Author of the publication

Research on Workflow Patterns Based on jBPM and jPDL.

, and . PACIIA (2), page 838-843. IEEE Computer Society, (2008)978-0-7695-3490-9.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A k-Round Elimination Contention Scheme for WLANs., , and . IEEE Trans. Mob. Comput., 6 (11): 1230-1244 (2007)A Cross-Layer Route Discovery Framework for Mobile Ad Hoc Networks., , , , and . EURASIP J. Wireless Comm. and Networking, 2005 (5): 645-660 (2005)An Algebraic System for Deadlock Detection and its Applications., , and . Symposium on Reliability in Distributed Software and Database Systems, page 177-184. IEEE Computer Society, (1984)The Research on the Modeling Transformation from GBMS to jBPM., and . CSSE (2), page 485-490. IEEE Computer Society, (2008)978-0-7695-3336-0.PCBA: A Priority-Based Competitive Broadcasting Algorithm in Mobile Ad Hoc Networks., , , and . J. Comput. Sci. Technol., 18 (5): 598-606 (2003)Research on Enterprise Modeling of Agile Manufacturing., , and . EDCIS, volume 2480 of Lecture Notes in Computer Science, page 247-256. Springer, (2002)Workflow Mining of More Perspectives of Workflow., and . JSEA, 1 (1): 83-87 (2008)Software Research and Development in China.. IEEE Software, 6 (2): 53-55 (1989)A Trust Management Framework for Detecting Malicious and Selfish Behaviour in Ad-Hoc Wireless Networks Using Fuzzy Sets and Grey Theory., , and . IFIPTM, volume 358 of IFIP Advances in Information and Communication Technology, page 277-289. Springer, (2011)Principle of Deadlock Detection in Ada Programs., , and . ICDCS, page 572-579. IEEE Computer Society, (1986)