Author of the publication

The Good, the Bad, and the Ugly, But How Ugly Is Ugly?

, , and . RV, volume 4839 of Lecture Notes in Computer Science, page 126-138. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparing LTL Semantics for Runtime Verification., , and . J. Log. Comput., 20 (3): 651-674 (2010)DIADEM: Thousands of Websites to a Single Database., , , , , , and . PVLDB, 7 (14): 1845-1856 (2014)Approximating Succinct MaxSat., and . J. Log. Comput., 15 (4): 551-557 (2005)The ontological key: automatically understanding and integrating forms to access the deep Web., , , , , and . VLDB J., 22 (5): 615-640 (2013)Monitoring of Real-Time Properties., , and . FSTTCS, volume 4337 of Lecture Notes in Computer Science, page 260-272. Springer, (2006)Little Knowledge Rules the Web: Domain-Centric Result Page Extraction., , , , , and . RR, volume 6902 of Lecture Notes in Computer Science, page 61-76. Springer, (2011)deqa: Deep Web Extraction for Question Answering., , , , , , , , , and 2 other author(s). International Semantic Web Conference (2), volume 7650 of Lecture Notes in Computer Science, page 131-147. Springer, (2012)Robust and Noise Resistant Wrapper Induction., , , and . SIGMOD Conference, page 773-784. ACM, (2016)Detecting Malicious Code by Model Checking., , , and . DIMVA, volume 3548 of Lecture Notes in Computer Science, page 174-187. Springer, (2005)Closure properties and complexity of rational sets of regular languages., , , and . Theor. Comput. Sci., (2015)