Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

XPath Query Relaxation through Rewriting Rules., , and . IEEE Trans. Knowl. Data Eng., 23 (10): 1583-1600 (2011)On the expressiveness of generalization rules for XPath query relaxation., , and . IDEAS, page 157-168. ACM, (2010)DART: A Data Acquisition and Repairing Tool., , , and . EDBT Workshops, volume 4254 of Lecture Notes in Computer Science, page 297-317. Springer, (2006)Dealing with Inconsistency in Databases: An Overview., , , , , , , , , and 2 other author(s). A Comprehensive Guide Through the Italian Database Research, volume 31 of Studies in Big Data, Springer International Publishing, (2018)On the Complexity of Probabilistic Abstract Argumentation., , and . IJCAI, page 898-904. IJCAI/AAAI, (2013)On the effectiveness of MH-based joint-decoders for very short Tardos fingerprinting codes., , , and . CoDIT, page 928-933. IEEE, (2019)Approximate Functional Dependencies for XML Data., and . ADBIS Research Communications, volume 325 of CEUR Workshop Proceedings, CEUR-WS.org, (2007)Using integrity constraints to guide the interpretation of RFID-trajectory data., , , and . ACM SIGSPATIAL Special, 9 (2): 28-35 (2017)Effective Document Fingerprinting., , , and . BICOD, volume 10365 of Lecture Notes in Computer Science, page 160-164. Springer, (2017)Efficient Analysis of Process Logs., , , , , and . SEBD, page 214-221. Matematicamente.it, (2016)