Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 64 matches
- 2013
- Surafel Lemma Abebe, Paolo Tonella:
Automated Identifier Completion and Replacement. CSMR 2013: 263-272 - Mauricio Finavaro Aniche, Gustavo Ansaldi Oliva, Marco Aurélio Gerosa:
What Do the Asserts in a Unit Test Tell Us about Code Quality? A Study on Open Source and Industrial Projects. CSMR 2013: 111-120 - Venera Arnaoudova, Massimiliano Di Penta, Giuliano Antoniol, Yann-Gaël Guéhéneuc:
A New Family of Software Anti-patterns: Linguistic Anti-patterns. CSMR 2013: 187-196 - M. Waseem Asghar, Alessandro Marchetto, Angelo Susi, Giuseppe Scanniello:
Maintainability-Based Requirements Prioritization by Using Artifacts Traceability and Code Metrics. CSMR 2013: 417-420 - Alessandra Bagnato, Andrey Sadovykh, Etienne Brosse, Tanja E. J. Vos:
The OMG UML Testing Profile in Use-An Industrial Case Study for the Future Internet Testing. CSMR 2013: 457-460 - Veronika Bauer:
Facts and Fallacies of Reuse in Practice. CSMR 2013: 431-434 - Bernhard J. Berger, Karsten Sohr, Rainer Koschke:
Extracting and Analyzing the Implemented Security Architecture of Business Applications. CSMR 2013: 285-294 - Alexander Bergmayr, Hugo Bruneliere, Javier Luis Cánovas Izquierdo, Jesús Gorroñogoitia, George Kousiouris, Dimosthenis Kyriazis, Philip Langer, Andreas Menychtas, Leire Orue-Echevarria Arrieta, Clara Pezuela, Manuel Wimmer:
Migrating Legacy Software to the Cloud with ARTIST. CSMR 2013: 465-468 - Isela Macia Bertran, Alessandro Garcia, Christina Chavez, Arndt von Staa:
Enhancing the Detection of Code Anomalies with Architecture-Sensitive Strategies. CSMR 2013: 177-186 - Pamela Bhattacharya, Liudmila Ulanova, Iulian Neamtiu, Sai Charan Koduru:
An Empirical Analysis of Bug Reports and Bug Fixing in Open Source Android Apps. CSMR 2013: 133-143 - Tegawendé F. Bissyandé, Ferdian Thung, Shaowei Wang, David Lo, Lingxiao Jiang, Laurent Réveillère:
Empirical Evaluation of Bug Linking. CSMR 2013: 89-98 - Markus Borg, Dietmar Pfahl, Per Runeson:
Analyzing Networks of Issue Reports. CSMR 2013: 79-88 - Alessandro Borriello, Fabio Melillo, Gerardo Canfora:
Migrating Android Applications towards Service-centric Architectures with Sip2Share. CSMR 2013: 413-416 - John Businge:
Co-evolution of the Eclipse SDK Framework and Its Third-Party Plug-Ins. CSMR 2013: 427-430 - John Businge, Alexander Serebrenik, Mark van den Brand:
Analyzing the Eclipse API Usage: Putting the Developer in the Loop. CSMR 2013: 37-46 - Hana Chockler, Giovanni Denaro, Meijia Ling, Grigory Fedyukovich, Antti Eero Johannes Hyvärinen, Leonardo Mariani, Ali Muhammad, Manuel Oriol, Ajitha Rajan, Ondrej Sery, Natasha Sharygina, Michael Tautschnig:
PINCETTE - Validating Changes and Upgrades in Networked Software. CSMR 2013: 461-464 - Béla Csaba, Lajos Schrettner, Árpád Beszédes, Judit Jász, Péter Hegedüs, Tibor Gyimóthy:
Relating Clusterization Measures and Software Quality. CSMR 2013: 345-348 - Yael Dubinsky, Julia Rubin, Thorsten Berger, Slawomir Duszynski, Martin Becker, Krzysztof Czarnecki:
An Exploratory Study of Cloning in Industrial Software Product Lines. CSMR 2013: 25-34 - Etienne Duclos, Sébastien Le Digabel, Yann-Gaël Guéhéneuc, Bram Adams:
ACRE: An Automated Aspect Creator for Testing C++ Applications. CSMR 2013: 121-130 - Guy Fitzgerald, Steve Counsell, Jason Peters:
A Study of Web Maintenance in an Industrial Setting. CSMR 2013: 391-394 - Thomas Forster, Thorsten Keuler, Jens Knodel, Michael-Christian Becker:
Recovering Component Dependencies Hidden by Frameworks-Experiences from Analyzing OSGi and Qt. CSMR 2013: 295-304 - Daniel M. Germán, Bram Adams, Ahmed E. Hassan:
The Evolution of the R Software Ecosystem. CSMR 2013: 243-252 - Shadi Ghaith, Miao Wang, Philip Perry, John Murphy:
Profile-Based, Load-Independent Anomaly Detection and Analysis in Performance Regression Testing of Software Systems. CSMR 2013: 379-383 - Fehmi Jaafar, Salima Hassaine, Yann-Gaël Guéhéneuc, Sylvie Hamel, Bram Adams:
On the Relationship between Program Evolution and Fault-Proneness: An Empirical Study. CSMR 2013: 15-24 - Pooyan Jamshidi, Mohammad Ghafari, Aakash Ahmad, Claus Pahl:
A Framework for Classifying and Comparing Architecture-centric Software Evolution Research. CSMR 2013: 305-314 - Kamil Jezek, Lukas Holy, Premek Brada:
Supplying Compiler's Static Compatibility Checks by the Analysis of Third-Party Libraries. CSMR 2013: 375-378 - Hiroshi Kazato, Shinpei Hayashi, Takashi Kobayashi, Tsuyoshi Oshima, Satoshi Okada, Shunsuke Miyata, Takashi Hoshino, Motoshi Saeki:
Incremental Feature Location and Identification in Source Code. CSMR 2013: 371-374 - Pavneet Singh Kochhar, Tegawendé F. Bissyandé, David Lo, Lingxiao Jiang:
Adoption of Software Testing in Open Source Projects-A Preliminary Study on 50, 000 Projects. CSMR 2013: 353-356 - Ahmed Lamkanfi, Serge Demeyer:
Predicting Reassignments of Bug Reports - An Exploratory Investigation. CSMR 2013: 327-330 - Steffen Lehnert, Qurat-ul-ann Farooq, Matthias Riebisch:
Rule-Based Impact Analysis for Heterogeneous Software Artifacts. CSMR 2013: 209-218
skipping 34 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-19 22:30 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint