Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 243 matches
- 2013
- Robert Dyer, Hoan Anh Nguyen, Hridesh Rajan, Tien N. Nguyen:
Boa: a language and infrastructure for analyzing ultra-large-scale software repositories. ICSE 2013: 422-431 - Chris Lewis, Zhongpeng Lin, Caitlin Sadowski, Xiaoyan Zhu, Rong Ou, E. James Whitehead Jr.:
Does bug prediction support human developers? findings from a google case study. ICSE 2013: 372-381 - Bram Adams, Christian Bird, Foutse Khomh, Kim Moir:
1st international workshop on release engineering (RELENG 2013). ICSE 2013: 1545-1546 - Mohamed Almorsy, John Grundy, Amani S. Ibrahim:
Automated software architecture security risk analysis using formalized signatures. ICSE 2013: 662-671 - Dalal Alrajeh, Alessandra Russo, James Lockerbie, Neil A. M. Maiden, Alistair Mavin, Mark Novak:
Computational alignment of goals and scenarios for complex systems. ICSE 2013: 1249-1252 - Sven Apel, Alexander von Rhein, Philipp Wendler, Armin Größlinger, Dirk Beyer:
Strategies for product-line verification: case studies and experiments. ICSE 2013: 482-491 - Mark A. Ardis, David Budgen, Gregory W. Hislop, Jeff Offutt, Mark J. Sebern, Willem Visser:
Town hall discussion of SE 2004 revisions (panel). ICSE 2013: 1127 - Luca Ardito:
Energy aware self-adaptation in mobile systems. ICSE 2013: 1435-1437 - Joanne M. Atlee, Robert Baillargeon, Marsha Chechik, Robert B. France, Jeff Gray, Richard F. Paige, Bernhard Rumpe:
5th international workshop on modeling in software engineering (MiSE 2013). ICSE 2013: 1531-1532 - Lerina Aversano, Gerardo Canfora, Giuseppe De Ruvo, Maria Tortorella:
An approach for restructuring text content. ICSE 2013: 1225-1228 - Paris Avgeriou, Janet E. Burge, Jane Cleland-Huang, Xavier Franch, Matthias Galster, Mehdi Mirakhorli, Roshanak Roshandel:
2nd international workshop on the twin peaks of requirements and architecture (TwinPeaks 2013). ICSE 2013: 1556-1557 - Alberto Bacchelli, Christian Bird:
Expectations, outcomes, and challenges of modern code review. ICSE 2013: 712-721 - Hamid Bagheri, Kevin J. Sullivan:
Bottom-up model-driven development. ICSE 2013: 1221-1224 - Kacper Bak, Dina Zayan, Krzysztof Czarnecki, Michal Antkiewicz, Zinovy Diskin, Andrzej Wasowski, Derek Rayside:
Example-driven modeling: model = abstractions + examples. ICSE 2013: 1273-1276 - Vipin Balachandran:
Reducing human effort and improving quality in peer code reviews using automatic static analysis and reviewer recommendation. ICSE 2013: 931-940 - Emilie Balland, Charles Consel, Bernard N'Kaoua, Hélène Sauzéon:
A case for human-driven software development. ICSE 2013: 1229-1232 - Michael Barnett, Martin Nordio, Judith Bishop, Karin Koogan Breitman, Diego Garbervetsky:
3rd international workshop on developing tools as plug-ins (TOPI 2013). ICSE 2013: 1555 - Thomas Bartenstein, Yu David Liu:
Green streams for data-intensive software. ICSE 2013: 532-541 - Gabriele Bavota, Bogdan Dit, Rocco Oliveto, Massimiliano Di Penta, Denys Poshyvanyk, Andrea De Lucia:
An empirical study on the developers' perception of software coupling. ICSE 2013: 692-701 - Olga Baysal:
Informing development decisions: from data to information. ICSE 2013: 1407-1410 - Olga Baysal, Reid Holmes, Michael W. Godfrey:
Situational awareness: personalizing issue tracking systems. ICSE 2013: 1185-1188 - Andrew Begel, Caitlin Sadowski:
2nd international workshop on user evaluations for software engineering researchers (USER 2013). ICSE 2013: 1558-1559 - Jonathan Bell, Nikhil Sarda, Gail E. Kaiser:
Chronicler: lightweight recording to reproduce field failures. ICSE 2013: 362-371 - Stephany Bellomo, Robert L. Nord, Ipek Ozkaya:
A study of enabling factors for rapid fielding: combined practices to balance speed and stability. ICSE 2013: 982-991 - Ivan Beschastnikh, Yuriy Brun, Jenny Abrahamson, Michael D. Ernst, Arvind Krishnamurthy:
Unifying FSM-inference algorithms through declarative specification. ICSE 2013: 252-261 - Nicolas Bettenburg, Andrew Begel:
Deciphering the story of software development through frequent pattern mining. ICSE 2013: 1197-1200 - Domenico Bianculli, Patricia Lago, Grace A. Lewis, Hye-Young Paik:
5th international workshop on principles of engineering service-oriented systems (PESOS 2013). ICSE 2013: 1539-1540 - Christian Bird, Tim Menzies, Thomas Zimmermann:
1st international workshop on data analysis patterns in software engineering (DAPSE 2013). ICSE 2013: 1517-1518 - Dale Blue, Itai Segall, Rachel Tzoref-Brill, Aviad Zlotnick:
Interaction-based test-suite minimization. ICSE 2013: 182-191 - Marcel Böhme, Bruno C. d. S. Oliveira, Abhik Roychoudhury:
Partition-based regression verification. ICSE 2013: 302-311
skipping 213 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 02:33 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint