Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Integrated Approach to Database Design., , and . Data Base Design Techniques I, volume 132 of Lecture Notes in Computer Science, page 1-30. Springer, (1978)Bridging the Gap between Response Time and Energy-Efficiency in Broadcast Schedule Design., , , and . EDBT, volume 2287 of Lecture Notes in Computer Science, page 572-589. Springer, (2002)Modeling Physical Systems by Complex Structural Objects and Complex Functional Objects., and . EDBT, volume 416 of Lecture Notes in Computer Science, page 238-252. Springer, (1990)Design Considerations for Mobile Client-Server Database Applications., and . Infrastructure for Mobile and Wireless Systems, volume 2538 of Lecture Notes in Computer Science, page 78-89. Springer, (2001)Crowd-Sourced Data Collection for Urban Monitoring via Mobile Sensors., , , and . ACM Trans. Internet Techn., 18 (1): 5:1-5:21 (2017)Database Technology and Standards: Are we Getting Anywhere? (Panel Abstract)., and . ICDE, page 230. IEEE Computer Society, (1993)Integrating natural language, query processing, and semantic data models., and . Compcon, page 538-543. IEEE Computer Society, (1990)Fundamentals of Database Systems, and . Addison-Wesley, second edition edition, (1994)Look in the distributed database chapter.A Temporal Relational Model and a Query Language., and . Inf. Sci., 49 (1-3): 147-175 (1989)Data Confidentiality in E-Government and E-Commerce., , , and . Security and Management, page 391-394. CSREA Press, (2004)