Author of the publication

Generierung maßgeschneiderter Relationenschemata in Softwareproduktlinien mittels Superimposition.

, , , , and . BTW, volume P-180 of LNI, page 514-533. GI, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On performance optimization potentials regarding data classification in forensics., , and . BTW Workshops, volume P-242 of LNI, page 21-36. GI, (2015)Database and Data Management Requirements for Equalization of Contactless Acquired Traces for Forensic Purposes., and . BTW Workshops, volume P-216 of LNI, page 89-98. GI, (2013)Efficient Interval-focused Similarity Search under Dynamic Time Warping., , , and . SSTD, page 130-139. ACM, (2019)Improving semantic change analysis by combining word embeddings and word frequencies., , , and . Int. J. Digit. Libr., 21 (3): 247-264 (2020)Learning from Few Samples: Lexical Substitution with Word Embeddings for Short Text Classification., , , , and . JCDL, page 111-119. IEEE, (2019)Towards multi-purpose main-memory storage structures: Exploiting sub-space distance equalities in totally ordered data sets for exact knn queries., , , , and . Inf. Syst., (2021)Visit Places on Your Way: A Skyline Approach in Time-Dependent Networks., , and . MDM, page 59-68. IEEE, (2021)Toward meaningful notions of similarity in NLP embedding models., , , and . Int. J. Digit. Libr., 21 (2): 109-128 (2020)Generierung maßgeschneiderter Relationenschemata in Softwareproduktlinien mittels Superimposition., , , , and . BTW, volume P-180 of LNI, page 514-533. GI, (2011)Secure Deletion: Towards Tailor-Made Privacy in Database Systems., , and . BTW Workshops, volume P-216 of LNI, page 99-113. GI, (2013)