Author of the publication

Introducing the Guard-Stage-Milestone Approach for Specifying Business Entity Lifecycles.

, , , , , , , , , , and . WS-FM, volume 6551 of Lecture Notes in Computer Science, page 1-24. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Core business architecture for a service-oriented enterprise., , , , , , , , , and . IBM Syst. J., 46 (4): 723-742 (2007)Defining Access Control Rules with Conditions.. RuleML, volume 6403 of Lecture Notes in Computer Science, page 179-193. Springer, (2010)Ontology of Dynamic Entities., , , , and . ER, volume 7532 of Lecture Notes in Computer Science, page 345-358. Springer, (2012)SBVR Use Cases.. RuleML, volume 5321 of Lecture Notes in Computer Science, page 182-196. Springer, (2008)Towards a Plug-and-Play B2B Marketing Tool Based on Time-Sensitive Information Extraction., , , , , , and . IEEE SCC, page 821-828. IEEE Computer Society, (2014)Ontologies and Rules in Business Models.. EDOCW, page 149-156. IEEE Computer Society, (2007)Artifact-Based Transformation of IBM Global Financing., , , , , , , , , and . BPM, volume 5701 of Lecture Notes in Computer Science, page 261-277. Springer, (2009)Reflections on VM/Pass-Trough: A Facility for Interactive Networking., , and . IBM Syst. J., 22 (1/2): 63-79 (1983)Business Rule Standards -- Interoperability and Portability., and . Rule Languages for Interoperability, W3C, (2005)The Date-Time Vocabulary., , and . FOIS, volume 239 of Frontiers in Artificial Intelligence and Applications, page 265-378. IOS Press, (2012)