Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lessons learned using a process mining approach to analyze events from distributed applications., , , , , and . DEBS, page 199-204. ACM, (2016)The XCAT Science Portal, , , , , , , , , and 1 other author(s). Scientific Programming, 10 (4): 303---317 (December 2002)IF 0.967.Business Control Management - A Discipline to Ensure Regulatory Compliance of SOA Applications., , , and . Business Process Management Workshops, volume 66 of Lecture Notes in Business Information Processing, page 652-666. Springer, (2010)The Future of Computing is Boring (and that is exciting!)., , and . IC2E, page 97-101. IEEE, (2019)Performance Comparison of Security Mechanisms for Grid Services., , , and . GRID, page 360-364. IEEE Computer Society, (2004)Asynchronous Peer-to-PeerWeb Services and Firewalls., , , and . IPDPS, IEEE Computer Society, (2005)A Business Centric End-to-End Monitoring Approach for Service Composites., , , , and . IEEE SCC, page 409-416. IEEE Computer Society, (2010)Discovering event correlation rules for semi-structured business processes., , and . DEBS, page 75-86. ACM, (2011)On Building Parallel and Grid Applications: Component Technology and Distributed Services, , , , , and . International Workshop on Challenges of Large Applications in Distributed Environments (CLADE), page 44--51. IEEE, (2004)CORE C.Serverless End Game: Disaggregation enabling Transparency., , , , and . SESAME@EuroSys, page 9-14. ACM, (2024)