Author of the publication

Capturing Interactive Data Transformation Operations using Provenance Workflows.

, , , , , and . SWPM@ESWC, volume 856 of CEUR Workshop Proceedings, CEUR-WS.org, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Declarative control of the future home environment.. SAC, page 1626-1627. ACM, (2005)Leveraging social network analysis with topic models and the Semantic Web (extended)., , , , and . Web Intell. Agent Syst., 11 (4): 303-314 (2013)Leveraging Social Network Analysis with Topic Models and the Semantic Web., , , , and . Web Intelligence/IAT Workshops, page 339-342. IEEE Computer Society, (2011)978-0-7695-4513-4.Provisioning Security in a Next Generation Mobility as a Service System., , , , , , and . IoTBDS, page 166-173. SCITEPRESS, (2022)Towards Mapping the Security Challenges of the Internet of Things (IoT) Supply Chain., and . KES, volume 126 of Procedia Computer Science, page 441-450. Elsevier, (2018)Behaviour-Driven Formal Model Development of the ETCS Hybrid Level 3., , , , , , , , , and . ICECCS, page 97-106. IEEE, (2019)Making (Implicit) Security Requirements Explicit for Cyber-Physical Systems: A Maritime Use Case Security Analysis., , and . DEXA Workshops, volume 1062 of Communications in Computer and Information Science, page 75-84. Springer, (2019)Investigating The Use Of Semantic Technologies In Spatial Mapping Applications., , , , and . ECMS, page 301-308. European Council for Modeling and Simulation, (2013)ACM fellow profile: Roger Needham.. ACM SIGSOFT Softw. Eng. Notes, 26 (1): 7-10 (2001)Social Semantic Web Mining, , and . Synthesis Lectures on the Semantic Web: Theory and Technology Morgan & Claypool Publishers, (2015)