Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 68 matches
- 2008
- Sérgio Agostinho, Ana Moreira, André Marques, João Araújo, Isabel Sofia Brito, Ricardo Ferreira, Ricardo Raminhos, Jasna Kovacevic, Rita Almeida Ribeiro, Philippe Chevalley:
A Metadata-Driven Approach for Aspect-Oriented Requirements Analysis. ICEIS (3-2) 2008: 129-136 - Antonio J. Alencar, Eber A. Schmitz, Enio Pires de Abreu, Marcelo Carvalho Fernandes, Armando Leite Ferreira:
Maximizing the Business Value of Software Projects - A Branch & Bound Approach. ICEIS (3-2) 2008: 162-169 - Abdelkrim Amirat, Mourad Oussalah:
Representation and Reasoning Models for C3 Architecture Description Language. ICEIS (3-2) 2008: 207-212 - Darko Anicic, Nenad Stojanovic:
Towards Creation of Logical Framework for Event-Driven Information Systems. ICEIS (3-2) 2008: 394-401 - Adil Anwar, Sophie Ebersold, Mahmoud Nassar, Bernard Coulette, Abdelaziz Kriouile:
A QVT-Based Approach for Model Composition - Application to the VUML Profile. ICEIS (3-2) 2008: 360-367 - Diane Asensio, Abdelaziz Khadraoui, Michel Léonard:
Information System Engineering for an Electricity Distribution Company. ICEIS (3-2) 2008: 448-453 - Fodé Touré, Karim Baïna, Walid Gaaloul:
Toward a Hybrid Algorithm for Workflow Graph Structural Verification. ICEIS (3-2) 2008: 442-447 - Ivan Bedini, Benjamin Nguyen, Georges Gardarin:
B2B Automatic Taxonomy Construction. ICEIS (3-2) 2008: 325-330 - Alicia C. Böhm, Horacio Pascual Leone, Gabriela P. Henning:
A Supply Chain Ontology Conceptualization with Focus on Performance Evaluation. ICEIS (3-2) 2008: 402-409 - Mohamed Boukhebouze, Youssef Amghar, Aïcha-Nabila Benharkat:
BP-FAMA: Business Process Framework for Agility of Modelling and Analysis. ICEIS (3-2) 2008: 368-373 - Saïda Boukhedouma, Zaia Alimazighi:
Modelling and Distributing Individual and Collective Activities in a Workflow System. ICEIS (3-2) 2008: 290-297 - Albert J. J. van Breemen, Janos J. Sarbo:
On Conceptualization as a Systematic Process. ICEIS (3-2) 2008: 37-42 - Jan vom Brocke, Jan Mendling, Jan Recker:
Towards a Value-Oriented Approach to Business Process Modelling. ICEIS (3-2) 2008: 380-395 - Jan vom Brocke, Alexander Simons, Anne Cleven:
ECM Systems Analysis and Specification - Towards a Framework for Business Process Re-Engineering. ICEIS (3-2) 2008: 345-350 - Joël Brunet, Farida Semmak, Régine Laleau, Christophe Gnaho:
Using Variants in KAOS Goal Modelling. ICEIS (3-2) 2008: 339-344 - María Eugenia Cabello, Isidro Ramos:
Variability Management in Software Product Lines for Decision Support Systems Construction. ICEIS (3-2) 2008: 49-56 - Daniel Cabrero Moreno, Javier Garzás, Mario Piattini:
Combining Different Change Prediction Techniques. ICEIS (3-2) 2008: 57-63 - Marco A. Casanova, Simone Diniz Junqueira Barbosa, Karin Koogan Breitman, António L. Furtado:
Generalization and Blending in the Generation of Entity-Relationship Schemas by Analogy. ICEIS (3-2) 2008: 43-48 - Alfredo Cuzzocrea, Andrea Gualtieri, Domenico Saccà:
A Process-Driven Methodology for Continuous Information Systems Modeling. ICEIS (3-2) 2008: 82-88 - Gregor Engels, Andreas Hess, Bernhard Humm, Oliver Juwig, Marc Lohmann, Jan-Peter Richter, Markus Voß, Johannes Willkomm:
A Method for Engineering a True Service-Oriented Architecture. ICEIS (3-2) 2008: 272-281 - Muhammad Fahad, Muhammad Abdul Qadir, Muhammad Wajahaat Noshairwan:
Ontological Errors - Inconsistency, Incompleteness and Redundancy. ICEIS (3-2) 2008: 253-285 - Marcelo Carvalho Fernandes, Antonio J. Alencar, Eber A. Schmitz:
An Extreme Programming Release Plan that Maximizes Business Performance. ICEIS (3-2) 2008: 12-22 - Andres Flores, Macario Polo Usaola:
Testing-Based Component Assessment for Substitutability. ICEIS (3-2) 2008: 386-939 - David de Francisco Marcos, Ivan Markovic, Javier Martínez, Henar Muñoz, Noelia Pérez:
Methodological Extensions for Semantic Business Process Modeling. ICEIS (3-2) 2008: 410-415 - Hiroaki Fukuda, Yoshikazu Yamamoto:
Camel Framework - A Framework for Realizing Complete Separation of Developer's and Designer's Work in Rich Internet Application. ICEIS (3-2) 2008: 137-143 - Pau Giner, Manoli Albert, Vicente Pelechano:
Physical-Virtual Connection in Ubiquitous Business Processes. ICEIS (3-2) 2008: 266-271 - Matthias Goeken, Stefanie Alter:
IT Governance Frameworks as Methods. ICEIS (3-2) 2008: 331-338 - Anna Grimán, María A. Pérez, Maryoly Ortega, Luis Eduardo Mendoza:
Context-Oriented Web Methodology with a Quality Approach. ICEIS (3-2) 2008: 213-219 - Prima Gustiené, Remigijus Gustas:
Introducing Service-Orientation into System Analysis and Design. ICEIS (3-2) 2008: 189-194 - Alena Hallerbach, Thomas Bauer, Manfred Reichert:
Managing Process Variants in the Process Life Cycle. ICEIS (3-2) 2008: 154-161
skipping 38 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-28 22:10 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint