Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Argumentation Meets Process Mining: an Architecture for Log Interpretation., , , and . AI³@AI*IA, volume 3086 of CEUR Workshop Proceedings, CEUR-WS.org, (2021)Probabilistic AAFs with Marginal Probabilities., , and . AI³@AI*IA, volume 3354 of CEUR Workshop Proceedings, CEUR-WS.org, (2022)Exploiting Cluster Analysis for Constructing Multi-dimensional Histograms on Both Static and Evolving Data., , and . EDBT, volume 3896 of Lecture Notes in Computer Science, page 442-459. Springer, (2006)Privacy or Security?: Take A Look And Then Decide., , , and . SSDBM, page 23:1-23:4. ACM, (2016)Repairs and Consistent Answers for XML Data with Functional Dependencies., , , and . Xsym, volume 2824 of Lecture Notes in Computer Science, page 238-253. Springer, (2003)Probabilistic bipolar abstract argumentation frameworks: complexity results., , and . IJCAI, page 1803-1809. ijcai.org, (2018)Monitoring Web Information Changes., , and . ITCC, page 421-425. IEEE Computer Society, (2001)A Quad-Tree Based Multiresolution Approach for Two-dimensional Summary Data., , , and . SSDBM, page 127-140. IEEE Computer Society, (2003)A compression-based framework for the efficient analysis of business process logs., , , , and . SSDBM, page 6:1-6:12. ACM, (2015)Querying and Repairing Inconsistent XML Data., , , and . WISE, volume 3806 of Lecture Notes in Computer Science, page 175-188. Springer, (2005)