Author of the publication

Effect of Using Automated Auditing Tools on Detecting Compliance Failures in Unmanaged Processes.

, and . BPM, volume 5701 of Lecture Notes in Computer Science, page 310-326. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling Timed User-Interactions in Multimedia Documents., , , and . ICMCS, page 407-416. IEEE Computer Society, (1996)Designing internal control points in partially managed processes by using business vocabulary.. ICDE Workshops, page 267-272. IEEE Computer Society, (2011)MultiMedia Digital Conferencing: A Web-enabled multimedia teleconferencing system., , , , , , , , and . IBM J. Res. Dev., 42 (2): 281-298 (1998)8th IEEE Symposium on Computers and Communications (ISCC'03).. IEEE Communications Magazine, 42 (2): 30 (2004)A Cost/Performance Study of Video Servers with Hierarchical Storage., and . ICMCS, page 393-402. IEEE Computer Society, (1994)Designing an Automated Audit Tool for the Targeted Risk Exposure Reduction., and . Business Process Management Workshops (2), volume 100 of Lecture Notes in Business Information Processing, page 356-369. Springer, (2011)Performance study of a high performance information/control frame multiplexer., and . LCN, page 493-502. IEEE Computer Society, (1993)Towards Knowledge Management In Autonomic Systems., , , , , and . ISCC, page 789-794. IEEE Computer Society, (2003)Authoring and Deploying Business Policies Dynamically for Compliance Monitoring., , , and . POLICY, page 161-164. IEEE Computer Society, (2011)Business Provenance - A Technology to Increase Traceability of End-to-End Operations., , , , and . OTM Conferences (1), volume 5331 of Lecture Notes in Computer Science, page 100-119. Springer, (2008)