Author of the publication

Discovering Activities from Emails Based on Pattern Discovery Approach.

, , , , and . BPM (Forum), volume 392 of Lecture Notes in Business Information Processing, page 88-104. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain's Fame Reaches the Execution of Personalized Touristic Itineraries., , , , , and . WETICE, page 186-191. IEEE, (2019)Detecting Temporal Anomaly and Interestingness in Timed Business Process Models., , , and . ICWS, page 418-422. IEEE, (2020)Discovering Workflow Patterns from Timed Logs., , and . EMISA, volume P-56 of LNI, page 84-94. GI, (2004)Discovering Guard Stage Milestone Models Through Hierarchical Clustering., , , , and . CoopIS, volume 14353 of Lecture Notes in Computer Science, page 239-256. Springer, (2023)Random-Value Payment Tokens for On-Chain Privacy-Preserving Payments., , , , , and . CoopIS, volume 13591 of Lecture Notes in Computer Science, page 223-241. Springer, (2022)Cross-Collaboration Processes based on Blockchain and IoT: a survey., , , , and . HICSS, page 1-10. ScholarSpace, (2021)Blockchain logging for process mining: a systematic review., , , and . HICSS, page 1-10. ScholarSpace, (2022)Trustless Blockchain-based Access Control in Dynamic Collaboration., , , and . BDCSIntell, volume 2343 of CEUR Workshop Proceedings, page 27-33. CEUR-WS.org, (2018)Learning a Configurable Deployment Descriptors Model in NFV., , , and . NOMS, page 1-9. IEEE, (2020)Model-Driven Orchestration for Cloud Resources., , , , and . CLOUD, page 422-429. IEEE, (2019)