Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Greedy Algorithms in Datalog, and . CoRR, (2003)Binding Propagation in Disjunctive Databases.. VLDB, page 287-298. Morgan Kaufmann, (1998)Optimization of Linear Logic Programs Using Counting Methods., and . EDBT, volume 580 of Lecture Notes in Computer Science, page 72-87. Springer, (1992)Translating Datalog-Like Optimization Queries into ILOG Programs., , , and . LOPSTR, volume 2664 of Lecture Notes in Computer Science, page 48-49. Springer, (2002)Implementation and Experimentation of the Logic Language NP Datalog., , and . DEXA, volume 4080 of Lecture Notes in Computer Science, page 622-633. Springer, (2006)Rewriting-based Check of Chase Termination., , , and . AMW, volume 1378 of CEUR Workshop Proceedings, CEUR-WS.org, (2015)Managing Inconsistent Databases Using Active Integrity Constraints., , and . Encyclopedia of Database Technologies and Applications, Idea Group, (2005)Approximate Probabilistic Query Answering over Inconsistent Databases., and . ER, volume 5231 of Lecture Notes in Computer Science, page 311-325. Springer, (2008)Active integrity constraints., , and . PPDP, page 98-107. ACM, (2004)A Stochastic Approach for Modeling and Computing Web Communities., , and . WISE, page 43-52. IEEE Computer Society, (2002)