Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring schema similarity at multiple resolutions., , , , , , and . SIGMOD Conference, page 1179-1182. ACM, (2010)Entity Modeling in the MLS Relational Model., and . VLDB, page 199-210. Morgan Kaufmann, (1992)Securely sharing neuroimagery., , , , , and . CIKM, page 375-377. ACM, (2003)Rapper: A Wrapper Generator with Linguistic Knowledge., , and . Workshop on Web Information and Data Management, page 6-11. ACM, (1999)Closing the Gap with APTs Through Semantic Clusters and Automated Cybergames., , , , and . SecureComm (1), volume 304 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 235-254. Springer, (2019)Facilitating discovery on the private web using dataset digests., , , , , , and . Int. J. Metadata Semant. Ontologies, 5 (3): 170-183 (2010)Databases for Semistructures Data: How Useful Are They? (Position Paper)., , , and . KRDB, volume 10 of CEUR Workshop Proceedings, page 16.1-16.4. CEUR-WS.org, (1998)OpenII: an open source information integration toolkit., , , , , , , , , and . SIGMOD Conference, page 1057-1060. ACM, (2010)Distributed Situation Monitoring: Issues and Architectures., , , and . VIEWS, page 65-71. (1996)SWIFT: system workbench for integrating and facilitating teams., , , , , , , , , and . WETICE, page 48-59. IEEE, (1993)