Author of the publication

Emails Analysis for Business Process Discovery.

, , , and . ATAED@Petri Nets/ACSD, volume 2371 of CEUR Workshop Proceedings, page 54-70. CEUR-WS.org, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain's Fame Reaches the Execution of Personalized Touristic Itineraries., , , , , and . WETICE, page 186-191. IEEE, (2019)Learning a Configurable Deployment Descriptors Model in NFV., , , and . NOMS, page 1-9. IEEE, (2020)Discovering Activities from Emails Based on Pattern Discovery Approach., , , , and . BPM (Forum), volume 392 of Lecture Notes in Business Information Processing, page 88-104. Springer, (2020)Discovering Guard Stage Milestone Models Through Hierarchical Clustering., , , , and . CoopIS, volume 14353 of Lecture Notes in Computer Science, page 239-256. Springer, (2023)Random-Value Payment Tokens for On-Chain Privacy-Preserving Payments., , , , , and . CoopIS, volume 13591 of Lecture Notes in Computer Science, page 223-241. Springer, (2022)Discovering Workflow Patterns from Timed Logs., , and . EMISA, volume P-56 of LNI, page 84-94. GI, (2004)Cross-Collaboration Processes based on Blockchain and IoT: a survey., , , , and . HICSS, page 1-10. ScholarSpace, (2021)Blockchain logging for process mining: a systematic review., , , and . HICSS, page 1-10. ScholarSpace, (2022)Trustless Blockchain-based Access Control in Dynamic Collaboration., , , and . BDCSIntell, volume 2343 of CEUR Workshop Proceedings, page 27-33. CEUR-WS.org, (2018)WiP Formal Modelling of IT Resource Allocation in Business Processes., , , and . SOCA, page 227-232. IEEE Computer Society, (2018)