Author of the publication

Making Data Meaningful: The Business Intelligence Model and Its Formal Semantics in Description Logics.

, , , , , , and . OTM Conferences (2), volume 7566 of Lecture Notes in Computer Science, page 700-717. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Univ. -Prof. Dr. Daniel Weiskopf University of Stuttgart

Dataset for "How Deep Is Your Gaze? Leveraging Distance in Image-Based Gaze Analysis", , , and . Dataset, (2024)Related to: Maurice Koch, Nelusa Pathmanathan, Daniel Weiskopf, and Kuno Kurzhals.2024. How Deep Is Your Gaze? Leveraging Distance in Image-Based GazeAnalysis. In 2024 Symposium on Eye Tracking Research and Applications(ETRA ’24), June 04–07, 2024, Glasgow, United Kingdom. ACM, New York,NY, USA, 7 pages. doi: 10.1145/3649902.3653349.
 

Other publications of authors with the same name

Introduction to the User Requirements Notation: learning by example.. Computer Networks, 42 (3): 285-301 (2003)Business Process Compliance Tracking Using Key Performance Indicators., , and . Business Process Management Workshops, volume 66 of Lecture Notes in Business Information Processing, page 73-84. Springer, (2010)Comparative Analysis between Document-based and Model-based Compliance Management Approaches., , and . RELAW, page 35-39. IEEE Computer Society, (2008)Evolution mechanisms for goal-driven pattern families used in business process modelling., and . IJEB, 10 (3): 254-291 (2013)Integrating an Eclipse-Based Scenario Modeling Environment with a Requirements Management System., , , and . CCECE, page 2432-2435. IEEE, (2006)Bridging the Requirements/Design Gap in Dynamic Systems with Use Case Maps (UCMs)., and . ICSE, page 743-744. IEEE Computer Society, (2001)Formal Support for Design Techniques: A Timethreads-LOTOS Approach., , , and . FORTE, volume 43 of IFIP Conference Proceedings, page 57-72. Chapman & Hall, (1995)Common Length Name Representation: An Efficient Privacy-Preserving Scheme., , and . TELERISE@ICSE, page 44-49. IEEE Computer Society, (2015)Research Paper: A Globally Optimal k-Anonymity Method for the De-Identification of Health Data., , , , , , , , , and 2 other author(s). JAMIA, 16 (5): 670-682 (2009)Requirements Engineering (RE) for Social Good: RE Cares Requirements., , , , , , , , , and 10 other author(s). IEEE Software, 36 (1): 86-94 (2019)