Return to Article Details
Deriving Triggers from Integrity Constraint Specifications in the Database Management Systems
Download
Download PDF