Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Linear Approximation of Shortest Superstrings, , , and . J. ACM, 41 (4): 630-647 (1994)Inference of Message Sequence Charts., , and . IEEE Trans. Software Eng., 29 (7): 623-633 (2003)Small Approximate Pareto Sets for Biobjective Shortest Paths and Other Problems., and . SIAM J. Comput., 39 (4): 1340-1371 (2009)Probability and Recursion., and . ISAAC, volume 3827 of Lecture Notes in Computer Science, page 2-4. Springer, (2005)Searching a fixed graph, , and . Automata, Languages and Programming: 23rd International Colloquium, ICALP'96 Paderborn, Germany, July 8--12, 1996 Proceedings 23, page 280--289. Springer, (1996)Node- and Edge-Deletion NP-Complete Problems. STOC, page 253-264. ACM, (1978)Deadlock-Freedom (and Safety) of Transactions in a Distributed Database., and . PODS, page 105-112. ACM, (1985)A Theory of Safe Locking Policies in Database Systems.. J. ACM, 29 (3): 718-740 (1982)Multiobjective Query Optimization., and . PODS, ACM, (2001)Issues of Correctness in Database Concurrency Control by Locking. STOC, page 363-367. ACM, (1981)