Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance of a virtual machine monitor., , , and . Virtuelle Maschinen, volume 18 of Informatik-Fachberichte, page 143-158. Springer, (1979)Information Security: Using a Novel Event-Based Approach., , , and . IKE, page 33-38. CSREA Press, (2004)A data base machine design and evaluation facility., and . COMPSAC, page 716-721. IEEE, (1978)Smart optoelectronic architecture for data/knowledge-base applications., , , , , and . ICECS, page 566-569. IEEE, (1996)Monitoring Entities in an Uncertain World: Entity Resolution and Referential Integrity., , , , , , , and . IAAI, page 1681-1688. AAAI, (2011)A Distributed Query Processing Strategy Using Decomposition, Pipelining and Intermediate Result Sharing Techniques., , , and . ICDE, page 94-102. IEEE Computer Society, (1986)Research Issues in Active Conceptual Modeling of Learning: Summary of Panel Discussions in Two Workshops (May 2006) and (November 2006)., , , , , and . Active Conceptual Modeling of Learning, volume 4512 of Lecture Notes in Computer Science, page 217-225. Springer, (2006)A Layered Optimizer for Mining Association Rules Over Relational Database Management Systems., , , and . IKE, page 422-430. CSREA Press, (2003)How To Search for Complex Patterns Over Streaming and Stored Data., , , , and . IC-AI, page 17-22. CSREA Press, (2006)Evaluation of Alternative Data Base Machine Designs., , , and . Computer Architecture for Non-Numeric Processing, 10, page 29-38. ACM, (1980)