Author of the publication

Adding a Performance-Oriented Perspective to Data Warehouse Design.

, and . DaWaK, volume 2454 of Lecture Notes in Computer Science, page 232-244. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Online detection of malicious data access using DBMS auditing., , and . SAC, page 1013-1020. ACM, (2008)Emulation of Software Faults: A Field Data Study and a Practical Approach., and . IEEE Trans. Software Eng., 32 (11): 849-867 (2006)From Performance to Dependability Benchmarking: A Mandatory Path., and . TPCTC, volume 5895 of Lecture Notes in Computer Science, page 67-83. Springer, (2009)Predicting Timing Failures in Web Services., , and . DASFAA Workshops, volume 5667 of Lecture Notes in Computer Science, page 182-196. Springer, (2009)Approximate Query Answering Using Data Warehouse Striping., , and . DaWaK, volume 2114 of Lecture Notes in Computer Science, page 349-360. Springer, (2001)Adding a Performance-Oriented Perspective to Data Warehouse Design., and . DaWaK, volume 2454 of Lecture Notes in Computer Science, page 232-244. Springer, (2002)The most frequent programming mistakes that cause software vulnerabilities., , , and . CoRR, (2019)A Data Mining Approach to Identify Key Factors in Dependability Experiments., , , , and . EDCC, volume 3463 of Lecture Notes in Computer Science, page 263-280. Springer, (2005)A Fault-Tolerant Mechanism for Simple Controllers., , , and . EDCC, volume 852 of Lecture Notes in Computer Science, page 39-55. Springer, (1994)Benchmarking Software Requirements Documentation for Space Application., , , , , and . SAFECOMP, volume 6351 of Lecture Notes in Computer Science, page 112-125. Springer, (2010)