Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fit for Purpose: Toward an Engineering Basis for Data Exchange Standards., , , and . IWEI, volume 144 of Lecture Notes in Business Information Processing, page 91-103. Springer, (2013)The Role of Schema Matching in Large Enterprises, , , , , , , and . CoRR, (2009)Surrogate Parenthood: Protected and Informative Graphs, , , , and . CoRR, (2011)The Role of Schema Matching in Large Enterprises., , , , , , and . CIDR, www.cidrdb.org, (2009)Specifying Data Sharing Agreements., , and . POLICY, page 157-162. IEEE Computer Society, (2006)Scalable Access Controls for Lineage., , , and . Workshop on the Theory and Practice of Provenance, USENIX, (2009)The Challenge of "Quick and Dirty" Information Quality., , and . ACM J. Data Inf. Qual., 7 (1-2): 1:1-1:4 (2016)Galaxy: Encouraging Data Sharing among Sources with Schema Variants., , , , , , and . ICDE, page 1551-1554. IEEE Computer Society, (2009)PLUS: A provenance manager for integrated information., , , and . IRI, page 269-275. IEEE Systems, Man, and Cybernetics Society, (2011)Provenance for collaboration: Detecting suspicious behaviors and assessing trust in information., , , and . CollaborateCom, page 342-351. ICST / IEEE, (2011)