Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Functional Dependencies with null Markers., and . Comput. J., 58 (5): 1160-1168 (2015)Social Interaction in Databases.. Community-Built Databases, Springer, (2011)Evaluating source trustability with data provenance: A research note.. ISI, page 129-131. IEEE, (2012)Supporting data exploration in databases.. ISI, page 49-54. IEEE, (2009)Efficient Implementation of Generalized Quantification in Relational Query Languages., and . PVLDB, 6 (4): 241-252 (2013)Business Rules in Databases.. Encyclopedia of Database Technologies and Applications, Idea Group, (2005)Handling Partial Matches in Semistructured Data with Cooperative Query Answering Techniques., and . CoopIS/DOA/ODBASE, volume 2519 of Lecture Notes in Computer Science, page 449-467. Springer, (2002)Automatic Generation of XML from Relations: The Nested Relation Approach.. ER (Workshops), volume 2814 of Lecture Notes in Computer Science, page 330-341. Springer, (2003)Link Analysis Tools for Intelligence and Counterterrorism., and . ISI, volume 3495 of Lecture Notes in Computer Science, page 49-59. Springer, (2005)Personal Information Management (PIM) for Intelligence Analysis.. ISI, volume 3975 of Lecture Notes in Computer Science, page 510-515. Springer, (2006)