Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Life After BPEL?, , , , , and . EPEW/WS-FM, volume 3670 of Lecture Notes in Computer Science, page 35-50. Springer, (2005)Towards Model Transformation between SecureUML and UMLsec for Role-based Access Control., and . DB&IS, volume 224 of Frontiers in Artificial Intelligence and Applications, page 339-352. IOS Press, (2010)Code churn estimation using organisational and code metrics: An experimental comparison., and . Inf. Softw. Technol., 54 (2): 203-211 (2012)Prescriptive Process Monitoring Under Resource Constraints: A Causal Inference Approach., and . ICPM Workshops, volume 433 of Lecture Notes in Business Information Processing, page 180-193. Springer, (2021)Verification of Privacy-Enhanced Collaborations., , , , , and . FormaliSE@ICSE, page 141-152. ACM, (2020)Business Process Analytics: From Insights to Predictions.. DB&IS, volume 838 of Communications in Computer and Information Science, page 15-20. Springer, (2018)Fire now, fire later: alarm-based systems for prescriptive process monitoring., , , , , , and . Knowl. Inf. Syst., 64 (2): 559-587 (2022)Robotic Process Mining: Vision and Challenges., , , , and . Bus. Inf. Syst. Eng., 63 (3): 301-314 (2021)Measuring Fitness and Precision of Automatically Discovered Process Models: A Principled and Scalable Approach., , , , and . IEEE Trans. Knowl. Data Eng., 34 (4): 1870-1888 (2022)Automated Discovery of Process Models with True Concurrency and Inclusive Choices., , and . CoRR, (2021)