Author of the publication

Scalable Cleanup of Information Extraction Data Using Ontologies.

, , , , , , , , and . ISWC/ASWC, volume 4825 of Lecture Notes in Computer Science, page 100-113. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Representation and recognition of handprinted Chinese characters by string-matching., , and . Inf. Sci., 67 (1-2): 1-34 (1993)A. Category levels in hierarchical text categorization, , , and . Proceedings of EMNLP-3, 3rd Conference on Empirical Methods in Natural Language Processing, (1998)Approaches utilizing segment overlap to minimize test sequences., , and . PSTV, page 85-98. North-Holland, (1990)Mobile Agents: Are They a Good Idea?, , and . Mobile Object Systems, volume 1222 of Lecture Notes in Computer Science, page 25-45. Springer, (1996)Parallel Protocol Verification: The Two-Phase Algorithm., and . PSTV, page 339-353. North-Holland, (1989)Static validation of resource management in large Java applications., , , , and . ISoLA (Preliminary proceedings), volume TR-2004-6 of Technical Report, page 250-252. Department of Computer Science, University of Cyprus, (2004)A two-phase algorithm for the star-star concentrator location problem., and . INFOCOM, page 946-955. IEEE, (1988)A View of OWL From the Field: Use-cases and Experiences., , , , , , , , , and . OWLED, volume 216 of CEUR Workshop Proceedings, CEUR-WS.org, (2006)Distributed scheduling of CDMA networks with minimal information., and . IEEE Trans. Commun., 39 (1): 17-20 (1991)Parallel protocol verification using the two-phase algorithm., and . COMPSAC, page 184-192. IEEE, (1989)