Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving stream correlation attacks on anonymous networks., and . SAC, page 2024-2028. ACM, (2009)Correctness and Parallelism of Composite Systems., , , and . PODS, page 197-208. ACM Press, (1997)Ontology-Based MEDLINE Document Classification., , and . BIRD, volume 4414 of Lecture Notes in Computer Science, page 439-452. Springer, (2007)Information, Communication, and Money: For What Can We Charge and How Can We Meter It?, , and . VLDB, page 697. Morgan Kaufmann, (1998)Detecting Semantic Violations in Generalised Classification Structures., , , and . ICICIS, page 300-308. IEEE Computer Society, (1993)Type Inference and Type Classes.. Functional Programming, page 254-265. Springer, (1989)Sunrise: A real-time event-processing system., , , and . Bell Labs Tech. J., 3 (1): 3-18 (1998)How to Make ad-hoc Polymorphism Less ad-hoc., and . POPL, page 60-76. ACM Press, (1989)Accessing Geographical Metafiles through a Database Storage System., and . SSD, volume 951 of Lecture Notes in Computer Science, page 117-131. Springer, (1995)Experiments in Terabyte Searching, Genomic Retrieval and Novelty Detection for TREC 2004., , , , , , , , , and 2 other author(s). TREC, volume 500-261 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2004)