Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Generating Richer Code by Binding Security Abstractions to BPMN Task Types., , , , , , , , , and 1 other author(s). RITA, 16 (2): 97-98 (2009)Identification and Generation of Actions Using Pre-trained Language Models., , , and . WISE, volume 14306 of Lecture Notes in Computer Science, page 674-683. Springer, (2023)iCOP: IoT-Enabled Policing Processes., , , , , , , , and . ICSOC Workshops, volume 11434 of Lecture Notes in Computer Science, page 447-452. Springer, (2018)Galaxy: A Platform for Explorative Analysis of Open Data Sources., , and . EDBT, page 640-643. OpenProceedings.org, (2016)Optimizing cloud solutioning design., , , , , and . Future Gener. Comput. Syst., (2019)Scalable graph-based OLAP analytics over process execution data., , and . Distributed Parallel Databases, 34 (3): 379-423 (2016)DataSynapse: A Social Data Curation Foundry., , , , , and . Distributed Parallel Databases, 37 (3): 351-384 (2019)ProcessGPT: Transforming Business Process Management with Generative Artificial Intelligence., , , , , , , , and . ICWS, page 731-739. IEEE, (2023)Cognitive Assistance at Work.. AAAI Fall Symposia, page 37-40. AAAI Press, (2015)personality2vec: Enabling the Analysis of Behavioral Disorders in Social Networks., , , , , and . WSDM, page 825-828. ACM, (2020)