|
Search the dblp DataBase
Wiebren de Jonge:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Reind P. van de Riet, Anthony I. Wasserman, Martin L. Kersten, Wiebren de Jonge
High-Level Programming Features for Improving the Efficiency of a Relational Database System. [Citation Graph (7, 12)][DBLP] ACM Trans. Database Syst., 1981, v:6, n:3, pp:464-485 [Journal]
- George L. Sicherman, Wiebren de Jonge, Reind P. van de Riet
Answering Queries Without Revealing Secrets. [Citation Graph (6, 5)][DBLP] ACM Trans. Database Syst., 1983, v:8, n:1, pp:41-59 [Journal]
- Roel Wieringa, Wiebren de Jonge, Paul Spruit
Roles and Dynamic Subclasses: A Modal Logic Approach. [Citation Graph (3, 0)][DBLP] ECOOP, 1994, pp:32-59 [Conf]
- Wiebren de Jonge, Andrew S. Tanenbaum, Reind P. van de Riet
Two Access Methods Using Compact Binary Trees. [Citation Graph (3, 0)][DBLP] IEEE Trans. Software Eng., 1987, v:13, n:7, pp:799-810 [Journal]
- Roel Wieringa, Wiebren de Jonge, Paul Spruit
Using Dynamic Classes and Role Classes to Model Object Migration. [Citation Graph (2, 0)][DBLP] TAPOS, 1995, v:1, n:1, pp:61-83 [Journal]
- Wiebren de Jonge
Compromising Statistical Databases Responding to Queries about Means. [Citation Graph (2, 8)][DBLP] ACM Trans. Database Syst., 1983, v:8, n:1, pp:60-80 [Journal]
- Wiebren de Jonge, Ardie Schijf
Concurrent Access to B-Trees. [Citation Graph (1, 0)][DBLP] PARBASE, 1990, pp:312-320 [Conf]
- Wiebren de Jonge, David Chaum
Attacks on Some RSA Signatures. [Citation Graph (0, 0)][DBLP] CRYPTO, 1985, pp:18-27 [Conf]
- Wiebren de Jonge, David Chaum
Some Variations on RSA Signatures and Their Security. [Citation Graph (0, 0)][DBLP] CRYPTO, 1986, pp:49-59 [Conf]
- Martin L. Kersten, Reind P. van de Riet, Wiebren de Jonge
Privacy and Security in Distributed Database Systems. [Citation Graph (0, 0)][DBLP] DDSS, 1981, pp:229-241 [Conf]
- Robert Grimm, Wilson C. Hsieh, Wiebren de Jonge, M. Frans Kaashoek
Atomic Recovery Units: Failure Atomicity for Logical Disks. [Citation Graph (0, 0)][DBLP] ICDCS, 1996, pp:26-37 [Conf]
- Wiebren de Jonge, Ardie Schijf
Concurrent Access to B-Trees. [Citation Graph (0, 0)][DBLP] PARBASE / Databases, 1990, pp:37-54 [Conf]
- Wiebren de Jonge, M. Frans Kaashoek, Wilson C. Hsieh
The Logical Disk: A New Approach to Improving File Systems. [Citation Graph (0, 0)][DBLP] SOSP, 1993, pp:15-28 [Conf]
- Wiebren de Jonge, Peter Scheuermann, Ardie Schijf
Encoding and Manipulating Pictorial Data with S+-trees. [Citation Graph (0, 0)][DBLP] SSD, 1991, pp:401-419 [Conf]
- Reind P. van de Riet, Martin L. Kersten, Wiebren de Jonge, Anthony I. Wasserman
Privacy and security in information systems using programming language features. [Citation Graph (0, 0)][DBLP] Inf. Syst., 1983, v:8, n:2, pp:95-103 [Journal]
- Roel Wieringa, Wiebren de Jonge
Object Identifiers, Keys, and Surrogates: Object Identifiers Revisited. [Citation Graph (0, 0)][DBLP] TAPOS, 1995, v:1, n:2, pp:101-114 [Journal]
Privacy-Friendly Electronic Traffic Pricing via Commits. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.004secs
|