Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Early Performance Analysis in the Design of Spatial Databases., , , , and . ICSOFT (ISDM/EHST/DC), page 172-177. INSTICC Press, (2007)Automating Conceptual Schema Reconciliation through a DL-based Schema Matcher., , and . SEBD, page 48-59. Curran Associates, Inc., (2015)Visual data integration based on description logic reasoning., , and . IDEAS, page 19-28. ACM, (2014)M-CODD: A Technique for the Conceptual Design of Multimedia Databases., , , and . MDIC, volume 2184 of Lecture Notes in Computer Science, page 55-66. Springer, (2001)Discovering Relaxed Functional Dependencies based on Multi-attribute Dominance Extended Abstract., , , and . ICDE, page 2354-2355. IEEE, (2021)Visual Computer-Managed Security: A Framework for Developing Access Control in Enterprise Applications., and . IEEE Softw., 30 (5): 62-69 (2013)A SCORM Thin Client Architecture for E-Learning Systems Based on Web Services., , , , and . Int. J. Distance Educ. Technol., 5 (1): 19-36 (2007)Malicious Account Identification in Social Network Platforms., , , , , and . ACM Trans. Internet Techn., 23 (4): 57:1-57:25 (November 2023)Fake Account Identification in Social Networks., , and . IEEE BigData, page 5078-5085. IEEE, (2018)A sketch-based conceptual level data integration methodology., , and . IRI, page 741-748. IEEE Computer Society, (2014)