enabling declarative data-driven coordination., , , , , and . SIGMOD Conference, page 673-684. ACM, (2011)Fine-grained disclosure control for app ecosystems., , , and . SIGMOD Conference, page 869-880. ACM, (2013)The Homeostasis Protocol: Avoiding Transaction Coordination Through Program Analysis., , , , , , , and . SIGMOD Conference, page 1311-1326. ACM, (2015)