Author of the publication

A Goal-Oriented Methodology for Treatment of Patients with Multimorbidity - Goal Comorbidities (GoCom) Proof-of-Concept Demonstration.

, , , , , and . AIME, volume 13263 of Lecture Notes in Computer Science, page 426-430. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Executable Knowledge., and . Encyclopedia of Database Systems (2nd ed.), Springer, (2018)Workflow Management Systems.. Encyclopedia of Database Systems (2nd ed.), Springer, (2018)From Object-Process Diagrams to a Natural Object-Process Language., and . NGITS, volume 1649 of Lecture Notes in Computer Science, page 221-228. Springer, (1999)Sharable Appropriateness Criteria in GLIF3 Using Standards and the Knowledge-Data Ontology Mapper.. KR4HC, volume 5943 of Lecture Notes in Computer Science, page 64-75. Springer, (2009)Lessons Learned from Adapting a Generic Narrative Diabetic-Foot Guideline to an Institutional Decision-Support System., , , , and . Computer-based Medical Guidelines and Protocols, volume 139 of Studies in Health Technology and Informatics, IOS Press, (2008)Declarative and Procedural Approaches for Modelling Clinical Guidelines: Addressing Flexibility Issues., , , and . Business Process Management Workshops, volume 4928 of Lecture Notes in Computer Science, page 335-346. Springer, (2007)Learning Business Process Models: A Case Study., , and . Business Process Management Workshops, volume 4928 of Lecture Notes in Computer Science, page 383-394. Springer, (2007)Using OWL and SWRL to represent and reason with situation-based access control policies., and . Data Knowl. Eng., 70 (6): 596-615 (2011)Research Paper: Comparing Computer-interpretable Guideline Models: A Case-study Approach., , , , , , , , , and 5 other author(s). J. Am. Medical Informatics Assoc., 10 (1): 52-68 (2003)How to Detect and Exploit Non-Adherence to Guidelines?, , , and . MedInfo, volume 192 of Studies in Health Technology and Informatics, page 1239. IOS Press, (2013)