Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Variable Sized Partitions for Range Query Algorithms., , , , and . DEXA, volume 2453 of Lecture Notes in Computer Science, page 193-202. Springer, (2002)Range Sum Queries in Dynamic OLAP Data Cubes., , , and . CODAS, page 79-86. IEEE Computer Society, (2001)Verify Updating Trigger Correctness., and . DEXA, volume 1677 of Lecture Notes in Computer Science, page 382-391. Springer, (1999)Updatability in Federated Database Systems., , and . DEXA, volume 2113 of Lecture Notes in Computer Science, page 2-11. Springer, (2001)Improving Integrity Constraint Checking for Stratified Deductive Databases., and . DEXA, volume 856 of Lecture Notes in Computer Science, page 591-600. Springer, (1994)A Path Removing Technique for Detecting Trigger Termination., and . EDBT, volume 1377 of Lecture Notes in Computer Science, page 341-355. Springer, (1998)Analysis of pre-computed partition top method for range top-k queries in OLAP data cubes., , , and . CIKM, page 60-67. ACM, (2002)Unrolling Cycles to Decide Trigger Termination., and . VLDB, page 483-493. Morgan Kaufmann, (1999)Further Improvements on Integrity Constraint Checking for Stratifiable Deductive Databases., and . VLDB, page 495-505. Morgan Kaufmann, (1996)Learning Fingerprints for a Database Intrusion Detection System., , and . ESORICS, volume 2502 of Lecture Notes in Computer Science, page 264-280. Springer, (2002)