Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Temporal Anomaly and Interestingness in Timed Business Process Models., , , and . ICWS, page 418-422. IEEE, (2020)Blockchain's Fame Reaches the Execution of Personalized Touristic Itineraries., , , , , and . WETICE, page 186-191. IEEE, (2019)Natural language querying of process execution data., , , , , and . Inf. Syst., (June 2023)Optimal business process deployment cost in cloud resources., , , and . J. Supercomput., 77 (2): 1579-1611 (2021)Conformance checking for autonomous multi-cloud SLA management and adaptation., , , and . J. Supercomput., 78 (11): 13004-13039 (2022)Discovering Workflow Patterns from Timed Logs., , and . EMISA, volume P-56 of LNI, page 84-94. GI, (2004)Discovering Guard Stage Milestone Models Through Hierarchical Clustering., , , , and . CoopIS, volume 14353 of Lecture Notes in Computer Science, page 239-256. Springer, (2023)Random-Value Payment Tokens for On-Chain Privacy-Preserving Payments., , , , , and . CoopIS, volume 13591 of Lecture Notes in Computer Science, page 223-241. Springer, (2022)Blockchain logging for process mining: a systematic review., , , and . HICSS, page 1-10. ScholarSpace, (2022)Cross-Collaboration Processes based on Blockchain and IoT: a survey., , , , and . HICSS, page 1-10. ScholarSpace, (2021)