Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Corrupted Schema Mappings in XML P2P Databases., and . SEBD, page 184-191. (2005)Efficient asymmetric inclusion between regular expression types., , and . ICDT, volume 361 of ACM International Conference Proceeding Series, page 174-182. ACM, (2009)RDF analytics: lenses over semantic graphs., , , and . WWW, page 467-478. ACM, (2014)Projection for XML update optimization., , , , and . EDBT, page 307-318. ACM, (2011)Static analysis for path correctness of XML queries., , , and . J. Funct. Program., 16 (4-5): 621-661 (2006)Streaming saturation for large RDF graphs with dynamic schema information., , , and . DBPL, page 42-52. ACM, (2019)Correlation-Based Pre-Filtering for Context-Aware Recommendation., , and . PerCom Workshops, page 89-94. IEEE Computer Society, (2018)A type system for Discretionary Access Control., , , and . Mathematical Structures in Computer Science, 19 (4): 839-875 (2009)Analyse de données RDF. Lentilles pour graphes sémantiques., , , and . Ingénierie des Systèmes d'Information, 19 (4): 87-117 (2014)The Query Language TQL., , , , , and . WebDB, page 13-18. (2002)