Author of the publication

Semantic Support for Security-Annotated Business Process Models.

, , , , , , , and . BMMDS/EMMSAD, volume 81 of Lecture Notes in Business Information Processing, page 284-298. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Early warning monitoring and management of disasters., , and . IGARSS, page 2996-2999. IEEE, (2007)A New System for Interactive Demonstration in Distance Education - The Research and Design of the Smart Classroom based on Blending Reality., , and . GrC, page 121-124. IEEE, (2008)A Heuristic Q-Learning Architecture for Fully Exploring a World and Deriving an Optimal Policy by Model-Based Planning., , and . ICRA, page 2078-2083. IEEE Robotics and Automation Society, (1999)Code Definition Analysis for Call Graph Generation., , , , , and . CoRR, (2016)A Novel Grid Based K-Means Cluster Method for Traffic Zone Division., , and . CloudCom-Asia, volume 9106 of Lecture Notes in Computer Science, page 165-178. Springer, (2015)Increasing temporal diversity with purchase intervals., , , and . SIGIR, page 165-174. ACM, (2012)Utilizing Purchase Intervals in Latent Clusters for Product Recommendation., , and . SNAKDD, page 4:1-4:9. ACM, (2014)Sensitivity analysis of correlated outputs and its application to a dynamic model., , , , and . Environ. Model. Softw., (2018)Comparison and regulation of neuronal synchronization for various STDP rules, and . Neural Plast, (January 2009)Target Localization and Tracking in Noisy Binary Sensor Networks with Known Spatial Topology., , and . ICASSP (2), page 1029-1032. IEEE, (2007)