Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Schema Management., , , , , , , , , and 3 other author(s). IEEE Data Eng. Bull., 25 (3): 32-38 (2002)Data Exploration on Large Amount of Relational Data through Keyword Queries., , and . HPCS, page 70-73. IEEE, (2017)Introduction to the special section on New Trends in Humanistic Informatics: Implementations and Applications., , and . Comput. Electr. Eng., (2018)Updates Through Views.. Encyclopedia of Database Systems (2nd ed.), Springer, (2018)Data Exploration Using Example-Based Methods, , , and . Synthesis Lectures on Data Management Morgan & Claypool Publishers, (2018)Manipulation detection in cryptocurrency markets: an anomaly and change detection based approach., , , and . SAC, page 326-329. ACM, (2022)Estimating the extent of the effects of Data Quality through Observations., , and . ICDE, page 1913-1918. IEEE, (2021)Personalized Page Rank on Knowledge Graphs: Particle Filtering is all you need!, , and . EDBT, page 447-450. OpenProceedings.org, (2020)Clio: Schema Mapping Creation and Data Exchange., , , , , and . Conceptual Modeling: Foundations and Applications, volume 5600 of Lecture Notes in Computer Science, page 198-236. Springer, (2009)Mapping XML and Relational Schemas with Clio., , , , , and . ICDE, page 498-499. IEEE Computer Society, (2002)