Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Diagnosing Estimation Errors in Page Counts Using Execution Feedback., , and . ICDE, page 1013-1022. IEEE Computer Society, (2008)Estimating Progress of Long Running SQL Queries., , and . SIGMOD Conference, page 803-814. ACM, (2004)Engineering Security and Performance with Cipherbase., , , , , , , , and . IEEE Data Eng. Bull., 35 (4): 65-72 (2012)The Niagara Internet Query System., , , , , , , , , and 10 other author(s). IEEE Data Eng. Bull., 24 (2): 27-33 (2001)Stop-and-Restart Style Execution for Long Running Decision Support Queries., , , and . VLDB, page 735-745. ACM, (2007)A pay-as-you-go framework for query execution feedback., , and . PVLDB, 1 (1): 1141-1152 (2008)Whodunit: An Auditing Tool for Detecting Data Breaches., and . PVLDB, 4 (12): 1410-1413 (2011)SELECT triggers for data auditing., , and . ICDE, page 1141-1152. IEEE Computer Society, (2013)Redundancy and information leakage in fine-grained access control., , and . SIGMOD Conference, page 133-144. ACM, (2006)Database Access Control and Privacy: Is there a common ground?, , and . CIDR, page 96-103. www.cidrdb.org, (2011)