Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preferential Multi-Agent Nonmonotonic Logics: Preliminary Report., and . KR, page 446-452. Morgan Kaufmann, (1996)Anomaly Detection Algorithms in Business Process Logs., and . ICEIS (2), page 11-18. (2008)Workflow Modeling., and . CRIWG, page 1-13. (1995)Patterns of Collaboration and Non-collaboration Among Physicians., and . CRIWG, volume 3706 of Lecture Notes in Computer Science, page 248-254. Springer, (2005)Tucupi: a flexible workflow system based on overridable constraints., , and . SAC, page 498-502. ACM, (2004)Symgroup: applying social agents in a group interaction system., and . GROUP, page 224-231. ACM, (2001)ST-Audit: guideline-based automatic auditing of electronic patient records., , and . J. Intell. Inf. Syst., 36 (1): 49-72 (2011)Probabilistic Multiagent Patrolling., , and . SBIA, volume 5249 of Lecture Notes in Computer Science, page 124-133. Springer, (2008)Planning for Multi-robot Localization., and . SBIA, volume 6404 of Lecture Notes in Computer Science, page 183-192. Springer, (2010)Breast Density Classification with Convolutional Neural Networks., , , and . CIARP, volume 10125 of Lecture Notes in Computer Science, page 101-108. (2016)