Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Treating Programs as Objects: The Computational Proxy Experience., and . DOOD, volume 760 of Lecture Notes in Computer Science, page 1-12. Springer, (1993)Dataspaces: A New Abstraction for Information Management., , and . DASFAA, volume 3882 of Lecture Notes in Computer Science, page 1-2. Springer, (2006)User Trust and Judgments in a Curated Database with Explicit Provenance., , and . In Search of Elegance in the Theory and Practice of Computation, volume 8000 of Lecture Notes in Computer Science, page 89-111. Springer, (2013)Extending Multiple Diagram Navigation with Internal Diagram and Collection Connections., and . JCDL, page 141-144. ACM, (2018)Connections in Acyclic Hypergraphs., and . PODS, page 34-39. ACM, (1982)Demonstrating "Data Near Here": Scientific Data Search., and . SIGMOD Conference, page 1075-1080. ACM, (2015)A Framework for Fine-grained Data Integration and Curation, with Provenance, in a Dataspace., , and . Workshop on the Theory and Practice of Provenance, USENIX, (2009)Declaratively Producing Data Mash-ups., and . COMAD, page 198-209. Computer Society of India / Allied Publishers, (2008)Discarding the Universal Instance Assumption: Preliminary Results.. XP1 Workshop on Database Theory, (1980)Database Systems: Achievements and Opportunities, , , , , , , , , and 10 other author(s). Communications of the ACM, (October 1991)