Author of the publication

Building a Mobile Applications Knowledge Base for the Linked Data Cloud.

, , , , , and . MoDeST@ISWC, volume 1506 of CEUR Workshop Proceedings, page 14-25. CEUR-WS.org, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Query Refinement in Similarity Retrieval Systems., , , and . IEEE Data Eng. Bull., 24 (3): 3-13 (2001)gVault: A Gmail Based Cryptographic Network File System., , , , and . DBSec, volume 4602 of Lecture Notes in Computer Science, page 161-176. Springer, (2007)Trustworthy Privacy Policy Translation in Untrusted IoT Environments., , , and . IoTBDS, page 132-143. SciTePress, (2018)DataVault: secure mobile access and data sharing., , , and . Netw. Secur., 2011 (5): 16-19 (2011)Domain-independent data cleaning via analysis of entity-relationship graph, and . ACM Trans. Database Syst., 31 (2): 716--767 (2006)Exploiting relationships for object consolidation., , and . IQIS, page 47-58. ACM, (2005)Supporting Approximate Similarity Queries with Quality Guarantees in P2P Systems., , , , , and . COMAD, page 60-71. Tata McGraw-Hill Publishing Company Limited, (2006)Towards breaking the quality curse.: a web-querying approach to web people search., , and . SIGIR, page 27-34. ACM, (2008)Semantically Ranked Graph Pattern Queries for Link Analysis., and . ISI, page 296-299. IEEE, (2007)Obscure: Information-Theoretic Oblivious and Verifiable Aggregation Queries., , , , , and . Proc. VLDB Endow., 12 (9): 1030-1043 (2019)