Author of the publication

Schema-Driven Security Filter Generation For Distributed Data Integration.

, , , and . HotWeb, page 1-6. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tractable Pareto Optimization of Temporal Preferences., , , and . IJCAI, page 1289-1294. Morgan Kaufmann, (2003)Machine reasoning about anomalous sensor data., , and . Ecol. Informatics, 5 (1): 9-18 (2010)An Unorthodox Approach to Undergraduate Software Engineering Instruction.. Computing Systems, 1 (4): 405-419 (1988)Autonomy in Space: Current Capabilities and Future Challenge., , and . AI Magazine, 28 (4): 27-42 (2007)A Constraint-Based Editor for Linguistic Scholars., , and . Electron. Publ., 6 (4): 349-360 (1993)The Importance of Phase in the Spectra of Digital Type., and . Electron. Publ., 2 (1): 47-60 (1989)Challenges in Coordinating Remote Sensing Systems., , and . AAAI Spring Symposium: Distributed Plan and Schedule Management, page 65-72. AAAI, (2006)OTO: Ontology term organizer., , , , , and . ASIST, volume 49 of Proc. Assoc. Inf. Sci. Technol., page 1-3. Wiley, (2012)Optimization in Constraint Reasoning about Repeating Events., and . TIME, page 82-87. IEEE Computer Society, (1999)Constraint Reasoning about Repeating Events: Satisfaction and Optimization., and . Comput. Intell., 16 (2): 257-278 (2000)