Conference Proceedings

Log- and Model-Based Techniques for Security-Sensitive Tackling of Obstructed Workflow Executions

Julius Holderer, Josep Carmona, Farbod Taymouri, Guenter Mueller, M Koutny, J Kleijn, W Penczek

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | SPRINGER INTERNATIONAL PUBLISHING AG | Published : 2017

Grants

Awarded by European Union (FEDER funds) under grant COMMAS


Funding Acknowledgements

This work has been partially supported by funds from the Spanish Ministry for Economy and Competitiveness (MINECO), the European Union (FEDER funds) under grant COMMAS (ref. TIN2013-46181-C2-1-R).