Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting Deadline Transgressions Using Event Logs., , , , and . Business Process Management Workshops, volume 132 of Lecture Notes in Business Information Processing, page 211-216. Springer, (2012)Profiling Event Logs to Configure Risk Indicators for Process Delays., , , , and . CAiSE, volume 7908 of Lecture Notes in Computer Science, page 465-481. Springer, (2013)Mining Resource Profiles from Event Logs., , , , , and . ACM Trans. Manag. Inf. Syst., 8 (1): 1:1-1:30 (2017)Grounding Process Data Analytics in Domain Knowledge: A Mixed-Method Approach to Identifying Best Practice., , , , , , and . BPM Forum, volume 360 of Lecture Notes in Business Information Processing, page 163-179. Springer, (2019)Towards Privacy-Preserving Process Mining in Healthcare., , , , , and . Business Process Management Workshops, volume 362 of Lecture Notes in Business Information Processing, page 483-495. Springer, (2019)