Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A formal system for information retrieval from files., and . Commun. ACM, 13 (2): 67-73 (1970)Using the CER Hub to ensure data quality in a multi-institution smoking cessation study., , , , , , , , , and 4 other author(s). JAMIA, 21 (6): 1129-1135 (2014)A systematic approach for design-manufacturing feature mapping., , and . Geometric Modeling, volume B-8 of IFIP Transactions, page 205-221. North-Holland, (1992)An Opening Statement for the Session in Impact of New Technologies.. VLDB, page 70. IEEE Computer Society, (1978)Database Machine Architecture in the Context of Information Technology Evolution., and . VLDB, page 63-84. IEEE Computer Society, (1977)Michael E. Senko: 1931-1978.. ACM Trans. Database Syst., 4 (3): 261 (1979)Information Secure Systems., and . Advances in Computers, (1976)Database Security Course Module.. DBSec, page 269-301. North-Holland, (1987)An Object-Oriented Approach to Security Policies and their Access Controls for Database Management.. Future Databases, volume 3 of Advanced Database Research and Development Series, page 8-25. World Scientific, Singapore, (1992)The Impact of the Interconnecting Network on Parallel Database Computers.. IWDM, volume 43 of The Kluwer International Series in Engineering and Computer Science, page 216-224. Kluwer, (1987)