Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resolving Artifact Description Ambiguities During Software Design using Semiotic Agent Modelling., and . ICISO, page 77-86. SciTePress, (2010)Generating Win-Win Strategies for Software Businesses Under Coopetition: A Strategic Modeling Approach., and . ICSOB, volume 336 of Lecture Notes in Business Information Processing, page 90-107. Springer, (2018)Towards autonomic workflow management systems., and . CASCON, page 365-368. IBM, (2006)Requirements trade-offs analysis in the absence of quantitative measures: a heuristic method., and . SAC, page 651-658. ACM, (2011)Representing and Analyzing Enterprise Capabilities as Specialized Actors - A BPM Example., and . ER Workshops, volume 11158 of Lecture Notes in Computer Science, page 217-227. Springer, (2018)A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs., and . ER, volume 4801 of Lecture Notes in Computer Science, page 375-390. Springer, (2007)From Business Models to Service-Oriented Design: A Reference Catalog Approach., and . ER, volume 4801 of Lecture Notes in Computer Science, page 87-101. Springer, (2007)Preface to RIGiM 2009., , , and . ER Workshops, volume 5833 of Lecture Notes in Computer Science, page 243. Springer, (2009)Extracting Conceptual Relationships from Specialized Documents., and . ER, volume 2503 of Lecture Notes in Computer Science, page 232-246. Springer, (2002)Intentional Modeling of Social Media Design Knowledge for Government-Citizen Communication., and . MSM/MUSE, volume 6904 of Lecture Notes in Computer Science, page 20-36. Springer, (2010)