Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 48 matches
- 2009
- Hani Abdeen, Stéphane Ducasse, Houari A. Sahraoui, Ilham Alloui:
Automatic Package Coupling and Cycle Minimization. WCRE 2009: 103-112 - Surafel Lemma Abebe, Sonia Haiduc, Paolo Tonella, Andrian Marcus:
Lexicon Bad Smells in Software. WCRE 2009: 95-99 - Christopher Ackermann, Mikael Lindvall, Rance Cleaveland:
Recovering Views of Inter-System Interaction Behaviors. WCRE 2009: 53-61 - Omar Alam, Bram Adams, Ahmed E. Hassan:
A Study of the Time Dependence of Code Changes. WCRE 2009: 21-30 - Mehdi Amoui:
Evolving Software Systems Towards Adaptability. WCRE 2009: 299-302 - Nicolas Anquetil, Timothy C. Lethbridge:
Ten Years Later, Experiments with Clustering as a Software Remodularization Method. WCRE 2009: 7 - Nicolas Anquetil, Jean-Claude Royer, Pascal André, Gilles Ardourel, Petr Hnetynka, Tomás Poch, Dragos Petrascu, Vladiela Petrascu:
JavaCompExt: Extracting Architectural Elements from Java Source Code. WCRE 2009: 317-318 - Trosky Boris Callo Arias, Pierre America, Paris Avgeriou:
Constructing a Resource Usage View of a Large and Complex Software-Intensive System. WCRE 2009: 247-255 - Alberto Bacchelli, Marco D'Ambros, Michele Lanza, Romain Robbes:
Benchmarking Lightweight Techniques to Link E-Mails and Source Code. WCRE 2009: 205-214 - Mario Luca Bernardi, Giuseppe A. Di Lucca:
ConAn: A Tool for the Identification of Crosscutting Concerns in Object Oriented Systems Based on Type Hierarchy Analysis. WCRE 2009: 319-320 - Nicolas Bettenburg, Weiyi Shang, Walid M. Ibrahim, Bram Adams, Ying Zou, Ahmed E. Hassan:
An Empirical Study on Inconsistent Changes to Code Clones at Release Level. WCRE 2009: 85-94 - Kirill Bogdanov, Neil Walkinshaw:
Computing the Structural Difference between State-Based Models. WCRE 2009: 177-186 - Houda El Bouhissi, Mimoun Malki:
Reverse Engineering Existing Web Service Applications. WCRE 2009: 279-283 - Simon Butler, Michel Wermelinger, Yijun Yu, Helen Sharp:
Relating Identifier Naming Flaws and Code Quality: An Empirical Study. WCRE 2009: 31-35 - Giovanni Capobianco, Andrea De Lucia, Rocco Oliveto, Annibale Panichella, Sebastiano Panichella:
Traceability Recovery Using Numerical Analysis. WCRE 2009: 195-204 - Kevin Coogan, Saumya K. Debray, Tasneem Kaochar, Gregg M. Townsend:
Automatic Static Unpacking of Malware Binaries. WCRE 2009: 167-176 - Heitor Augustus Xavier Costa, Paulo Afonso Parreira Júnior, Valter Vieira de Camargo, Rosângela Aparecida Dellosso Penteado:
Recovering Class Models Stereotyped with Crosscutting Concerns. WCRE 2009: 311-312 - Marco D'Ambros, Michele Lanza, Romain Robbes:
On the Relationship Between Change Coupling and Software Defects. WCRE 2009: 135-144 - Simon Denier, Tudor Gîrba:
FAMOOSr 2009 - Workshop on FAMIX and Moose in Software Reengineering. WCRE 2009: 325-326 - Javed Ferzund, Syed Nadeem Ahsan, Franz Wotawa:
Bug-Inducing Language Constructs. WCRE 2009: 155-159 - Matt Gatrell, Steve Counsell, Tracy Hall:
Design Patterns and Change Proneness: A Replication Using Proprietary C# Software. WCRE 2009: 160-164 - Jean-Luc Hainaut:
Legacy and Future of Data Reverse Engineering. WCRE 2009: 4 - Yoshiki Higo, Shinji Kusumoto:
Enhancing Quality of Code Clone Detection with Program Dependency Graph. WCRE 2009: 315-316 - Shinji Kawaguchi, Takanobu Yamashina, Hidetake Uwano, Kyohei Fushida, Yasutaka Kamei, Masataka Nagura, Hajimu Iida:
SHINOBI: A Tool for Automatic Code Clone Detection in the IDE. WCRE 2009: 313-314 - Foutse Khomh:
SQUAD: Software Quality Understanding through the Analysis of Design. WCRE 2009: 303-306 - Foutse Khomh, Massimiliano Di Penta, Yann-Gaël Guéhéneuc:
An Exploratory Study of the Impact of Code Smells on Software Change-proneness. WCRE 2009: 75-84 - Segla Kpodjedo:
Approximate Graph Matching in Software Engineering. WCRE 2009: 295-298 - Nithya Krishnamoorthy, Saumya K. Debray, Keith Fligg:
Static Detection of Disassembly Errors. WCRE 2009: 259-268 - Jannik Laval, Simon Denier, Stéphane Ducasse, Alexandre Bergel:
Identifying Cycle Causes with Enriched Dependency Structural Matrix. WCRE 2009: 113-122 - Dominic Letarte, Ettore Merlo:
Extraction of Inter-procedural Simple Role Privilege Models from PHP Code. WCRE 2009: 187-191
skipping 18 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-11 14:30 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint