Author of the publication

Introducing the Guard-Stage-Milestone Approach for Specifying Business Entity Lifecycles.

, , , , , , , , , , and . WS-FM, volume 6551 of Lecture Notes in Computer Science, page 1-24. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Facilitating Workflow Interoperation Using Artifact-Centric Hubs., , and . ICSOC/ServiceWave, volume 5900 of Lecture Notes in Computer Science, page 1-18. (2009)A Framework for Understanding Distributed (Deadlock Detection) Algorithms., , , and . PODS, page 192-202. ACM, (1983)Evaluation of IT Portfolio Options by Linking to Business Services., , , and . DEECS, volume 4055 of Lecture Notes in Computer Science, page 66-80. Springer, (2006)Artifact-Based Transformation of IBM Global Financing., , , , , , , , , and . BPM, volume 5701 of Lecture Notes in Computer Science, page 261-277. Springer, (2009)Qualitative Astrophysics., and . ECAI, page 470-472. (1990)Business artifacts: An approach to operational specification., and . IBM Syst. J., 42 (3): 428-445 (2003)A Model and Proof Technique for Message-Based Systems., and . SIAM J. Comput., 9 (4): 768-784 (1980)Modeling Business Services for Implementing on Global Business Services Delivery Platforms., and . CEC/EEE, page 577-583. IEEE Computer Society, (2007)Core business architecture for a service-oriented enterprise., , , , , , , , , and . IBM Syst. J., 46 (4): 723-742 (2007)Artifact-centered operational modeling: Lessons from customer engagements., , , , and . IBM Syst. J., 46 (4): 703-721 (2007)