Author of the publication

Protection Techniques from Information Extraction.

, , , and . Web Intelligence, page 1029-1033. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Unsupervised Outlier Detection Approach for Cleaning String Data Entries., , and . SEBD, page 358-365. (2008)Protein-Protein Interaction Network Querying by a "Focus and Zoom" Approach., , , and . BIRD, volume 13 of Communications in Computer and Information Science, page 331-346. Springer, (2008)On the Application of Hybrid Control to CPU Reservations., , and . HSCC, volume 2623 of Lecture Notes in Computer Science, page 389-404. Springer, (2003)Detecting Outliers via Logical Theories and Its Data Complexity., , and . Discovery Science, volume 3245 of Lecture Notes in Computer Science, page 101-113. Springer, (2004)Experimental Evaluation of Protein Secondary Structure Predictors., , , , , and . ICCS (1), volume 5544 of Lecture Notes in Computer Science, page 848-857. Springer, (2009)Specifying the Dynamics of Complex Object Databases., and . FMLDO, page 19-35. Springer, (1992)DLP: A Description Logic for Extracting and Managing Complex Terminological and Structural Properties from Database Schemes., , and . Inf. Syst., 24 (5): 401-424 (1999)Combining Description Logics with synopses for inferring complex knowledge patterns from XML sources., , , and . Inf. Syst., 32 (8): 1184-1224 (2007)QoS Control for Pipelines of Tasks Using Multiple Resources., and . IEEE Trans. Computers, 59 (3): 416-430 (2010)A Graph-Based Approach For Extracting Terminological Properties of Elements of XML Documents., , and . ICDE, page 330-337. IEEE Computer Society, (2001)