Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Provenance for collaboration: Detecting suspicious behaviors and assessing trust in information., , , and . CollaborateCom, page 342-351. ICST / IEEE, (2011)PLUS: A provenance manager for integrated information., , , and . IRI, page 269-275. IEEE Systems, Man, and Cybernetics Society, (2011)Determining the number of components in mixtures of linear models, , and . Computational Statistics & Data Analysis, 38 (1): 15--48 (Nov 28, 2001)Towards Query Interoperability: PASSing PLUS., , , , , and . TaPP, USENIX Association, (2010)It's About the Data: Provenance as a Tool for Assessing Data Fitness., , and . TaPP, USENIX Association, (2012)The Role of Schema Matching in Large Enterprises, , , , , , , and . CoRR, (2009)Surrogate Parenthood: Protected and Informative Graphs., , , , and . Proc. VLDB Endow., 4 (8): 518-527 (2011)Fit for purpose: engineering principles for selecting an appropriate type of data exchange standard., , , , and . Inf. Syst. E Bus. Manag., 12 (4): 495-515 (2014)Fit for Purpose: Toward an Engineering Basis for Data Exchange Standards., , , and . IWEI, volume 144 of Lecture Notes in Business Information Processing, page 91-103. Springer, (2013)The Role of Schema Matching in Large Enterprises., , , , , , and . CIDR, www.cidrdb.org, (2009)