Author of the publication

Verification, Validation and Integrity Issues in Expert and Database Systems: The Database Perspective.

, and . DEXA Workshop, page 22-27. IEEE Computer Society, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verification, Validation and Integrity in Knowledge and Database Systems: Future Directions., , and . EUROVAV, page 297-312. Kluwer, (1999)A Fully Reversible Data Transform Technique Enhancing Data Compression of SMILES Data., and . CD-ARES, volume 8127 of Lecture Notes in Computer Science, page 54-68. Springer, (2013)Promoting where, when and what? An analysis of web logs by integrating data mining and social network techniques to guide ecommerce business promotions., , , , , and . Soc. Netw. Anal. Min., 1 (3): 173-185 (2011)Formal Specification of Multi Agent System for Historical Information Retrieval from Online Social Networks., , , and . KES-AMSTA, volume 6682 of Lecture Notes in Computer Science, page 84-93. Springer, (2011)Finding Hidden Nodes by Checking for Missing Nodes against Past Social Networks., , , , , , and . NBiS, page 239-246. IEEE Computer Society, (2012)Using metadata for developing automated Web system interface., and . ISICT, volume 49 of ACM International Conference Proceeding Series, page 113-118. Trinity College Dublin, (2003)Using RuleML and database metadata for automatic generation of web forms., and . ISDA, page 790-794. IEEE, (2010)Employing Social Network Construction and Analysis in Web Structure Optimization., , , , , , and . From Sociology to Computing in Social Networks, volume 1 of Lecture Notes in Social Networks, Springer, (2010)Fuzzy complex number aided evaluation of predictive toxicology models., , , , and . FUZZ-IEEE, page 1-8. IEEE, (2012)Simplified access to structured databases by adapting keyword search and database selection., , , and . SAC, page 674-678. ACM, (2004)