Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 40 matches
- 2011
- Mathieu Acher, Philippe Collet, Philippe Lahire, Sabine Moisan, Jean-Paul Rigault:
Modeling Variability from Requirements to Runtime. ICECCS 2011: 77-86 - Morayo Adedjouma, Hubert Dubois, François Terrier:
Requirements Exchange: From Specification Documents to Models. ICECCS 2011: 350-354 - Adil Anwar, Taoufiq Dkaki, Sophie Ebersold, Bernard Coulette, Mahmoud Nassar:
A Formal Approach to Model Composition Applied to VUML. ICECCS 2011: 188-197 - Luciano Baresi, Matteo Miraz:
A Component-Oriented Metamodel for the Modernization of Software Applications. ICECCS 2011: 179-187 - Moris Behnam, Thomas Nolte, Reinder J. Bril:
Tighter Schedulability Analysis of Synchronization Protocols Based on Overrun without Payback for Hierarchical Scheduling Frameworks. ICECCS 2011: 35-44 - Julien Bertrane:
Temporal Abstract Domains. ICECCS 2011: 3-12 - Adam Betts, Amine Marref:
WCET Analysis of Component-Based Systems Using Timing Traces. ICECCS 2011: 13-22 - Stefan Björnander, Cristina Cerschi Seceleanu, Kristina Lundqvist, Paul Pettersson:
ABV - A Verifier for the Architecture Analysis and Design Language (AADL). ICECCS 2011: 355-360 - Wassim El Hajj Chehade, Ansgar Radermacher, François Terrier, Bran Selic, Sébastien Gérard:
A Model-Driven Framework for the Development of Portable Real-Time Embedded Systems. ICECCS 2011: 45-54 - Arbi Ghazarian, Mehdi Sagheb-Tehrani, Arin Ghazarian:
A Software Requirements Specification Framework for Objective Pattern Recognition: A Set-Theoretic Classification Approach. ICECCS 2011: 211-220 - Sylvain Hallé:
Model-Based Simulation of SOAP Web Services from Temporal Logic Specifications. ICECCS 2011: 95-104 - Myron Hecht, Alexander Lam, Chris Vogl:
A Tool Set for Integrated Software and Hardware Dependability Analysis Using the Architecture Analysis and Design Language (AADL) and Error Model Annex. ICECCS 2011: 361-366 - Marko Ikonen, Elena Pirinen, Fabian Fagerholm, Petri Kettunen, Pekka Abrahamsson:
On the Impact of Kanban on Software Project Work: An Empirical Case Study Investigation. ICECCS 2011: 305-314 - Sven Jörges, Bernhard Steffen:
Leveraging Service-Orientation for Combining Code Generation Frameworks. ICECCS 2011: 198-207 - Muhammad Ashad Kabir, Jun Han, Alan W. Colman:
Modeling and Coordinating Social Interactions in Pervasive Environments. ICECCS 2011: 243-252 - Fatemeh Kazemeyni, Einar Broch Johnsen, Olaf Owe, Ilangko Balasingham:
Group Selection by Nodes in Wireless Sensor Networks Using Coalitional Game Theory. ICECCS 2011: 253-262 - Alexey V. Khoroshilov, Igor Koverninskiy, Alexander K. Petrenko, Alexander Ugnenko:
Integrating AADL-Based Tool Chain into Existing Industrial Processes. ICECCS 2011: 367-371 - Gilles Lasnier, Laurent Pautet, Jérôme Hugues, Lutz Wrage:
An Implementation of the Behavior Annex in the AADL-Toolset Osate2. ICECCS 2011: 332-337 - David Lo, Shahar Maoz:
Towards Succinctness in Mining Scenario-Based Specifications. ICECCS 2011: 231-240 - Russell Lock:
Modelling and Analysing Standard Use within System of Systems. ICECCS 2011: 149-156 - Lunjin Lu, Dae-Kyoo Kim:
Required Behavior of Sequence Diagrams: Semantics and Refinement. ICECCS 2011: 127-136 - Amine Marref, Adam Betts:
Memory Positioning of Real-Time Code for Smaller Worst-Case Execution Times. ICECCS 2011: 23-32 - Abderrahman Matoussi, Frédéric Gervais, Régine Laleau:
A Goal-Based Approach to Guide the Design of an Abstract Event-B Specification. ICECCS 2011: 139-148 - Leonardo Montecchi, Paolo Lollini, Andrea Bondavalli:
Towards a MDE Transformation Workflow for Dependability Analysis. ICECCS 2011: 157-166 - Naeem Muhammad, Nelis Boucké, Yolande Berbers:
Parallelism Viewpoint: A Viewpoint to Model Parallelism in Parallelism-Intensive Software Systems. ICECCS 2011: 285-294 - Stefan Naujokat, Anna-Lena Lamprecht, Bernhard Steffen:
Tailoring Process Synthesis to Domain Characteristics. ICECCS 2011: 167-175 - Isabelle Perseil, Laurent Pautet, Jean-François Rolland, Mamoun Filali, Didier Delanote, Stefan Van Baelen, Wouter Joosen, Yolande Berbers, Frédéric Mallet, Dominique Bertrand, Sébastien Faucou, Abdelhafid Zitouni, Mahmoud Boufaïda, Lionel Seinturier, Joël Champeau, Thomas Abdoul, Peter H. Feiler, Chokri Mraidha, Sébastien Gérard:
An Efficient Modeling and Execution Framework for Complex Systems Development. ICECCS 2011: 317-331 - Heidar Pirzadeh, Abdelwahab Hamou-Lhadj:
A Novel Approach Based on Gestalt Psychology for Abstracting the Content of Large Execution Traces for Program Comprehension. ICECCS 2011: 221-230 - Stéphane Rubini, Frank Singhoff, Jérôme Hugues:
Modeling and Verification of Memory Architectures with AADL and REAL. ICECCS 2011: 338-343 - Osmar Marchi dos Santos, Jim Woodcock, Richard F. Paige:
Using Model Transformation to Generate Graphical Counter-Examples for the Formal Analysis of xUML Models. ICECCS 2011: 117-126
skipping 10 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-30 05:44 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint