Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

XQBE: the Swiss Army Knife for Semi-structured Data., , , , and . SEBD, page 284-291. (2005)On the dependency on the size of the data when chasing under conceptual dependencies.. CoRR, (2013)Trends in Rank Join., , , and . SeCO Workshop, volume 6585 of Lecture Notes in Computer Science, page 135-137. Springer, (2010)Fashion-focused creative commons social dataset, , , , , , , , , and . MMSys, page 72-77. ACM, (2013)Reactive Company Control in Company Knowledge Graphs., , , and . ICDE, page 3336-3348. IEEE, (2023)On the Role of Task Design in Crowdsourcing Campaigns., , , and . HCOMP, page 4-5. AAAI Press, (2015)Context through answer set programming., , and . LID, page 58. ACM, (2011)Querying the deep web., and . EDBT, volume 426 of ACM International Conference Proceeding Series, page 724-727. ACM, (2010)Efficient Integrity Checking for Databases with Recursive Views., and . ADBIS, volume 3631 of Lecture Notes in Computer Science, page 109-124. Springer, (2005)Simplification of Integrity Constraints with Aggregates and Arithmetic Built-Ins.. FQAS, volume 3055 of Lecture Notes in Computer Science, page 348-361. Springer, (2004)