Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Specifying and verifying requirements for election processes., , , and . DG.O, volume 289 of ACM International Conference Proceeding Series, page 63-72. Digital Government Research Center, (2008)Insider Threat Identification by Process Analysis., , , , , , , and . IEEE Symposium on Security and Privacy Workshops, page 251-264. IEEE Computer Society, (2014)Simulating patient flow through an Emergency Department using process-driven discrete event simulation., , , , and . SEHC@ICSE, page 73-83. IEEE Computer Society, (2009)A Comparison of Data Flow Path Selection Criteria., , , and . ICSE, page 244-251. IEEE Computer Society, (1985)The Right Algorithm at the Right Time: Comparing Data Flow Analysis Algorithms for Finite State Verification., , and . ICSE, page 37-46. IEEE Computer Society, (2001)Considerations for online deviation detection in medical processes., , and . SEHC@ICSE, page 50-56. IEEE Computer Society, (2013)Extending and Limiting PGraphite-style Persistence., , and . POS, page 74-86. Morgan Kaufmann, (1990)Ada-Based support for programming-in-the-Large., , and . IEEE Software, 2 (2): 58-71 (1985)Process Technology to Facilitate the Conduct of Science., , , , , , and . ISPW, volume 3840 of Lecture Notes in Computer Science, page 403-415. Springer, (2005)Smart checklists to improve healthcare outcomes., , , , , and . SEHS@ICSE, page 54-57. ACM, (2016)