Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semantics-Based Threat Structure Mining for Homeland Security., , , , , , , , and . Digital Government, volume 17 of Integrated Series In Information Systems, Springer, (2008)Semantikbeschreibende Metadaten zur Integration heterogener Daten aus dem Internet.. Darmstadt University of Technology, Germany, (2001)The Graph Story of the SAP HANA Database., , , and . BTW, volume P-214 of LNI, page 403-420. GI, (2013)Policy based Web Service Orchestration and Goal Reachability Analysis using MSC and CP Nets., , , and . CEC/EEE, page 131-140. IEEE Computer Society, (2007)Ontologies for Scalable Services-Based Ubiquitous Computing., , and . Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises, IGI Global, (2008)An Infrastructure for Meta-Auctions., , , and . WECWIS, page 21-30. IEEE Computer Society, (2000)Web Service Discovery: Adding Semantics through Service Request Expansion and Latent Semantic Indexing., , and . IEEE SCC, page 106-113. IEEE Computer Society, (2007)Event Handling for the Universal Enterprise., , and . Inf. Technol. Manag., 6 (1): 123-148 (2005)MOAW: An Agile Visual Modeling and Exploration Tool for Irregularly Structured Data., , , and . BTW, volume P-180 of LNI, page 742-745. GI, (2011)Semantics-based threat structure mining., , , , , , , , , and 1 other author(s). DG.O, volume 151 of ACM International Conference Proceeding Series, page 367-368. Digital Government Research Center, (2006)