Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 20 di 205
Titolo Data di pubblicazione Autore(i) File
Inclusion and Equivalence between Relational Database Schemata 1-gen-1982 Atzeni, Paolo; Ausiello, G; Batini, C; Moscarini, M.
Assumptions in Relational Database Theory 1-gen-1982 Atzeni, Paolo; Parker, Ds
Functional Dependencies and Disjunctive Existence Constraints in Database Relations with Null Values 1-gen-1984 Atzeni, Paolo; Morfuni, Nm
Functional Dependencies in Relations with Null Values 1-gen-1984 Atzeni, Paolo; Morfuni, Nm
Efficient Query Answering in the Representative Instance Approach 1-gen-1985 Atzeni, Paolo; Chan, Epf
On the Properties and Characterization of Connection-tap-free Schemes 1-gen-1986 Chan, Epf; Atzeni, Paolo
Database Theory 1-gen-1986 Ausiello, G; Atzeni, Paolo
FUNCTIONAL-DEPENDENCIES AND CONSTRAINTS ON NULL VALUES IN DATABASE RELATIONS 1-gen-1986 Atzeni, Paolo; Morfuni, Nm
Formal Properties of Net-Based Knowledge Representation Schemes 1-gen-1986 Atzeni, Paolo; Parker, Ds
Set Containment Inference 1-gen-1986 Atzeni, Paolo; Parker, Ds
: Independent Database Schemes under Functional and Inclusion Dependencies 1-gen-1987 Atzeni, Paolo; Chan, Epf
A New Basis for the Weak Instance Model 1-gen-1987 Atzeni, Paolo; Debernardis, Mc
Idempotent Single-Predicate Horn Clauses 1-gen-1988 Wood, Pt; Mendelzon, Ao; Atzeni, Paolo
Formal Properties of Net-Based Knowledge Representation Schemes 1-gen-1988 Atzeni, Paolo; Parker, D. S.
SET CONTAINMENT INFERENCE AND SYLLOGISMS 1-gen-1988 Atzeni, Paolo; Parker, Ds
Approaches to Updates over Weak Instances 1-gen-1989 Atzeni, P.; Torlone, Riccardo
Updating Databases in the Weak Instance Model 1-gen-1989 Atzeni, Paolo; Torlone, R.
Updating Databases in the Weak Instance Model 1-gen-1989 Atzeni, Paolo; Torlone, Riccardo
EFFICIENT OPTIMIZATION OF SIMPLE CHASE JOIN EXPRESSIONS 1-gen-1989 Atzeni, Paolo; Chan, Epf
Efficient Updates to Independent Schemes in the Weak Instance Model 1-gen-1990 Atzeni, Paolo; Torlone, R.
Mostrati risultati da 1 a 20 di 205
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile