Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Corrupted Schema Mappings in XML P2P Databases., and . SEBD, page 184-191. (2005)An Empirical Study on the Üsage of Not" in Real-World JSON Schema Documents (Long Version)., , , , and . CoRR, (2021)Efficient asymmetric inclusion between regular expression types., , and . ICDT, volume 361 of ACM International Conference Proceeding Series, page 174-182. ACM, (2009)Static analysis for path correctness of XML queries., , , and . J. Funct. Program., 16 (4-5): 621-661 (2006)Negation-Closure for JSON Schema., , , , and . CoRR, (2022)Scalable Saturation of Streaming RDF Triples., , , and . Trans. Large Scale Data Knowl. Centered Syst., (2020)Streaming saturation for large RDF graphs with dynamic schema information., , , and . DBPL, page 42-52. ACM, (2019)XPeer: A Self-Organizing XML P2P Database System., , , and . EDBT Workshops, volume 3268 of Lecture Notes in Computer Science, page 456-465. Springer, (2004)Linear Time Membership in a Class of Regular Expressions with Counting, Interleaving, and Unordered Concatenation., , and . ACM Trans. Database Syst., 42 (4): 24:1-24:44 (2017)The Query Language TQL - Demo Presentation., , , , , and . SEBD, page 427-431. (2002)