Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Database Security., , , and . Addison-Wesley & ACM Press, (1995)An Approach to Deriving Global Authorizations in Federated Database Systems.. DBSec, volume 79 of IFIP Conference Proceedings, page 58-75. Chapman & Hall, (1996)An XML-based Interorganizational Knowledge Mediation Scheme to Support B2B Solution., , and . DS-9, volume 239 of IFIP Conference Proceedings, page 121-135. Kluwer, (2001)Reusability-based comparison of requirement specification methodologies., , , and . Methods and Associated Tools for the Information Systems Life Cycle, volume A-55 of IFIP Transactions, page 63-84. Elsevier, (1994)Information Integration on Multiple Heterogeneous Data Sources., , , and . SEBD, page 155-170. (1998)Exploratory Analysis of Web Information Resources., , and . SEBD, page 248-255. Curran Associates, Inc., (2015)Classificazione di schemi entita'-relazione basata su tecniche neurali., and . SEBD, page 365-383. STAR - Servizio Tecnografico Area Ricerca CNR, Pisa, (1996)A uniform framework for Web data modeling and integration., , , and . SEBD, page 153-166. (2000)Exploiting Schema Knowledge for the Integration of Heterogeneous Sorces., , , , and . SEBD, page 103-120. (1998)Human-in-the-Loop Web Resource Classification., , and . OTM Conferences, volume 10033 of Lecture Notes in Computer Science, page 229-244. (2016)