Invited talk: Overcoming challenges of reuse in large collections of process models

被引:0
|
作者
University of Innsbruck, Austria [1 ]
机构
来源
Lect. Notes Bus. Inf. Process. | 2013年 / xxxix-xl期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Managing large collections of business process models-Current techniques and challenges
    Dijkman, Remco
    La Rosa, Marcello
    Reijers, Hajo A.
    COMPUTERS IN INDUSTRY, 2012, 63 (02) : 91 - 97
  • [2] Technological Challenges in Autonomous Driving Invited Talk
    Prakash, A. K.
    Venkataraman, Hrishikesh
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON COMMUNICATION AND COMPUTING IN CONNECTED VEHICLES AND PLATOONING (C3VP'18), 2018, : 33 - 33
  • [3] Iterated Shared Memory Models (Invited Talk)
    Raisbaum, Sergio
    LATIN 2010: THEORETICAL INFORMATICS, 2010, 6034 : 407 - 416
  • [4] Invited talk: On the convergence of data and process engineering
    Dumas, M., 2013, Springer Verlag (132 LNBIP):
  • [5] Bioinformatics Challenges in Translational Research (Invited Keynote Talk)
    Tsinoremas, Nicholas F.
    BIOINFORMATICS RESEARCH AND APPLICATIONS, 2009, 5542 : 87 - 87
  • [6] Interactive Analysis of Large Code Bases (Invited Talk)
    Holzmann, Gerard J.
    PROCEEDINGS OF THE 29TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE '21), 2021, : 4 - 4
  • [7] Why automata models are sexy for testers? (Invited talk)
    Petrenko, Alexandre
    Perspectives of Systems Informatics, 2007, 4378 : 26 - 26
  • [8] Challenges for patterning process models applied to large scale
    Sturtevant, John L.
    JOURNAL OF VACUUM SCIENCE & TECHNOLOGY B, 2012, 30 (03):
  • [9] Entropy and Attack Models in Information Flow (Invited Talk)
    Alvim, Mario S.
    Andres, Miguel E.
    Palamidessi, Catuscia
    THEORETICAL COMPUTER SCIENCE, 2010, 323 : 53 - +
  • [10] Entropy and attack models in information flow (invited talk)
    Alvim M.S.
    Andrés M.E.
    Palamidessi C.
    IFIP Advances in Information and Communication Technology, 2010, 323 AICT : 53 - 54