Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using persistence technology to control schema evolution., , , and . SAC, page 441-446. ACM, (1994)Persistence and Type Abstraction Revisited., , , and . POS, page 141-153. Morgan Kaufmann, (1990)Subtyping and Assignment in Database Programming Languages., , and . DBPL, page 363-382. Morgan Kaufmann, (1991)Protection in Persistent Object Systems., , , , , , , and . Security and Persistence, page 48-66. Springer, (1990)Exploiting Persistent Linkage in Software Engineering Environments., , , , and . Comput. J., 38 (1): 1-16 (1995)An Approach to High-Level Language Bindings to XML., , , , and . Inf. Softw. Technol., 44 (4): 217-228 (2002)Using continued fractions for efficient subclass checking., , , , , , and . OOPS Messenger, 6 (2): 1-11 (1995)START: A Linguistic Reflection Tool Using Hyper-Program Technology., , and . POS, page 355-373. Springer and British Computer Society, (1994)Keynote Discussion Session on Persistent Type Systems., , , and . POS, page 216-221. Springer, (1992)The Joy of Sets., , , , , and . DBPL, page 417-433. Springer, (1993)