Author of the publication

RACK: A Semantic Model and Triplestore for Curation of Assurance Case Evidence.

, , , , , , , , and . SAFECOMP Workshops, volume 14182 of Lecture Notes in Computer Science, page 149-160. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications., , , , , , and . WAHC@CCS, page 57-68. ACM, (2019)Ensemble PDP-8: eight principles for distributed portals., , , , , , , , , and 4 other author(s). JCDL, page 341-344. ACM, (2010)Definition and Formalization of Entity Resolution Functions for Everyday Information Integration., and . SDKB, volume 4925 of Lecture Notes in Computer Science, page 126-142. Springer, (2008)User Trust and Judgments in a Curated Database with Explicit Provenance., , and . In Search of Elegance in the Theory and Practice of Computation, volume 8000 of Lecture Notes in Computer Science, page 89-111. Springer, (2013)The instruction parsing microarchitecture of the CVAX microprocessor.. MICRO, page 147-153. ACM/IEEE, (1987)Capturing Users' Everyday, Implicit Information Integration Decisions., and . ER (Tutorials, Posters, Panels & Industrial Contributions), volume 83 of CRPIT, page 133-138. Australian Computer Society, (2007)Feedback-Guided Anomaly Discovery via Online Optimization., , , , , and . KDD, page 2200-2209. ACM, (2018)A Framework for Fine-grained Data Integration and Curation, with Provenance, in a Dataspace., , and . Workshop on the Theory and Practice of Provenance, USENIX, (2009)BASALISC: Flexible Asynchronous Hardware Accelerator for Fully Homomorphic Encryption., , , , , , , , , and 1 other author(s). IACR Cryptol. ePrint Arch., (2022)The Cost of IEEE Arithmetic in Secure Computation., , and . LATINCRYPT, volume 12912 of Lecture Notes in Computer Science, page 431-452. Springer, (2021)