Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Debugging Schema Mappings with Routes., and . VLDB, page 79-90. ACM, (2006)Provenance in Databases: Why, How, and Where., , and . Foundations and Trends in Databases, 1 (4): 379-474 (2009)Research Problems in Data Provenance.. IEEE Data Eng. Bull., 27 (4): 45-52 (2004)Temporal Data Exchange., , and . CoRR, (2016)High-Level Why-Not Explanations using Ontologies., , , and . CoRR, (2014)Provenance.. Encyclopedia of Database Systems, Springer US, (2009)Rule Sharing for Fraud Detection via Adaptation., , , and . ICDE, page 125-136. IEEE Computer Society, (2018)An Annotation Management System for Relational Databases., , , and . VLDB, page 900-911. Morgan Kaufmann, (2004)Provenance in databases., and . SIGMOD Conference, page 1171-1173. ACM, (2007)Muse: a system for understanding and designing mappings., , , , and . SIGMOD Conference, page 1281-1284. ACM, (2008)