Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Data Transformation System for Biological Data Sources., , , , and . VLDB, page 158-169. Morgan Kaufmann, (1995)Constraints for XML., and . SBBD, page 9. COPPE/UFRJ, (2001)A Fine-Grained Workflow Model with Provenance-Aware Security Views., , and . TaPP, USENIX Association, (2011)Effective and efficient similarity search in scientific workflow repositories., , , , and . Future Generation Comp. Syst., (2016)Consistency in Partitioned Networks., , and . ACM Comput. Surv., 17 (3): 341-370 (1985)Putting Lipstick on Pig: Enabling Database-style Workflow Provenance., , , , , and . PVLDB, 5 (4): 346-357 (2011)Generating sound workflow views for correct provenance analysis., , and . ACM Trans. Database Syst., 36 (1): 6:1-6:35 (2011)Top-k and Clustering with Noisy Comparisons., , , and . ACM Trans. Database Syst., 39 (4): 35:1-35:39 (2014)A Model for Fine-Grained Data Citation., , , and . SEBD, volume 2037 of CEUR Workshop Proceedings, page 17. CEUR-WS.org, (2017)On Provenance and Privacy.. IPAW, volume 6378 of Lecture Notes in Computer Science, page 1. Springer, (2010)