Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coping with Constraint Violation: the Practical Face of Database Integrity.. FMLDO, page 141-148. (1996)A Model-Driven Approach to Service Composition in Virtual Enterprises., and . IEEE SCC, page 214-221. IEEE Computer Society, (2006)A Safe Regression Test Selection Technique for Database-Driven Applications., and . ICSM, page 421-430. IEEE Computer Society, (2005)On using Prolog to implement object-oriented databases., , , and . Information & Software Technology, 35 (5): 301-311 (1993)Automatic Annotation of Web Services Based on Workflow Definitions., , , , and . International Semantic Web Conference, volume 4273 of Lecture Notes in Computer Science, page 116-129. Springer, (2006)Effect of Continuous Integration on Build Health in Undergraduate Team Projects., and . DEVOPS, volume 11350 of Lecture Notes in Computer Science, page 169-183. Springer, (2018)A Tentative Maturity Model for Biomedical Data Curation., , and . ICBO, volume 2137 of CEUR Workshop Proceedings, CEUR-WS.org, (2017)Observing the Data Scientist: Using Manual Corrections As Implicit Feedback., , and . HILDA@SIGMOD, page 13:1-13:6. ACM, (2017)Conflict Detection for Integration of Taxonomic Data Sources., , , , , , , and . SSDBM, page 204-213. IEEE Computer Society, (1999)LITCHI: Knowledge Integrity Testing for Taxonomic Databases., , , , , , , and . SSDBM, page 278. IEEE Computer Society, (1999)