Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FLORA: Implementing an Efficient DOOD System Using a Tabling Logic Engine., and . Computational Logic, volume 1861 of Lecture Notes in Computer Science, page 1078-1093. Springer, (2000)Inheritance and Rules in Object-Oriented Semantic Web Languages., and . RuleML, volume 2876 of Lecture Notes in Computer Science, page 95-110. Springer, (2003)Automatic Annotation of Content-Rich HTML Documents: Structural and Semantic Analysis., , and . ISWC, volume 2870 of Lecture Notes in Computer Science, page 533-549. Springer, (2003)AEWS-Net: An Auditor Early-Warning Indicator Set Construction Network Based on Contrastive Learning., , and . ICBDT, page 247-253. ACM, (2023)Design and Implementation of the CALO Query Manager., , , , , , , and . AAAI, page 1751-1758. AAAI Press, (2006)Logic Based Approaches to Workflow Modeling and Verification., , , , and . Logics for Emerging Applications of Databases, page 167-202. Springer, (2003)On the Power of Semantic Partitioning of Web Documents, , , , and . Proceedings of IJCAI-03 Workshop on Information Integration on the Web (IIWeb-03), page 39-46. (2003)Computational Aspects of Resilient Data Extraction from Semistructured Sources., , , and . PODS, page 136-144. ACM, (2000)A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks., , , , , and . NSS, volume 13787 of Lecture Notes in Computer Science, page 406-425. Springer, (2022)The complexity of mining maximal frequent itemsets and maximal frequent patterns.. KDD, page 344-353. ACM, (2004)