Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Role Binding in Blockchain-Based Collaborative Business Processes., , , and . CoRR, (2018)Robotic Process Mining: Vision and Challenges., , , , and . Bus. Inf. Syst. Eng., 63 (3): 301-314 (2021)Life After BPEL?, , , , , and . EPEW/WS-FM, volume 3670 of Lecture Notes in Computer Science, page 35-50. Springer, (2005)Towards Model Transformation between SecureUML and UMLsec for Role-based Access Control., and . DB&IS, volume 224 of Frontiers in Artificial Intelligence and Applications, page 339-352. IOS Press, (2010)Automated Discovery of Business Process Simulation Models from Event Logs., , and . CoRR, (2019)Code churn estimation using organisational and code metrics: An experimental comparison., and . Inf. Softw. Technol., 54 (2): 203-211 (2012)Fire now, fire later: alarm-based systems for prescriptive process monitoring., , , , , , and . Knowl. Inf. Syst., 64 (2): 559-587 (2022)Measuring Fitness and Precision of Automatically Discovered Process Models: A Principled and Scalable Approach., , , , and . IEEE Trans. Knowl. Data Eng., 34 (4): 1870-1888 (2022)Discovery, simulation, and optimization of business processes with differentiated resources., , and . Inf. Syst., (February 2024)Conformance Checking in Process Mining., , , , and . Inf. Syst., (2021)