Author of the publication

Context interchange: new features and formalisms for the intelligent integration of information

, , , and . ACM Trans. Inf. Syst., 17 (3): 270--293 (July 1999)
DOI: http://dx.doi.org/10.1145/314516.314520

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Convergence of the boundary integral method for interfacial Stokes flow., , and . CoRR, (2021)Revolutionizing Board Cyber-Risk Management Using Collaborative Gaming., , , and . ICISSP, page 112-119. SCITEPRESS, (2024)Catastrophe Bond Trading Can Boost Security Improving Cyber (Re-)Insurance Markets., , and . AMCIS, Association for Information Systems, (2023)From Testing Theory to Test Driver Implementation., and . FME, volume 1051 of Lecture Notes in Computer Science, page 538-556. Springer, (1996)Untwist your brain: efficient debugging and diagnosis of complex assertions., , and . DAC, page 644-647. ACM, (2009)Cyber Range for Industrial Control Systems (CR-ICS) for Simulating Attack Scenarios., , , , , , and . ITASEC, volume 2940 of CEUR Workshop Proceedings, page 246-259. CEUR-WS.org, (2021)Formal Verification of Stabilizing Systems.. FTRTFT, volume 1486 of Lecture Notes in Computer Science, page 158-172. Springer, (1998)Automatic Rule Derivation For Semantic Query Optimization.. Expert Database Conf., page 669-698. Benjamin/Cummings, (1988)Translation Validation., , and . TACAS, volume 1384 of Lecture Notes in Computer Science, page 151-166. Springer, (1998)Extending the Limits of Sequentially Phased Reasoning., and . FSTTCS, volume 880 of Lecture Notes in Computer Science, page 402-413. Springer, (1994)