Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Code churn estimation using organisational and code metrics: An experimental comparison., and . Inf. Softw. Technol., 54 (2): 203-211 (2012)Life After BPEL?, , , , , and . EPEW/WS-FM, volume 3670 of Lecture Notes in Computer Science, page 35-50. Springer, (2005)Towards Model Transformation between SecureUML and UMLsec for Role-based Access Control., and . DB&IS, volume 224 of Frontiers in Artificial Intelligence and Applications, page 339-352. IOS Press, (2010)Measuring Fitness and Precision of Automatically Discovered Process Models: A Principled and Scalable Approach., , , , and . IEEE Trans. Knowl. Data Eng., 34 (4): 1870-1888 (2022)Fire now, fire later: alarm-based systems for prescriptive process monitoring., , , , , , and . Knowl. Inf. Syst., 64 (2): 559-587 (2022)Automated Discovery of Process Models with True Concurrency and Inclusive Choices., , and . CoRR, (2021)Robotic Process Mining: Vision and Challenges., , , , and . Bus. Inf. Syst. Eng., 63 (3): 301-314 (2021)Business Process Analytics: From Insights to Predictions.. DB&IS, volume 838 of Communications in Computer and Information Science, page 15-20. Springer, (2018)Verification of Privacy-Enhanced Collaborations., , , , , and . FormaliSE@ICSE, page 141-152. ACM, (2020)Prescriptive Process Monitoring Under Resource Constraints: A Causal Inference Approach., and . ICPM Workshops, volume 433 of Lecture Notes in Business Information Processing, page 180-193. Springer, (2021)