Author of the publication

Automating Conceptual Schema Reconciliation through a DL-based Schema Matcher.

, , and . SEBD, page 48-59. Curran Associates, Inc., (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Petroglyph Classification using the Image Distortion Model., , and . VAST, page 1-8. Eurographics Association, (2012)Using extended positional grammars to develop visual modeling languages., , , and . SEKE, page 201-208. ACM, (2002)Automating Conceptual Schema Reconciliation through a DL-based Schema Matcher., , and . SEBD, page 48-59. Curran Associates, Inc., (2015)Guaranteeing integrity constraints during interactive map editing with visual language parsing., , and . ICDIM, page 19-24. IEEE, (2007)Using Error Recovery Techniques to Improve Sketch Recognition Accuracy., , and . GREC, volume 5046 of Lecture Notes in Computer Science, page 157-168. Springer, (2007)Visual data integration based on description logic reasoning., , and . IDEAS, page 19-28. ACM, (2014)On the User Perception of Security Risks of TAP Rules: A User Study., , , , and . IS-EUD, volume 13917 of Lecture Notes in Computer Science, page 162-179. Springer, (2023)Democratizing Cybersecurity in Smart Environments: Investigating the Mental Models of Novices and Experts., , , and . IS-EUD, volume 13917 of Lecture Notes in Computer Science, page 145-161. Springer, (2023)Discovering Relaxed Functional Dependencies based on Multi-attribute Dominance Extended Abstract., , , and . ICDE, page 2354-2355. IEEE, (2021)Towards a Classification Model for Identifying Risky IFTTT Applets., , and . EMPATHY@INTERACT, volume 3053 of CEUR Workshop Proceedings, page 33-37. CEUR-WS.org, (2021)