Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Model-Independent Error Bound Estimation for Conformance Checking Approximation., , , and . Business Process Management Workshops, volume 492 of Lecture Notes in Business Information Processing, page 369-382. Springer, (2023)Filtering Toolkit: Interactively Filter Event Logs to Improve the Quality of Discovered Models., , , and . BPM (PhD/Demos), volume 2420 of CEUR Workshop Proceedings, page 134-138. CEUR-WS.org, (2019)BIpm: Combining BI and Process Mining., , and . DATA, page 123-128. SciTePress, (2019)Filtering Spurious Events from Event Streams of Business Processes., , , , and . CAiSE, volume 10816 of Lecture Notes in Computer Science, page 35-52. Springer, (2018)Performance-Preserving Event Log Sampling for Predictive Monitoring., , , , , and . CoRR, (2023)Privacy and Confidentiality in Process Mining: Threats and Research Challenges., , , , , , , and . ACM Trans. Manag. Inf. Syst., 13 (1): 11:1-11:17 (2022)Preprocessing event data in process mining.. RWTH Aachen University, Germany, (2023)The Impact of Event Log Subset Selection on the Performance of Process Discovery Algorithms., , and . ADBIS (Short Papers and Workshops), volume 1064 of Communications in Computer and Information Science, page 391-404. Springer, (2019)Improving Process Discovery Results by Filtering Outliers Using Conditional Behavioural Probabilities., , and . Business Process Management Workshops, volume 308 of Lecture Notes in Business Information Processing, page 216-229. Springer, (2017)Cybersecurity Analysis via Process Mining: A Systematic Literature Review., , , and . ADMA, volume 13087 of Lecture Notes in Computer Science, page 393-407. Springer, (2021)