Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rules and Patterns for Security in Workflow Systems., and . DBSec, volume 142 of IFIP Conference Proceedings, page 59-74. Kluwer, (1998)Evolving Multimedia Ontologies: the BSM Tool Environment., , and . SEBD, page 133-144. Edizioni Seneca, (2009)Multimedia Interpretation for Dynamic Ontology Evolution, , , , , , , , and . Journal of Logic and Computation, 19 (5): 859--897 (2009)Ontology-based Integration of Heterogeneous XML Datasources., , , and . SEBD, page 27-41. (2002)Building reusable components through project evolution analysis., , and . Inf. Syst., 19 (3): 259-274 (1994)Controlled Access and Dissemination of XML Documents., , , and . Workshop on Web Information and Data Management, page 22-27. ACM, (1999)Deriving Global Conceptual Views from Multiple Information Sources., and . Conceptual Modeling, volume 1565 of Lecture Notes in Computer Science, page 44-55. Springer, (1997)Mapping Validation by Probabilistic Reasoning., , , , and . ESWC, volume 5021 of Lecture Notes in Computer Science, page 170-184. Springer, (2008)A Multi-Perspective Framework for the Analysis of Legacy Information Systems., and . CAiSE, volume 1250 of Lecture Notes in Computer Science, page 117-130. Springer, (1997)Crime Knowledge Extraction: an Ontology-driven Approach for Detecting Abstract Terms in Case Law Decisions., , , and . ICAIL, page 179-183. ACM, (2019)