Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The rationale of PROV, , , , and . Web Semantics: Science, Services and Agents on the World Wide Web, (2015)Provenance: a future history., , , , and . OOPSLA Companion, page 957-964. ACM, (2009)Report on the Principles of Provenance Workshop, , and . SIGMOD Rec., 37 (1): 62--65 (2008)A Formalization of SQL with Nulls., and . CoRR, (2020)Incremental relational lenses., , and . Proc. ACM Program. Lang., 2 (ICFP): 74:1-74:30 (2018)Scrap your nameplate: (functional pearl).. ICFP, page 180-191. ACM, (2005)Functional programs that explain their work., , , and . ICFP, page 365-376. ACM, (2012)Integrity Checking and Abnormality Detection of Provenance Records., , , and . TaPP, USENIX Association, (2020)Measuring Discord Among Multidimensional Data Sources., and . DOLAP, volume 3130 of CEUR Workshop Proceedings, page 96-100. CEUR-WS.org, (2022)A Rule Mining-based Advanced Persistent Threats Detection System., , , and . IJCAI, page 3589-3596. ijcai.org, (2021)