Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deriving Global Conceptual Views from Multiple Information Sources., and . Conceptual Modeling, volume 1565 of Lecture Notes in Computer Science, page 44-55. Springer, (1997)Controlled Access and Dissemination of XML Documents., , , and . Workshop on Web Information and Data Management, page 22-27. ACM, (1999)Building reusable components through project evolution analysis., , and . Inf. Syst., 19 (3): 259-274 (1994)Mapping Validation by Probabilistic Reasoning., , , , and . ESWC, volume 5021 of Lecture Notes in Computer Science, page 170-184. Springer, (2008)The ESTEEM platform: enabling P2P semantic collaboration through emerging collective knowledge., , , , , , , , , and 5 other author(s). J. Intell. Inf. Syst., 36 (2): 167-195 (2011)The F3 reuse environment for requirements engineering., and . ACM SIGSOFT Softw. Eng. Notes, 19 (3): 62-65 (1994)Automated Derivation of Global Authorizations for Database Federations., , and . J. Comput. Secur., 5 (4): 271-302 (1997)Evolving open and independent ontologies., , and . Int. J. Metadata Semant. Ontologies, 1 (4): 235-249 (2006)Rules and Patterns for Security in Workflow Systems., and . DBSec, volume 142 of IFIP Conference Proceedings, page 59-74. Kluwer, (1998)Evolving Multimedia Ontologies: the BSM Tool Environment., , and . SEBD, page 133-144. Edizioni Seneca, (2009)