Author of the publication

Deriving Integrity Maintaining Triggers from Transition Graphs.

, and . ICDE, page 22-29. IEEE Computer Society, (1993)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A diagnostic approach to repairing constraint violations in databases, , and . Proceedings of the Sixth International Workshop on Principles of Diagnosis (DX`95), page 65-72. Goslar, Germany, (1995)Terms in Time and Times in Context: A Graph-based Term-Time Ranking Model, , , and . Proceedings of the 24th International Conference on World Wide Web, page 1375--1380. New York, NY, USA, ACM, (2015)CODY: A graph-based framework for the analysis of COnversation DYnamics in online social networks., , and . CoRR, (2023)Topical Change Detection in Documents via Embeddings of Long Sequences., , , and . CoRR, (2020)Exploring Entity-centric Networks in Entangled News Streams., and . WWW (Companion Volume), page 555-563. ACM, (2018)"Temporal" Integrity Constraints in Temporal Databases, and . Temporal Databases, page 77-92. Springer, (1995)Flexible authentication of XML documents., , , , , and . CCS, page 136-145. ACM, (2001)Modeling and Querying Vague Spatial Objects Using Shapelets., , and . VLDB, page 567-578. ACM, (2007)Modeling satellite image streams for change analysis., and . GIS, page 7. ACM, (2007)Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs., , , , and . DIMVA, volume 4064 of Lecture Notes in Computer Science, page 1-16. Springer, (2006)