Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Logics for Approximating Implication Problems of Saturated Conditional Independence., and . JELIA, volume 8761 of Lecture Notes in Computer Science, page 224-238. Springer, (2014)Efficient provenance storage for relational queries., , , , and . CIKM, page 1352-1361. ACM, (2012)Discovering Meaningful Certain Keys from Incomplete and Inconsistent Relations., , and . IEEE Data Eng. Bull., 39 (2): 21-37 (2016)Global Database Design based on Storage Space and Update Time Minimization.. J. Univers. Comput. Sci., 15 (1): 195-240 (2009)Providing Flexible Tradeoff for Provenance Tracking., , , , and . WISE Workshops, volume 6724 of Lecture Notes in Computer Science, page 226-240. Springer, (2010)Possible and certain keys for SQL., , , and . VLDB J., 25 (4): 571-596 (2016)Rebuilding the World from Views., and . WAIM, volume 6184 of Lecture Notes in Computer Science, page 2. Springer, (2010)Finding Faithful Boyce-Codd Normal Form Decompositions.. AAIM, volume 4041 of Lecture Notes in Computer Science, page 102-113. Springer, (2006)Possible and Certain SQL Key., , and . Proc. VLDB Endow., 8 (11): 1118-1129 (2015)Inclusion Dependencies Reloaded., and . CIKM, page 1361-1370. ACM, (2015)