Author of the publication

Towards a Formalization of Individual Work Execution at Computer Workplaces

, , , and . Proceedings of the 19th International Conference on Conceptual Structures (ICCS 2011), volume 6828 of Lecture Notes in Computer Science, page 270-283. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DeepAlign: Alignment-based Process Anomaly Correction using Recurrent Neural Networks., , , and . CoRR, (2019)EdgeBox: Confidential Ad-Hoc Personalization of Nearby IoT Applications., , and . GLOBECOM, page 1-6. IEEE, (2019)Relative Stability of the Planar and Butterfly-like Structures of Cyclic P2O2, , , , and . The Journal of Physical Chemistry, 100 (1): 120--122 (January 1996)Einfluß der Ladungsverteilung auf die Bindungslängen im P4O6-Gerüst von Verbindungen des Typs P4O6X, , , , , and . Angewandte Chemie, 106 (5): 578--581 (March 1994)IoT dataset generation framework for evaluating anomaly detection mechanisms., , , and . ARES, page 30:1-30:6. ACM, (2020)Human Physical Status detection related to Danger Situations based on Smartwatch and Smartphone., , and . Networking, page 564-568. IEEE, (2020)A systematic approach to constructing families of incremental topology control algorithms using graph transformation., , , , , and . Softw. Syst. Model., 18 (1): 279-319 (2019)Manifestation of virtual assistants and robots into daily life: vision and challenges., , , , , , and . CCF Trans. Pervasive Comput. Interact., 1 (3): 163-174 (2019)On generating network traffic datasets with synthetic attacks for intrusion detection., , , , and . CoRR, (2019)Efficient privacy-preserving recommendations based on social graphs., , , and . RecSys, page 78-86. ACM, (2019)