Author of the publication

Time-Bounded Statistical Analysis of Resource-Constrained Business Processes with Distributed Probabilistic Systems.

, , and . SETTA, volume 9984 of Lecture Notes in Computer Science, page 297-314. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BLINKER: A Blockchain-Enabled Framework for Software Provenance., , , and . APSEC, page 1-8. IEEE, (2019)Process diagnostics using trace alignment: Opportunities, issues, and challenges., and . Inf. Syst., 37 (2): 117-141 (2012)Abstractions in Process Mining: A Taxonomy of Patterns., and . BPM, volume 5701 of Lecture Notes in Computer Science, page 159-175. Springer, (2009)CAG: compliance adherence and governance in software delivery using blockchain., , , and . WETSEB@ICSE, page 32-39. IEEE / ACM, (2019)Analyzing Process Variants to Understand Differences in Key Performance Indices., , and . CAiSE, volume 10253 of Lecture Notes in Computer Science, page 298-313. Springer, (2017)Data Mining Approaches to Software Fault Diagnosis., and . RIDE, page 45-52. IEEE Computer Society, (2005)Mining Context-Dependent and Interactive Business Process Maps Using Execution Patterns., , and . Business Process Management Workshops, volume 66 of Lecture Notes in Business Information Processing, page 109-121. Springer, (2010)Adaptive conjugate gradient algorithm for perceptron training., and . Neurocomputing, 69 (4-6): 368-386 (2006)Discovering Hierarchical Process Models Using ProM., , and . CAiSE Forum, volume 734 of CEUR Workshop Proceedings, page 33-40. CEUR-WS.org, (2011)A Knowledge-Based Integrated Approach for Discovering and Repairing Declare Maps., , and . CAiSE, volume 7908 of Lecture Notes in Computer Science, page 433-448. Springer, (2013)