Author of the publication

Data Protection Risk Modeling into Business Process Analysis.

, , and . ICCSA (1), volume 10404 of Lecture Notes in Computer Science, page 667-676. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Algorithm to Condense Social Networks and Identify Brokers., , and . IBERAMIA, volume 8864 of Lecture Notes in Computer Science, page 331-343. Springer, (2014)Bringing Underused Learning Objects to the Light: A Multi-agent Based Approach., , , , , , , and . EPIA, volume 13566 of Lecture Notes in Computer Science, page 751-763. Springer, (2022)Addressing Low Dimensionality Feature Subset Selection: ReliefF(-k) or Extended Correlation-Based Feature Selection(eCFS)?, , and . SOCO, volume 950 of Advances in Intelligent Systems and Computing, page 251-260. Springer, (2019)Introduction., , , , and . EPIA, volume 3808 of Lecture Notes in Computer Science, page 287-287. Springer, (2005)Subgraph ejection chains and tabu search for the crew scheduling problem., , and . J. Oper. Res. Soc., 50 (6): 608-616 (1999)A Feature Selection Algorithm Based on Heuristic Decomposition., , and . EPIA, volume 10423 of Lecture Notes in Computer Science, page 525-536. Springer, (2017)Integration of UML Diagrams from the Perspective of Enterprise Architecture., , and . WorldCIST (2), volume 1366 of Advances in Intelligent Systems and Computing, page 459-468. Springer, (2021)Knowledge Discovery in the Virtual Social Network Due to Common Knowledge of Proverbs., , and . DMIN, page 213-219. CSREA Press, (2010)An Algorithm to Discover the k-Clique Cover in Networks., , and . EPIA, volume 5816 of Lecture Notes in Computer Science, page 363-373. Springer, (2009)Uplift Modeling Using the Transformed Outcome Approach., and . EPIA, volume 13566 of Lecture Notes in Computer Science, page 623-635. Springer, (2022)