Author of the publication

Design by Selection: A Reuse-Based Approach for Business Process Modeling.

, , , and . ER, volume 6998 of Lecture Notes in Computer Science, page 332-345. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Enclave for TLS Web Server on Untrusted Environment., , , , , and . ICCNS, page 27-31. ACM, (2017)A Fast Process-Variation-Aware Mask Optimization Algorithm With a Novel Intensity Modeling., , , and . IEEE Trans. Very Large Scale Integr. Syst., 25 (3): 998-1011 (2017)Adaptive Mobile Keystroke Dynamic Authentication Using Ensemble Classification Methods., , , and . ISDDC, volume 11317 of Lecture Notes in Computer Science, page 38-49. Springer, (2018)Visual suggestions for improvements in business process diagrams., and . J. Vis. Lang. Comput., 22 (5): 385-399 (2011)Reversible Logic Synthesis Using Binary Decision Diagrams With Exploiting Efficient Reordering Operators., , and . IEEE Access, (2020)C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments., , , and . CAiSE, volume 13901 of Lecture Notes in Computer Science, page 437-453. Springer, (2023)A Decentralised Public Key Infrastructure for X-Road., , , , and . ARES, page 128:1-128:8. ACM, (2023)Benchmarking Concept Drift Detectors for Online Machine Learning., , , and . MEDI, volume 13761 of Lecture Notes in Computer Science, page 43-57. Springer, (2022)RBPSim: A Resource-aware Extension of BPSim Using Workflow Resource Patterns., , and . ZEUS, volume 2072 of CEUR Workshop Proceedings, page 32-39. CEUR-WS.org, (2018)An Iterative Approach for Business Process Template Synthesis from Compliance Rules., , , and . CAiSE, volume 6741 of Lecture Notes in Computer Science, page 406-421. Springer, (2011)