Author of the publication

Process Instance Query Language to Include Process Performance Indicators in DMN.

, , , and . EDOC Workshops, page 1-8. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes., , , , and . CISIS/ICEUTE/SOCO Special Sessions, volume 189 of Advances in Intelligent Systems and Computing, page 13-23. Springer, (2012)ORCDB: Arquitectura para la extensión de la semántica de SQL en bases de datos restrictivas orientadas a objetos con restricciones polinómicas de igualdad., , , and . JISBD, page 221-230. Thomson, (2005)Diagnosing correctness of semantic workflow models., , , and . Data Knowl. Eng., (2013)Data-Oriented Declarative Language for Optimizing Business Processes., , and . ISD, page 59-72. Springer, (2013)Ampliación de la sintaxis y la semántica de SQL para el tratamiento de datos tipo restricción., and . JISBD, page 471-476. (2006)FABIOLA: Defining the Components for Constraint Optimization Problems in Big Data Environment., , , and . ISD, Association for Information Systems, (2017)Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets., , , and . SECURWARE, page 53-61. IEEE Computer Society, (2008)NMUS: Structural Analysis for Improving the Derivation of All MUSes in Overconstrained Numeric CSPs., , , and . CAEPIA, volume 4788 of Lecture Notes in Computer Science, page 160-169. Springer, (2007)Guiding the Creation of Choreographed Processes with Multiple Instances Based on Data Models., , , and . Business Process Management Workshops, volume 281 of Lecture Notes in Business Information Processing, page 239-251. (2016)Formalization of security patterns as a means to infer security controls in business processes., and . Logic Journal of the IGPL, 23 (1): 57-72 (2015)