Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Incremental and Decremental Evaluation of Transitive Closure by First-Order Queries, and . Inf. Comput., 120 (1): 101-106 (July 1995)The Vortex Approach to Integration and Coordination of Workflows., and . Cross-Organisational Workflow Management and Co-ordination, volume 17 of CEUR Workshop Proceedings, CEUR-WS.org, (1999)Runtime Enforcement of First-Order LTL Properties on Data-Aware Business Processes., and . ICSOC, volume 8274 of Lecture Notes in Computer Science, page 54-68. Springer, (2013)Academic and Industrial Research: Do Their Approaches Differ in Adding Semantics to Web Services?, , , and . SWSWPC, volume 3387 of Lecture Notes in Computer Science, page 14-21. Springer, (2004)Counter Machines: Decision Problems and Applications., and . Jewels are Forever, page 84-96. Springer, (1999)jBPM4S: A Multi-tenant Extension of jBPM to Support BPaaS., , , , and . AP-BPM, volume 219 of Lecture Notes in Business Information Processing, page 43-56. Springer, (2015)On Bulk Data type Constructors and Manipulation Primitives: A Framework for Analyzing Power and Complexity., and . DBPL, page 396-410. Morgan Kaufmann, (1989)Experimental evaluation evaluation of filter effectiveness (extended abstract)., , and . ACM-GIS, page 189-190. ACM, (2000)E-services: a look behind the curtain., , , and . PODS, page 1-14. ACM, (2003)On automated composition for web services., and . WWW, page 1261-1262. ACM, (2007)