Author of the publication

Is my event log complete? - A probabilistic approach to process mining.

, , and . RCIS, page 1-7. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the relationship between workflow models and document types., , , , and . Inf. Syst., 34 (1): 178-208 (2009)History-based joins: Semantics, soundness and implementation., , , , and . Data Knowl. Eng., 64 (1): 24-37 (2008)PROOFS: Application engineering based on formal methods., , and . Microprocessing and Microprogramming, 35 (1-5): 29-36 (1992)A Framework for the Conceptual Modeling of Discrete Dynamic Systems., and . Temporal Aspects in Information Systems, page 61-75. North-Holland / Elsevier, (1987)Yasper: a tool for workflow modeling and analysis., , , , and . ACSD, page 279-282. IEEE Computer Society, (2006)Checking Properties of Adaptive Workflow Nets., , , , , and . Fundam. Inform., 79 (3-4): 347-362 (2007)Generation of Database Transactions with Petri Nets., , , and . Fundam. Inform., 93 (1-3): 171-184 (2009)Component-based software architectures: a framework based on inheritance of behavior., , and . Sci. Comput. Program., 42 (2-3): 129-171 (2002)"Compositionality of projection inheritance" Sci. Comput. Programming 42 (2-3) (2002) 129-171., , and . Sci. Comput. Program., 44 (3): 343-344 (2002)Transforming Functional Database Schemes to Relational Representations., , and . Specifications of Database Systems, Springer, (1992)