The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Wiebren de Jonge: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Reind P. van de Riet, Anthony I. Wasserman, Martin L. Kersten, Wiebren de Jonge
    High-Level Programming Features for Improving the Efficiency of a Relational Database System. [Citation Graph (7, 12)][DBLP]
    ACM Trans. Database Syst., 1981, v:6, n:3, pp:464-485 [Journal]
  2. George L. Sicherman, Wiebren de Jonge, Reind P. van de Riet
    Answering Queries Without Revealing Secrets. [Citation Graph (6, 5)][DBLP]
    ACM Trans. Database Syst., 1983, v:8, n:1, pp:41-59 [Journal]
  3. Roel Wieringa, Wiebren de Jonge, Paul Spruit
    Roles and Dynamic Subclasses: A Modal Logic Approach. [Citation Graph (3, 0)][DBLP]
    ECOOP, 1994, pp:32-59 [Conf]
  4. Wiebren de Jonge, Andrew S. Tanenbaum, Reind P. van de Riet
    Two Access Methods Using Compact Binary Trees. [Citation Graph (3, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:7, pp:799-810 [Journal]
  5. Roel Wieringa, Wiebren de Jonge, Paul Spruit
    Using Dynamic Classes and Role Classes to Model Object Migration. [Citation Graph (2, 0)][DBLP]
    TAPOS, 1995, v:1, n:1, pp:61-83 [Journal]
  6. Wiebren de Jonge
    Compromising Statistical Databases Responding to Queries about Means. [Citation Graph (2, 8)][DBLP]
    ACM Trans. Database Syst., 1983, v:8, n:1, pp:60-80 [Journal]
  7. Wiebren de Jonge, Ardie Schijf
    Concurrent Access to B-Trees. [Citation Graph (1, 0)][DBLP]
    PARBASE, 1990, pp:312-320 [Conf]
  8. Wiebren de Jonge, David Chaum
    Attacks on Some RSA Signatures. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1985, pp:18-27 [Conf]
  9. Wiebren de Jonge, David Chaum
    Some Variations on RSA Signatures and Their Security. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:49-59 [Conf]
  10. Martin L. Kersten, Reind P. van de Riet, Wiebren de Jonge
    Privacy and Security in Distributed Database Systems. [Citation Graph (0, 0)][DBLP]
    DDSS, 1981, pp:229-241 [Conf]
  11. Robert Grimm, Wilson C. Hsieh, Wiebren de Jonge, M. Frans Kaashoek
    Atomic Recovery Units: Failure Atomicity for Logical Disks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1996, pp:26-37 [Conf]
  12. Wiebren de Jonge, Ardie Schijf
    Concurrent Access to B-Trees. [Citation Graph (0, 0)][DBLP]
    PARBASE / Databases, 1990, pp:37-54 [Conf]
  13. Wiebren de Jonge, M. Frans Kaashoek, Wilson C. Hsieh
    The Logical Disk: A New Approach to Improving File Systems. [Citation Graph (0, 0)][DBLP]
    SOSP, 1993, pp:15-28 [Conf]
  14. Wiebren de Jonge, Peter Scheuermann, Ardie Schijf
    Encoding and Manipulating Pictorial Data with S+-trees. [Citation Graph (0, 0)][DBLP]
    SSD, 1991, pp:401-419 [Conf]
  15. Reind P. van de Riet, Martin L. Kersten, Wiebren de Jonge, Anthony I. Wasserman
    Privacy and security in information systems using programming language features. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 1983, v:8, n:2, pp:95-103 [Journal]
  16. Roel Wieringa, Wiebren de Jonge
    Object Identifiers, Keys, and Surrogates: Object Identifiers Revisited. [Citation Graph (0, 0)][DBLP]
    TAPOS, 1995, v:1, n:2, pp:101-114 [Journal]

  17. Privacy-Friendly Electronic Traffic Pricing via Commits. [Citation Graph (, )][DBLP]


Search in 0.166secs, Finished in 0.168secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002