Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LEEASP: A Linked Environment of Coordinated Multiple Views for Exploratory Analysis of Large-Scale Species Distribution Data, , and . (2008)org / BibtexHandler? requTask = upload & selection =.Terms in Time and Times in Context: A Graph-based Term-Time Ranking Model, , , and . Proceedings of the 24th International Conference on World Wide Web, page 1375--1380. New York, NY, USA, ACM, (2015)A diagnostic approach to repairing constraint violations in databases, , and . Proceedings of the Sixth International Workshop on Principles of Diagnosis (DX`95), page 65-72. Goslar, Germany, (1995)Exploring Entity-centric Networks in Entangled News Streams., and . WWW (Companion Volume), page 555-563. ACM, (2018)Security Re-engineering for Databases: Concepts and Techniques., and . Handbook of Database Security, Springer, (2008)Word Embeddings for Entity-Annotated Texts., , and . ECIR (1), volume 11437 of Lecture Notes in Computer Science, page 307-322. Springer, (2019)Topical Change Detection in Documents via Embeddings of Long Sequences., , , and . CoRR, (2020)CODY: A graph-based framework for the analysis of COnversation DYnamics in online social networks., , and . CoRR, (2023)Dark Patterns in the Interaction with Cookie Banners., and . CoRR, (2021)MetaStore: an adaptive metadata management framework for heterogeneous metadata models., , , , and . Distributed Parallel Databases, 36 (1): 153-194 (2018)