Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Operational and abstract semantics of the query language G-Log., , , and . Theor. Comput. Sci., 275 (1-2): 521-560 (2002)Specifying temporal data models for semistructured data by a constraint-based approach., , and . SAC, page 1103-1108. ACM, (2004)Mining tree-based association rules from XML documents., , and . SEBD, page 109-116. Edizioni Seneca, (2009)Progettazione dei Dati con l'Uso del Contesto, , , , and . Mondo Digitale, (2008)Discovering Contextual Association Rules in Relational Databases., and . ADBIS (2), volume 241 of Advances in Intelligent Systems and Computing, page 193-202. Springer, (2013)Recommending New Items to Ephemeral Groups Using Contextual User Influence., , and . RecSys, page 285-292. ACM, (2016)Using Context for the Extraction of Relational Views., , , and . CONTEXT, volume 4635 of Lecture Notes in Computer Science, page 108-121. Springer, (2007)Exploratory computing: a comprehensive approach to data sensemaking., , , , and . Int. J. Data Sci. Anal., 3 (1): 61-77 (2017)ADaPT: Automatic Data Personalization based on contextual preferences., , , and . ICDE, page 1234-1237. IEEE Computer Society, (2014)IFTTT Privacy Checker., , , and . ETAA@ESORICS, volume 12515 of Lecture Notes in Computer Science, page 90-107. Springer, (2020)