Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Requirements of the DIACHRON Use Cases, , , , , , , , , and 6 other author(s). Deliverable, D1.1. DIACHRON: Managing the Evolution and Preservation of the Data Web, (2013)Designing personalized curricula based on student preferences., , and . SIGDOC, page 55-62. ACM, (2007)Entity resolution in the web of data., , , and . WWW (Companion Volume), page 203-204. ACM, (2014)On the Foundations of Computing Deltas Between RDF Models, , and . (2008)A greedy feature selection algorithm for Big Data of high dimensionality, , , , and . Machine Learning, 108 (2): 149-202 (Aug 7, 2018)Querying Documents in Object Databases., , , , , and . Int. J. Digit. Libr., 1 (1): 5-19 (1997)Provenance for Linked Data., , and . In Search of Elegance in the Theory and Practice of Computation, volume 8000 of Lecture Notes in Computer Science, page 366-381. Springer, (2013)HyperPATH/O2: Integrating Hypermedia Systems with Object-Oriented Database Systems., , and . DEXA, volume 720 of Lecture Notes in Computer Science, page 709-720. Springer, (1993)On Computing Deltas of RDF/S Knowledge Bases., , and . ACM Trans. Web, 5 (3): 14:1-14:36 (2011)A meta-level analysis of online anomaly detectors., , , , , and . VLDB J., 32 (4): 845-886 (July 2023)