Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defining Access Control Rules with Conditions.. RuleML, volume 6403 of Lecture Notes in Computer Science, page 179-193. Springer, (2010)Core business architecture for a service-oriented enterprise., , , , , , , , , and . IBM Syst. J., 46 (4): 723-742 (2007)Ontology of Dynamic Entities., , , , and . ER, volume 7532 of Lecture Notes in Computer Science, page 345-358. Springer, (2012)SBVR Use Cases.. RuleML, volume 5321 of Lecture Notes in Computer Science, page 182-196. Springer, (2008)Towards a Plug-and-Play B2B Marketing Tool Based on Time-Sensitive Information Extraction., , , , , , and . IEEE SCC, page 821-828. IEEE Computer Society, (2014)Ontologies and Rules in Business Models.. EDOCW, page 149-156. IEEE Computer Society, (2007)Reflections on VM/Pass-Trough: A Facility for Interactive Networking., , and . IBM Syst. J., 22 (1/2): 63-79 (1983)Artifact-Based Transformation of IBM Global Financing., , , , , , , , , and . BPM, volume 5701 of Lecture Notes in Computer Science, page 261-277. Springer, (2009)Business Rule Standards -- Interoperability and Portability., and . Rule Languages for Interoperability, W3C, (2005)The Date-Time Vocabulary., , and . FOIS, volume 239 of Frontiers in Artificial Intelligence and Applications, page 265-378. IOS Press, (2012)