Author of the publication

An Integrated Collection of Tools for Continuously Improving the Processes by Which Health Care Is Delivered: A Tool Report.

, , and . Business Process Management Workshops, volume 43 of Lecture Notes in Business Information Processing, page 647-653. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ada-Based support for programming-in-the-Large., , and . IEEE Software, 2 (2): 58-71 (1985)A Compact Petri Net Representation and Its Implications for Analysis., and . IEEE Trans. Software Eng., 22 (11): 794-811 (1996)The AdaPIC Tool Set: Supporting Interface Control and Analysis Throughout the Software Development Process., , and . IEEE Trans. Software Eng., 15 (3): 250-263 (1989)A System to Generate Test Data and Symbolically Execute Programs.. IEEE Trans. Software Eng., 2 (3): 215-222 (1976)Extending and Limiting PGraphite-style Persistence., , and . POS, page 74-86. Morgan Kaufmann, (1990)Insider Threat Identification by Process Analysis., , , , , , , and . IEEE Symposium on Security and Privacy Workshops, page 251-264. IEEE Computer Society, (2014)Specifying and verifying requirements for election processes., , , and . DG.O, volume 289 of ACM International Conference Proceeding Series, page 63-72. Digital Government Research Center, (2008)A Comparison of Data Flow Path Selection Criteria., , , and . ICSE, page 244-251. IEEE Computer Society, (1985)The Right Algorithm at the Right Time: Comparing Data Flow Analysis Algorithms for Finite State Verification., , and . ICSE, page 37-46. IEEE Computer Society, (2001)Considerations for online deviation detection in medical processes., , and . SEHC@ICSE, page 50-56. IEEE Computer Society, (2013)