Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Concurrent Prefix Recovery: Performing CPR on a Database., , and . SIGMOD Rec., 49 (1): 16-23 (2020)A virtual machine for sensor networks., , and . EuroSys, page 145-158. ACM, (2007)Randomly Partitioned Encryption for Cloud Databases., , , and . DBSec, volume 8566 of Lecture Notes in Computer Science, page 307-323. Springer, (2014)Integrating keyword search into XML query processing., , and . Comput. Networks, 33 (1-6): 119-135 (2000)Engineering Security and Performance with Cipherbase., , , , , , , , and . IEEE Data Eng. Bull., 35 (4): 65-72 (2012)Reducing the Braking Distance of an SQL Query Engine., and . VLDB, page 158-169. Morgan Kaufmann, (1998)Extending XQuery with Window Functions., , , , , and . VLDB, page 75-86. ACM, (2007)Shared Workload Optimization., , , and . Proc. VLDB Endow., 7 (6): 429-440 (2014)Predictable Performance for Unpredictable Workloads., , , , and . Proc. VLDB Endow., 2 (1): 706-717 (2009)Indexing and Selecting Hierarchical Business Logic., , , , and . Proc. VLDB Endow., 8 (12): 1656-1667 (2015)