From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards Model Transformation between SecureUML and UMLsec for Role-based Access Control., и . DB&IS, том 224 из Frontiers in Artificial Intelligence and Applications, стр. 339-352. IOS Press, (2010)Life After BPEL?, , , , , и . EPEW/WS-FM, том 3670 из Lecture Notes in Computer Science, стр. 35-50. Springer, (2005)Robotic Process Mining: Vision and Challenges., , , , и . Bus. Inf. Syst. Eng., 63 (3): 301-314 (2021)Fire now, fire later: alarm-based systems for prescriptive process monitoring., , , , , , и . Knowl. Inf. Syst., 64 (2): 559-587 (2022)Automated Discovery of Process Models with True Concurrency and Inclusive Choices., , и . CoRR, (2021)Measuring Fitness and Precision of Automatically Discovered Process Models: A Principled and Scalable Approach., , , , и . IEEE Trans. Knowl. Data Eng., 34 (4): 1870-1888 (2022)Prescriptive Process Monitoring Under Resource Constraints: A Causal Inference Approach., и . ICPM Workshops, том 433 из Lecture Notes in Business Information Processing, стр. 180-193. Springer, (2021)Scalable and Imbalance-Resistant Machine Learning Models for Anti-money Laundering: A Two-Layered Approach., , , и . FinanceCom, том 401 из Lecture Notes in Business Information Processing, стр. 43-58. Springer, (2020)Learning When to Treat Business Processes: Prescriptive Process Monitoring with Causal Inference and Reinforcement Learning., , , , , и . CAiSE, том 13901 из Lecture Notes in Computer Science, стр. 364-380. Springer, (2023)Code churn estimation using organisational and code metrics: An experimental comparison., и . Inf. Softw. Technol., 54 (2): 203-211 (2012)