Author of the publication

Constructing Workflow Models from Agent Profiles.

, , , and . ICIS, Association for Information Systems, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis., , and . Inf. Sci., (2014)Enabling effective workflow model reuse: A data-centric approach., , , and . Decis. Support Syst., (2017)Constructing Workflow Models from Agent Profiles., , , and . ICIS, Association for Information Systems, (2012)Relation-Centric Task Identification for Policy-Based Process Mining., , , and . ICIS, page 100. Association for Information Systems, (2008)Introduction to Business Process Intelligence Minitrack., , and . HICSS, page 3857. IEEE Computer Society, (2014)On Risk Management with Information Flows in Business Processes., , , and . Information Systems Research, 24 (3): 731-749 (2013)An Efficient Recommender System Using Locality Sensitive Hashing., , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2018)Supporting process design for e-business via an integrated process repository., and . Information Technology and Management, 12 (2): 97-109 (2011)A policy-based process mining framework: mining business policy texts for discovering process models., , , and . Inf. Syst. E-Business Management, 8 (2): 169-188 (2010)Technology flexibility as enabler of robust application development in community source: The case of Kuali and Sakai., , and . Journal of Systems and Software, 85 (12): 2921-2928 (2012)