Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coping with Constraint Violation: the Practical Face of Database Integrity.. FMLDO, page 141-148. (1996)A Model-Driven Approach to Service Composition in Virtual Enterprises., and . IEEE SCC, page 214-221. IEEE Computer Society, (2006)A Safe Regression Test Selection Technique for Database-Driven Applications., and . ICSM, page 421-430. IEEE Computer Society, (2005)On using Prolog to implement object-oriented databases., , , and . Information & Software Technology, 35 (5): 301-311 (1993)A Tentative Maturity Model for Biomedical Data Curation., , and . ICBO, volume 2137 of CEUR Workshop Proceedings, CEUR-WS.org, (2017)Conflict Detection for Integration of Taxonomic Data Sources., , , , , , , and . SSDBM, page 204-213. IEEE Computer Society, (1999)LITCHI: Knowledge Integrity Testing for Taxonomic Databases., , , , , , , and . SSDBM, page 278. IEEE Computer Society, (1999)A Functional Model for Dataspace Management Systems., , , , , , and . Advanced Query Processing (1), volume 36 of Intelligent Systems Reference Library, Springer, (2013)Managing information quality in e-science: the qurator workbench., , , , and . SIGMOD Conference, page 1150-1152. ACM, (2007)Effect of Continuous Integration on Build Health in Undergraduate Team Projects., and . DEVOPS, volume 11350 of Lecture Notes in Computer Science, page 169-183. Springer, (2018)