Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Common Knowledge Revisited., , , and . TARK, page 283-298. Morgan Kaufmann, (1996)A Nonstandard Approach to the Logical Omniscience Problem., , and . TARK, page 41-55. Morgan Kaufmann, (1990)Epistemic privacy., , and . J. ACM, 58 (1): 2:1-2:45 (2010)Probabilistic data exchange., , and . J. ACM, 58 (4): 15:1-15:55 (2011)Two Views of Belief: Belief as Generalized Probability and Belief as Evidence., and . Artif. Intell., 54 (2): 275-317 (1992)Optimal Aggregation Algorithms for Middleware., , and . PODS, ACM, (2001)Quasi-inverses of schema mappings., , , and . PODS, page 123-132. ACM, (2007)Probabilistic data exchange., , and . ICDT, page 76-88. ACM, (2010)Comparing the Power of Monadic NP Games.. LCC, volume 960 of Lecture Notes in Computer Science, page 414-425. Springer, (1994)Schema Management., , , , , , , , , and 3 other author(s). IEEE Data Eng. Bull., 25 (3): 32-38 (2002)