Communicating between the kernel and userspace in Linux using Netlink sockets P NeiraAyuso, RM Gasca, L Lefevre Software: Practice and Experience 40 (9), 797-810, 2010 | 102 | 2010 |
Compliance validation and diagnosis of business data constraints in business processes at runtime MT Gómez-López, RM Gasca, JM Pérez-Álvarez Information Systems 48, 26-43, 2015 | 61 | 2015 |
Diagnosing correctness of semantic workflow models D Borrego, R Eshuis, MT Gómez-López, RM Gasca Data & Knowledge Engineering 87, 167-184, 2013 | 40 | 2013 |
Automating correctness verification of artifact-centric business process models D Borrego, RM Gasca, MT Gómez-López Information and Software Technology 62, 187-197, 2015 | 28 | 2015 |
Towards the automatic and optimal selection of risk treatments for business processes using a constraint programming approach AJ Varela-Vaca, RM Gasca Information and Software Technology 55 (11), 1948-1973, 2013 | 28 | 2013 |
Automatic verification and diagnosis of security risk assessments in business process models ÁJ Varela-Vaca, L Parody, RM Gasca, MT Gómez-López IEEE Access 7, 26448-26465, 2019 | 27 | 2019 |
Afpl, an abstract language model for firewall acls S Pozo, R Ceballos, RM Gasca Computational Science and Its Applications–ICCSA 2008: International …, 2008 | 27 | 2008 |
CyberSPL: a framework for the verification of cybersecurity policy compliance of system configurations using software product lines ÁJ Varela-Vaca, R M. Gasca, R Ceballos, MT Gómez-López, ... Applied Sciences 9 (24), 5364, 2019 | 24 | 2019 |
Developing a labelled object-relational constraint database architecture for the projection operator MT Gómez-López, R Ceballos, RM Gasca, C Del Valle Data & Knowledge Engineering 68 (1), 146-172, 2009 | 24 | 2009 |
Nmus: Structural analysis for improving the derivation of all muses in overconstrained numeric csps RM Gasca, C Del Valle, MT Gómez-López, R Ceballos Conference of the Spanish Association for Artificial Intelligence, 160-169, 2007 | 24 | 2007 |
CSP-based firewall rule set diagnosis using security policies S Pozo, R Ceballos, RM Gasca The Second International Conference on Availability, Reliability and …, 2007 | 24 | 2007 |
Diagnosing errors in dbc programs using constraint programming R Ceballos, RM Gasca, C Del Valle, D Borrego Current Topics in Artificial Intelligence: 11th Conference of the Spanish …, 2006 | 24 | 2006 |
Hybrid business process modeling for the optimization of outcome data L Parody, MT Gómez-López, RM Gasca Information and Software Technology 70, 140-154, 2016 | 20 | 2016 |
Process instance query language to include process performance indicators in DMN JM Perez-Alvarez, MT Gomez-Lopez, L Parody, RM Gasca 2016 IEEE 20th International Enterprise Distributed Object Computing …, 2016 | 19 | 2016 |
FT-FW: A cluster-based fault-tolerant architecture for stateful firewalls PN Ayuso, RM Gasca, L Lefevre computers & security 31 (4), 524-539, 2012 | 18 | 2012 |
Efficient packet filtering in wireless ad hoc networks R Fantacci, L Maccari, PN Ayuso, RM Gasca IEEE Communications Magazine 46 (2), 104-110, 2008 | 18 | 2008 |
Decision-making support for the correctness of input data at runtime in business processes MT Gómez-López, RM Gasca, JM Pérez-Álvarez International Journal of Cooperative Information Systems 23 (04), 1450003, 2014 | 16 | 2014 |
Verifying the manipulation of data objects according to business process and data models JM Pérez-Álvarez, MT Gómez-López, R Eshuis, M Montali, RM Gasca Knowledge and Information Systems 62 (7), 2653-2683, 2020 | 15 | 2020 |
Guiding the creation of choreographed processes with multiple instances based on data models MT Gómez-López, JM Pérez-Álvarez, AJ Varela-Vaca, RM Gasca Business Process Management Workshops: BPM 2016 International Workshops, Rio …, 2017 | 15 | 2017 |
Data state description for the migration to activity-centric business process model maintaining legacy databases MT Gómez-López, D Borrego, RM Gasca Business Information Systems: 17th International Conference, BIS 2014 …, 2014 | 15 | 2014 |