Author of the publication

Generating Event Logs Through the Simulation of Declare Models.

, , , and . EOMAS@CAiSE, volume 231 of Lecture Notes in Business Information Processing, page 20-36. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discovering cross-organizational business rules from the cloud., , and . CIDM, page 389-396. IEEE, (2014)Early Detection of Parkinson Disease using Deep Neural Networks on Gait Dynamics., , , and . IJCNN, page 1-8. IEEE, (2020)Evaluating coding behavior in software development processes: a process mining approach., , , and . ICSSP, page 84-93. IEEE / ACM, (2019)A Multi-source Machine Learning Approach to Predict Defect Prone Components., , and . ICSOFT, page 306-313. SciTePress, (2018)Improving Design Patterns Finder Precision Using a Model Checking Approach., , , , and . CAiSE Forum, volume 1367 of CEUR Workshop Proceedings, page 113-120. CEUR-WS.org, (2015)Technical Debt predictive model through Temporal Convolutional Network., , , and . IJCNN, page 1-8. IEEE, (2021)Model-driven detection of Design Patterns., and . ICSM, page 1-5. IEEE Computer Society, (2010)Recovering conceptual models from web applications., , and . SIGDOC, page 113-120. ACM, (2006)Data-Aware Declarative Process Mining for Malware Detection., , , and . IJCNN, page 1-8. IEEE, (2020)A model-driven graph-matching approach for design pattern detection., , and . WCRE, page 172-181. IEEE Computer Society, (2013)