Author:
Kondylakis Haridimos,Despoina Melidoni,Glykokokalos Georgios,Kalykakis Eleftherios,Karapiperakis Manos,Lasithiotakis Michail-Angelos,Makridis John,Moraitis Panagiotis,Panteri Aspasia,Plevraki Maria,Providakis Antonios,Skalidaki Maria,Stefanos Athanasiadis,Tampouratzis Manolis,Trivizakis Eleftherios,Zervakis Fanis,Zervouraki Ekaterini,Papadakis Nikos
Publisher
Springer International Publishing
Reference8 articles.
1. Kondylakis, H., Plexousakis, D.: Exploring RDF/S evolution using provenance queries. In: EDBT/ICDT Workshops (2014)
2. Lecture Notes in Computer Science;A Pappas,2017
3. Papavasileiou, V., Flouris, G., Fundulaki, I., Kotzinos, D., Christophides, V.: High-level change detection in RDF(S) KBs. ACM Trans. Database Syst. 38(1), 1:1–1:42 (2013)
4. Roussakis, Y., Chrysakis, I., Stefanidis, K., Flouris, G.: D2 V: a tool for defining, detecting and visualizing changes on the data web. In: ISWC (Posters & Demos) (2015)
5. Roussakis, Y., Chrysakis, I., Stefanidis, K., Flouris, G., Stavrakas, Y.: A Flexible framework for understanding the dynamics of evolving RDF datasets. In: ISWC (2015)
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. ShinyAnonymizer Enhanced Version and Beyond: A Further Exploration of Privacy-Preserving Solutions in Health Data Management;Applied Sciences;2024-08-07
2. The Future of Privacy: A Review on AI's Role in Shaping Data Security;2024 5th International Conference in Electronic Engineering, Information Technology & Education (EEITE);2024-05-29
3. Anonymization, Hashing and Data Encryption Techniques: A Comparative Case Study;2023 International Conference on Applied Mathematics & Computer Science (ICAMCS);2023-08-08
4. Copyright Protection on Electronic Books: Study and Design of a New Approach;2023 International Conference on Applied Mathematics & Computer Science (ICAMCS);2023-08-08
5. A Comparative Study of Copy-Move Forgery Detection Techniques;2023 International Conference on Applied Mathematics & Computer Science (ICAMCS);2023-08-08