Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User's command line reference behaviour: Locality versus recency., and . INTERACT, page 121-128. North-Holland, (1990)Two-dimensional solution path for support vector regression., , and . ICML, volume 148 of ACM International Conference Proceeding Series, page 993-1000. ACM, (2006)An Object-Based Approach to Modelling Office Work., and . IEEE Database Eng. Bull., 8 (4): 14-22 (1985)Combining Tag and Value Similarity for Data Extraction and Alignment, , , and . IEEE Transactions on Knowledge and Data Engineering, (2011)Automatic Hierarchical Classification of Structured Deep Web Databases., , and . WISE, volume 4255 of Lecture Notes in Computer Science, page 210-221. Springer, (2006)Latent Process Model for Manifold Learning., , , and . ICTAI, page 382-386. IEEE Computer Society, (2005)OZ+: An Object-Oriented Database System., and . Object-Oriented Concepts, Databases, and Applications, ACM Press and Addison-Wesley, (1989)Letter from the Editor.. IEEE Database Eng. Bull., 8 (4): 1 (1985)A Knowledge-Based Approach to Supporting Office Work.. IEEE Database Eng. Bull., 6 (3): 43-51 (1983)Role-Based Security in Data Base Management Systems., and . DBSec, page 209-222. North-Holland, (1987)