Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Web information management: past, present and future.. WSDM, page 1. ACM, (2008)What is Workflow and Who needs it?. HPTS, (1993)The TSIMMIS Approach to Mediation: Data Models and Languages., , , , , , and . NGITS, (1995)Efficient Crawling Through URL Ordering., , and . Comput. Networks, 30 (1-7): 161-172 (1998)Duplicate Removal in Information System Dissemination., and . VLDB, page 66-77. Morgan Kaufmann, (1995)System M: A Transaction Processing Testbed for Memory Resident Data., and . IEEE Trans. Knowl. Data Eng., 2 (1): 161-172 (1990)Evaluating Response Time in a Faulty Distributed Computing System., and . IEEE Trans. Computers, 34 (2): 101-109 (1985)The Vulnerability of Voting Mechanisms., and . Symposium on Reliability in Distributed Software and Database Systems, page 45-53. IEEE Computer Society, (1984)Finding Near-Replicas of Documents and Servers on the Web., and . WebDB, volume 1590 of Lecture Notes in Computer Science, page 204-212. Springer, (1998)Spam: It's Not Just for Inboxes Anymore, and . IEEE Computer Magazine, 38 (10): 28--34 (2005)