Author of the publication

Using Polytransactions to Manage Interdependent Data

, , and . Database Transaction Models for Advanced Applications, Morgan Kaufmann, (1992)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Context aware discovery in web data through anomaly detection., , and . Int. J. Web Eng. Technol., 10 (1): 3-30 (2015)Enforcing Data Dependencies in Cooperative Information Systems., and . ICICIS, page 332-341. IEEE Computer Society, (1993)Nested Transaction Models.. Encyclopedia of Database Systems (2nd ed.), Springer, (2018)On the Verification of Software Vulnerabilities During Static Code Analysis Using Data Mining Techniques - (Short Paper)., and . OTM Conferences (2), volume 10574 of Lecture Notes in Computer Science, page 99-106. Springer, (2017)SDN-GAN: Generative Adversarial Deep NNs for Synthesizing Cyber Attacks on Software Defined Networks., and . OTM Workshops, volume 11878 of Lecture Notes in Computer Science, page 211-220. Springer, (2019)Toward Zero-Day Attack Identification Using Linear Data Transformation Techniques., and . SERE, page 159-168. IEEE, (2013)Using Polytransactions to Manage Interdependent Data, , and . Database Transaction Models for Advanced Applications, Morgan Kaufmann, (1992)Personalization and visualization on handheld devices., , , , , , and . SAC, page 1008-1012. ACM, (2006)An Examination of Vote Verification Technologies: Findings and Experiences from the Maryland Study., , , , , , , , , and . EVT, USENIX Association, (2006)Analyzing False Positive Source Code Vulnerabilities Using Static Analysis Tools., and . IEEE BigData, page 4782-4788. IEEE, (2018)