Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Code churn estimation using organisational and code metrics: An experimental comparison., and . Inf. Softw. Technol., 54 (2): 203-211 (2012)Dynamic Role Binding in Blockchain-Based Collaborative Business Processes., , , and . CoRR, (2018)Life After BPEL?, , , , , and . EPEW/WS-FM, volume 3670 of Lecture Notes in Computer Science, page 35-50. Springer, (2005)Automated Discovery of Business Process Simulation Models from Event Logs., , and . CoRR, (2019)Towards Model Transformation between SecureUML and UMLsec for Role-based Access Control., and . DB&IS, volume 224 of Frontiers in Artificial Intelligence and Applications, page 339-352. IOS Press, (2010)Fire now, fire later: alarm-based systems for prescriptive process monitoring., , , , , , and . Knowl. Inf. Syst., 64 (2): 559-587 (2022)Learning Accurate Business Process Simulation Models from Event Logs via Automated Process Discovery and Deep Learning., , and . CoRR, (2021)Automated Discovery of Process Models with True Concurrency and Inclusive Choices., , and . CoRR, (2021)Robotic Process Mining: Vision and Challenges., , , , and . Bus. Inf. Syst. Eng., 63 (3): 301-314 (2021)Measuring Fitness and Precision of Automatically Discovered Process Models: A Principled and Scalable Approach., , , , and . IEEE Trans. Knowl. Data Eng., 34 (4): 1870-1888 (2022)