default search action
Yongsun Choi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c16]Thomas M. Prinz, Yongsun Choi, N. Long Ha:
Understanding and Decomposing Control-Flow Loops in Business Process Models. BPM 2022: 307-323 - 2020
- [j5]Yongsun Choi, N. Long Ha, Pauline Kongsuwan, Kwan Hee Han:
An alternative method for refined process structure trees (RPST). Bus. Process. Manag. J. 26(2): 613-629 (2020) - [c15]Thi Thuy Phan, Ho-Pun Lam, Mustafa Hashmi, Yongsun Choi:
Towards Construction of Legal Ontology for Korean Legislation. KEOD 2020: 86-97
2010 – 2019
- 2015
- [j4]Yongsun Choi, Pauline Kongsuwan, Cheol Min Joo, J. Leon Zhao:
Stepwise structural verification of cyclic workflow models with acyclic decomposition and reduction of loops. Data Knowl. Eng. 95: 39-65 (2015) - 2011
- [j3]Hoai-Vu Nguyen, Sangmun Shin, Yongsun Choi:
An integrated approach to the optimal selection of security tools using analytic hierarchy process and goal programming. Int. J. Technol. Manag. 54(2/3): 229-251 (2011)
2000 – 2009
- 2008
- [c14]Le Yang, Yongsun Choi, Myeonggil Choi, Xinlei Zhao:
FWAM: A flexible workflow authorization model using extended RBAC. CSCWD 2008: 625-629 - [c13]Le Yang, Yongsun Choi, Jinyoung Jang:
API and Component Based Customization of an Open Source Business Process Management System: uEngine. NCM (2) 2008: 226-231 - 2007
- [j2]Seung-Hyun Rhee, Hyerim Bae, Yongsun Choi:
Enhancing the efficiency of supply chain processes through web services. Inf. Syst. Frontiers 9(1): 103-118 (2007) - [c12]Le Yang, Yongsun Choi:
A Flexible Access Control Model for Dynamic Workflow Using Extended WAM and RBAC. CSCWD (Selected Papers) 2007: 488-497 - [c11]Yonghee Lee, Sangmun Shin, Yongsun Choi, Sang Do Lee:
Development of a Job Stress Evaluation Methodology Using Data Mining and RSM. ICOST 2007: 226-237 - [c10]Le Yang, Yongsun Choi, Changjun Seo, Tongfeng Yang, MinSung Kim:
Design of VY: A Mini Visual IDE for the Development of GUI in Embedded Devices. SERA 2007: 625-632 - 2006
- [c9]Yongsun Choi, Xinlei Zhao, Kwanhee Han:
Hierarchical Reachability Analysis for Workflow-Nets. CSCWD 2006: 556-561 - [c8]Sangmun Shin, Yi Guo, Yongsun Choi, Myeonggil Choi, Charles Kim:
Development of a Robust Data Mining Method Using CBFS and RSM. Ershov Memorial Conference 2006: 377-388 - 2005
- [c7]Yongsun Choi, J. Leon Zhao:
Decomposition-Based Verification of Cyclic Workflows. ATVA 2005: 84-98 - 2004
- [j1]Jinyoung Jang, Yongsun Choi, J. Leon Zhao:
An Extensible Workflow Architecture through Web Services. Int. J. Web Serv. Res. 1(2): 1-15 (2004) - [c6]Xinlei Zhao, Yongsun Choi:
Hierarchical Structuring of a Workflow Model in Petri-Net. ICEB 2004: 117-121 - [c5]Yongsun Choi:
A Two Phase Verification Algorithm for Cyclic Workflow Graphs. ICEB 2004: 137-143 - [c4]Jinyoung Jang, Yongsun Choi:
Web Service Based Universal Management of Workflow Resources. ICEB 2004: 452-459 - [c3]Yongsun Choi, J. Leon Zhao:
Feedback Partitioning and Decomposition-Oriented Analysis of Cyclic Workflow Graphs. OTM Workshops 2004: 17-18 - 2003
- [c2]Jinyoung Jang, Yongsun Choi, J. Leon Zhao:
Adaptive Workflow Management with Open Kernel Framework Based on Web Services. ICWS 2003: 124-130 - [c1]Yongsun Choi, J. Leon Zhao:
Handling Cycles in Workflow Verification by Feedback Identification and Partition. IKE 2003: 337-343
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint