Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wrapping and reasoning on relational databases with Cross, , and . (2007)Wrapping and Integrating Heterogeneous Relational Data with OWL., , , and . ICEIS (1), page 11-18. (2005)Towards a Coordination Model for Web Services., , and . Technologies for Collaborative Business Process Management, page 24-32. INSTICC Press, (2006)Cross: An OWL Wrapper for Reasoning on Relational Databases., , and . ER, volume 4801 of Lecture Notes in Computer Science, page 502-517. Springer, (2007)Ninth International Workshop on Web Information Systems Modeling (WISM 2012)., , and . ER Workshops, volume 7518 of Lecture Notes in Computer Science, page 325-326. Springer, (2012)Preface to WISM 2011., , and . ER Workshops, volume 6999 of Lecture Notes in Computer Science, page 1. Springer, (2011)SENSSE: Simple, Efficient Searchable Symmetric Encryption for Sensor Networks., , and . ICETE (2), page 363-371. ScitePress, (2020)Non-destructive Integration of Form-Based Views., , , , and . ADBIS, volume 3631 of Lecture Notes in Computer Science, page 74-86. Springer, (2005)Dynamic Requirements Specification for Adaptable and Open Service-Oriented Systems., , and . ICSOC, volume 4749 of Lecture Notes in Computer Science, page 270-282. Springer, (2007)Security Pattern for Cloud SaaS: From System and Data Security to Privacy Case Study in AWS and Azure., , , and . Comput., 8 (2): 34 (2019)