Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coping with Constraint Violation: the Practical Face of Database Integrity.. FMLDO, page 141-148. University of Magedeburg, Faculty of Computer Science, (1996)Effect of Continuous Integration on Build Health in Undergraduate Team Projects., and . DEVOPS, volume 11350 of Lecture Notes in Computer Science, page 169-183. Springer, (2018)Automatic Annotation of Web Services Based on Workflow Definitions., , , , and . ISWC, volume 4273 of Lecture Notes in Computer Science, page 116-129. Springer, (2006)Managing information quality in e-science: the qurator workbench., , , , and . SIGMOD Conference, page 1150-1152. ACM, (2007)Observing the Data Scientist: Using Manual Corrections As Implicit Feedback., , and . HILDA@SIGMOD, page 13:1-13:6. ACM, (2017)A Tentative Maturity Model for Biomedical Data Curation., , and . ICBO, volume 2137 of CEUR Workshop Proceedings, CEUR-WS.org, (2017)Placement of Workloads from Advanced RDBMS Architectures into Complex Cloud Infrastructure., , , and . EDBT, page 2:487-2:497. OpenProceedings.org, (2022)LITCHI: Knowledge Integrity Testing for Taxonomic Databases., , , , , , , and . SSDBM, page 278. IEEE Computer Society, (1999)Conflict Detection for Integration of Taxonomic Data Sources., , , , , , , and . SSDBM, page 204-213. IEEE Computer Society, (1999)A Model-Driven Approach to Service Composition in Virtual Enterprises., and . IEEE SCC, page 214-221. IEEE Computer Society, (2006)