Author of the publication

How Dirty Is Your Relational Database? An Axiomatic Approach.

, , , , and . ECSQARU, volume 4724 of Lecture Notes in Computer Science, page 103-114. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vague XML Querying in Peer-to-Peer Networks., , and . SEBD, page 339-350. (2006)Path Sequence-Based XML Query Processing., , , and . BDA, page 449-467. (2004)Design approach for high-bandwidth low-power three-stage operational amplifiers., , , and . I. J. Circuit Theory and Applications, 40 (3): 263-273 (2012)A Simple MOSFET Parasitic Capacitance Model and Its Application to Repeater Insertion Technique., , and . PATMOS, volume 4148 of Lecture Notes in Computer Science, page 311-318. Springer, (2006)Settling Time Minimization of Operational Amplifiers., , and . PATMOS, volume 4644 of Lecture Notes in Computer Science, page 107-116. Springer, (2007)Enabling Knowledge Discovery Services on Grids., , , , and . European Across Grids Conference, volume 3165 of Lecture Notes in Computer Science, page 250-259. Springer, (2004)Vague Queries on Peer-to-Peer XML Databases., , and . DEXA, volume 4653 of Lecture Notes in Computer Science, page 287-297. Springer, (2007)STUN: querying spatio-temporal uncertain (social) networks., , , and . Soc. Netw. Anal. Min., 4 (1): 156 (2014)Path Summaries and Path Partitioning in Modern XML Databases., , , and . World Wide Web, 11 (1): 117-151 (2008)STARS: Defending against Sockpuppet-Based Targeted Attacks on Reviewing Systems., , , and . ACM Trans. Intell. Syst. Technol., 11 (5): 56:1-56:25 (2020)