Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrity Checking for Uncertain Data., and . TDM, volume WP06-01 of CTIT Workshop Proceedings Series, page 41-48. Centre for Telematics and Information Technology (CTIT), University of Twente, Enschede, The Netherlands, (2006)Dynamic Query Optimization under Access Limitations and Dependencies., , and . J. UCS, 15 (1): 33-62 (2009)Avenues to Flexible Data Integrity Checking., and . DEXA Workshops, page 425-429. IEEE Computer Society, (2006)Reconciling Skyline and Ranking Queries., and . PVLDB, 10 (11): 1454-1465 (2017)Proximity Rank Join in Search Computing., and . SeCO Workshop, volume 6585 of Lecture Notes in Computer Science, page 121-127. Springer, (2010)A workload-dependent task assignment policy for crowdsourcing., , , and . World Wide Web, 20 (6): 1179-1210 (2017)Conjunctive Query Containment under Access Limitations., and . ER, volume 5231 of Lecture Notes in Computer Science, page 326-340. Springer, (2008)Optimization of Query Plans in the presence of Access Limitations., , and . EROW, volume 229 of CEUR Workshop Proceedings, CEUR-WS.org, (2007)Contextual Data Tailoring Using ASP., , and . SDKB, volume 7693 of Lecture Notes in Computer Science, page 99-117. Springer, (2011)Keyword Search in the Deep Web., , and . AMW, volume 1378 of CEUR Workshop Proceedings, CEUR-WS.org, (2015)