

Author: van der Aalst Wil M. P. Reijers Hajo A. Song Minseok
Publisher: Springer Publishing Company
ISSN: 0925-9724
Source: Computer Supported Cooperative Work (CSCW), Vol.14, Iss.6, 2005-12, pp. : 549-593
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content










Mining Users' Intents from Logs
International Journal of Information System Modeling and Design (IJISMD), Vol. 6, Iss. 2, 2015-04 ,pp. :