Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Confidentiality in E-Government and E-Commerce., , , and . Security and Management, page 391-394. CSREA Press, (2004)A Model to Support E-Catalog Integration., , , and . DS-9, volume 239 of IFIP Conference Proceedings, page 237-251. Kluwer, (2001)OOER: Toward Making the E-R Approach Object-Oriented., and . ER, page 185-206. North-Holland, (1988)A Transaction Architecture for a General Purpose Semantic Data Model., and . ER, page 511-541. ER Institute, (1991)SA-ER: A Methodology that Links Structured Analysis and Entity-Relationship Modeling for Database Design., and . ER, page 381-397. North-Holland, (1986)Text analysis of MEDLINE for discovering functional relationships among genes: evaluation of keyword extraction weighting schemes., , , , , and . IJDMB, 1 (1): 88-110 (2006)Restructuring for Large Data Bases: Three Levels of Abstraction., and . ACM Trans. Database Syst., 1 (2): 138-158 (1976)Database Technology and Standards: Are we Getting Anywhere? (Panel Abstract)., and . ICDE, page 230. IEEE Computer Society, (1993)A Tool for Integrating Conceptual Schemas and User Views., , , and . ICDE, page 176-183. IEEE Computer Society, (1988)Crowd-Sourced Data Collection for Urban Monitoring via Mobile Sensors., , , and . ACM Trans. Internet Techn., 18 (1): 5:1-5:21 (2017)