Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mapping Validation by Probabilistic Reasoning., , , , and . ESWC, volume 5021 of Lecture Notes in Computer Science, page 170-184. Springer, (2008)Crime Knowledge Extraction: an Ontology-driven Approach for Detecting Abstract Terms in Case Law Decisions., , , and . ICAIL, page 179-183. ACM, (2019)The ESTEEM platform: enabling P2P semantic collaboration through emerging collective knowledge., , , , , , , , , and 5 other author(s). J. Intell. Inf. Syst., 36 (2): 167-195 (2011)The F3 reuse environment for requirements engineering., and . ACM SIGSOFT Softw. Eng. Notes, 19 (3): 62-65 (1994)Building reusable components through project evolution analysis., , and . Inf. Syst., 19 (3): 259-274 (1994)Rules and Patterns for Security in Workflow Systems., and . DBSec, volume 142 of IFIP Conference Proceedings, page 59-74. Kluwer, (1998)Controlled Access and Dissemination of XML Documents., , , and . Workshop on Web Information and Data Management, page 22-27. ACM, (1999)Deriving Global Conceptual Views from Multiple Information Sources., and . Conceptual Modeling, volume 1565 of Lecture Notes in Computer Science, page 44-55. Springer, (1997)A Multi-Perspective Framework for the Analysis of Legacy Information Systems., and . CAiSE, volume 1250 of Lecture Notes in Computer Science, page 117-130. Springer, (1997)Automated Derivation of Global Authorizations for Database Federations., , and . J. Comput. Secur., 5 (4): 271-302 (1997)