From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Trigger Inheritance and Overriding in an Active Object Database System., , и . IEEE Trans. Knowl. Data Eng., 12 (4): 588-608 (2000)Performance Evaluation of Two-Phase Locking Algorithms in a System for Distributed Databases., , и . Symposium on Reliability in Distributed Software and Database Systems, стр. 57-69. IEEE Computer Society, (1983)Content-based filtering of Web documents: the MaX system and the EUFORBIA project., , и . Int. J. Inf. Sec., 2 (1): 45-58 (2003)Intelligent Database Systems, , и . Addison-Wesley, (2001)On the Number of Descendants in an Object DAG., и . Inf. Process. Lett., 58 (5): 211-216 (1996)Towards structure discovering in video data., , и . J. Exp. Theor. Artif. Intell., 17 (1-2): 5-18 (2005)Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case., , и . DBSec, том A-47 из IFIP Transactions, стр. 135-158. North-Holland, (1993)Access Control in Dynamic XML-Based Web-Services with X-RBAC., , , и . ICWS, стр. 243-249. CSREA Press, (2003)Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control., , , и . VLDB, стр. 472-483. Morgan Kaufmann, (1996)A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems., , и . ACM Workshop on Role-Based Access Control, стр. 1-12. ACM, (1997)