Author of the publication

Generating Event Logs Through the Simulation of Declare Models.

, , , and . EOMAS@CAiSE, volume 231 of Lecture Notes in Business Information Processing, page 20-36. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multi-source Machine Learning Approach to Predict Defect Prone Components., , and . ICSOFT, page 306-313. SciTePress, (2018)Evaluating coding behavior in software development processes: a process mining approach., , , and . ICSSP, page 84-93. IEEE / ACM, (2019)Discovering cross-organizational business rules from the cloud., , and . CIDM, page 389-396. IEEE, (2014)Early Detection of Parkinson Disease using Deep Neural Networks on Gait Dynamics., , , and . IJCNN, page 1-8. IEEE, (2020)Technical Debt predictive model through Temporal Convolutional Network., , , and . IJCNN, page 1-8. IEEE, (2021)Model-driven detection of Design Patterns., and . ICSM, page 1-5. IEEE Computer Society, (2010)Improving Design Patterns Finder Precision Using a Model Checking Approach., , , , and . CAiSE Forum, volume 1367 of CEUR Workshop Proceedings, page 113-120. CEUR-WS.org, (2015)Web applications design evolution with UWA., , , and . WSE, page 3-12. IEEE Computer Society, (2010)A model-driven graph-matching approach for design pattern detection., , and . WCRE, page 172-181. IEEE Computer Society, (2013)Data-Aware Declarative Process Mining for Malware Detection., , , and . IJCNN, page 1-8. IEEE, (2020)