Author of the publication

A Declarative Framework for Linking Entities.

, , , , and . ICDT, volume 31 of LIPIcs, page 25-43. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Clio project: managing heterogeneity, , , , , , and . SIGMOD Rec., 30 (1): 78--83 (March 2001)MapMerge: correlating independent schema mappings., , , and . VLDB J., 21 (2): 191-211 (2012)Towards High-Precision and Reusable Entity Resolution Algorithms over Sparse Financial Datasets., , and . DSMM@SIGMOD, page 18:1-18:4. ACM, (2016)Nested Mappings: Schema Mapping Reloaded, , , , , and . VLDB, page 67--78. ACM, (2006)The Clio project: managing heterogeneity, , , , , , and . SIGMOD Rec., (March 2001)Extracting, Linking and Integrating Data from Public Sources: A Financial Case Study., , , , , , , , and . IEEE Data Eng. Bull., 34 (3): 60-67 (2011)Defining and Capturing the Competitor Relationship across Financial Datasets., , , and . DSMM@SIGMOD, page 10:1-10:6. ACM, (2018)An Equational Chase for Path-Conjunctive Queries, Constraints, and Views., and . ICDT, volume 1540 of Lecture Notes in Computer Science, page 39-57. Springer, (1999)High-Level Rules for Integration and Analysis of Data: New Challenges., , , , , , , and . In Search of Elegance in the Theory and Practice of Computation, volume 8000 of Lecture Notes in Computer Science, page 36-55. Springer, (2013)CANTO - Covert AutheNtication With Timing Channels Over Optimized Traffic Flows for CAN., , and . IEEE Trans. Inf. Forensics Secur., (2021)