Author of the publication

Introducing the Guard-Stage-Milestone Approach for Specifying Business Entity Lifecycles.

, , , , , , , , , , and . WS-FM, volume 6551 of Lecture Notes in Computer Science, page 1-24. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The ACSI Hub: A Data-centric Environment for Service Interoperation., , , , , , and . BPM (Demos), volume 1295 of CEUR Workshop Proceedings, page 11. CEUR-WS.org, (2014)Introducing the Guard-Stage-Milestone Approach for Specifying Business Entity Lifecycles., , , , , , , , , and 1 other author(s). WS-FM, volume 6551 of Lecture Notes in Computer Science, page 1-24. Springer, (2010)Barcelona: A Design and Runtime Environment for Declarative Artifact-Centric BPM., , , , , , and . ICSOC, volume 8274 of Lecture Notes in Computer Science, page 705-709. Springer, (2013)Business artifacts with guard-stage-milestone lifecycles: managing artifact interactions with conditions and events., , , , , , , , , and 2 other author(s). DEBS, page 51-62. ACM, (2011)Telecommunication infrastructure for smart cities: Identifying driving factors and design policies., , and . ICEGOV, page 509-516. ACM, (2018)Smart mobility: Crowdsourcing solutions for smart transport system in smart cities context., , and . ICEGOV, page 482-488. ACM, (2018)Digitized Residential Address System: A Necessity Towards the Faster Service Delivery and Smart Cities Development in India., , , and . I3E, volume 10595 of Lecture Notes in Computer Science, page 434-441. Springer, (2017)The Social Media Cone: Towards Achieving the Manufacturing Competitiveness Goals., , , and . I3E, volume 9844 of Lecture Notes in Computer Science, page 53-58. Springer, (2016)Realizing digital identity in government: Prioritizing design and implementation objectives for Aadhaar in India., , , , and . Gov. Inf. Q., 37 (2): 101442 (2020)Cybersecurity training for Web Applications through Serious Games., , , , , , and . TALE, page 390-398. IEEE, (2021)