Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Root-Cause Analysis of Design-Time Compliance Violations on the Basis of Property Patterns., , , and . ICSOC, volume 6470 of Lecture Notes in Computer Science, page 17-31. (2010)Meta-Patterns for Electronic Commerce Transactions Based on FLBC., and . HICSS (4), page 261-. IEEE Computer Society, (1998)Formalizing and appling compliance patterns for business process compliance., , , and . Software and Systems Modeling, 15 (1): 119-146 (2016)Leveraging Business Process as a Service with Blueprinting.. CEC, page 225. IEEE Computer Society, (2011)Minitrack Introduction., and . HICSS, IEEE Computer Society, (2006)To Adapt or Not to Adapt, That is the Question.. I-ESA, page 45-54. Springer, (2006)A Methodology to Support Web-Services Development Using Legacy Systems., , and . Engineering Information Systems in the Internet Context, volume 231 of IFIP Conference Proceedings, page 81-103. Kluwer, (2002)Service oriented architectures: approaches, technologies and research issues., and . VLDB J., 16 (3): 389-415 (2007)Top-Down Enterprise Application Integration with Reference Model., , and . EFIS, page 11-22. (2000)Capturing Compliance Requirements: A Pattern-Based Approach., , , and . IEEE Software, 29 (3): 28-36 (2012)