Author of the publication

Specification and Design of Transactions in Information Systems: A Formal Approach.

, , and . IEEE Trans. Software Eng., 17 (8): 814-829 (1991)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Agent-Based Architecture For Georeferenced Digital Library Interoperability., , , and . Intell. Autom. Soft Comput., 6 (3): 225-231 (2000)A metadatabase-enabled executive information system (Part B): Methods for dynamic multidimensional data analysis., and . Decis. Support Syst., 42 (3): 1599-1612 (2006)A Context-Dependent XML Compression Approach to Enable Business Applications on Mobile Devices., , and . Euro-Par, volume 4641 of Lecture Notes in Computer Science, page 911-920. Springer, (2007)A Communication Framework Towards Flexible Associations of Businesses in Evolving Environments., , and . I3E, volume 139 of IFIP, page 175-186. Kluwer/Springer, (2003)SecAdvise: A Security Mechanism Advisor., , and . DCW, volume 2468 of Lecture Notes in Computer Science, page 35-41. Springer, (2002)Intensional High Performance Computing., , , and . DCW, volume 1830 of Lecture Notes in Computer Science, page 161-170. Springer, (2000)A metadatabase-enabled executive information system (Part A): A flexible and adaptable architecture., and . Decis. Support Syst., 42 (3): 1589-1598 (2006)Business Simulation Training in Information Technology Education: Guidelines for New Approaches in IT Training., , , , , and . J. Inf. Technol. Educ. Res., (2011)Identifying Good Connections in an Unstructured Peer-to-Peer Network: The Case of Gnutella., , and . IICS, volume P-186 of LNI, page 48-59. GI, (2011)A Structured Peer-to-Peer System with Integrated Index and Storage Load Balancing., , and . IICS, volume 3908 of Lecture Notes in Computer Science, page 41-52. Springer, (2005)