Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparing LTL Semantics for Runtime Verification., , and . J. Log. Comput., 20 (3): 651-674 (2010)DIADEM: Thousands of Websites to a Single Database., , , , , , and . PVLDB, 7 (14): 1845-1856 (2014)Approximating Succinct MaxSat., and . J. Log. Comput., 15 (4): 551-557 (2005)The ontological key: automatically understanding and integrating forms to access the deep Web., , , , , and . VLDB J., 22 (5): 615-640 (2013)deqa: Deep Web Extraction for Question Answering., , , , , , , , , and 2 other author(s). International Semantic Web Conference (2), volume 7650 of Lecture Notes in Computer Science, page 131-147. Springer, (2012)Robust and Noise Resistant Wrapper Induction., , , and . SIGMOD Conference, page 773-784. ACM, (2016)Monitoring of Real-Time Properties., , and . FSTTCS, volume 4337 of Lecture Notes in Computer Science, page 260-272. Springer, (2006)Little Knowledge Rules the Web: Domain-Centric Result Page Extraction., , , , , and . RR, volume 6902 of Lecture Notes in Computer Science, page 61-76. Springer, (2011)Detecting Malicious Code by Model Checking., , , and . DIMVA, volume 3548 of Lecture Notes in Computer Science, page 174-187. Springer, (2005)Ensuring Media Integrity on Third-Party Infrastructures., , , and . SEC, volume 181 of IFIP, page 493-508. Springer, (2005)