Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Opportunities for Differential Maintenance of Extracted Views., and . CoRR, (2020)Shortening the OED: Experience with a Grammar-Defined Database., , and . ACM Trans. Inf. Syst., 10 (3): 213-232 (1992)Autonomously Computable Information Extraction., and . Proc. VLDB Endow., 16 (10): 2431-2443 (2023)Cross-lingual text alignment for fine-grained plagiarism detection., , and . J. Inf. Sci., (2019)Seeking Stable Clusters in the Blogosphere., , , and . VLDB, page 806-817. ACM, (2007)Using a Dictionary and n-gram Alignment to Improve Fine-grained Cross-Language Plagiarism Detection., , and . DocEng, page 59-68. ACM, (2016)Efficiently Updating Materialized Views., , and . SIGMOD Conference, page 61-71. ACM Press, (1986)SIGMOD Record 15(2), June 1986.User-Managed Access Control for Health Care Systems., and . Secure Data Management, volume 3674 of Lecture Notes in Computer Science, page 63-72. Springer, (2005)A Unified Conflict Resolution Algorithm., , and . Secure Data Management, volume 4721 of Lecture Notes in Computer Science, page 1-17. Springer, (2007)Business Policy Modeling and Enforcement in Databases., and . Proc. VLDB Endow., 4 (11): 921-931 (2011)