Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 86 matches
- 2010
- Mohammad Abdallah, Malcolm Munro, Keith B. Gallagher:
Certifying software robustness using program slicing. ICSM 2010: 1-2 - Jafar M. Al-Kofahi, Ahmed Tamrawi, Tung Thanh Nguyen, Hoan Anh Nguyen, Tien N. Nguyen:
Fuzzy set approach for automatic tagging in evolving software. ICSM 2010: 1-10 - Tiago L. Alves:
Assessment of product maintainability for two space domain simulators. ICSM 2010: 1-7 - Tiago L. Alves, Christiaan Ypma, Joost Visser:
Deriving metric thresholds from benchmark data. ICSM 2010: 1-10 - Venera Arnaoudova, Laleh Mousavi Eshkevari, Rocco Oliveto, Yann-Gaël Guéhéneuc, Giuliano Antoniol:
Physical and conceptual identifier dispersion: Measures and relation to fault proneness. ICSM 2010: 1-5 - Amir Aryani, Ian D. Peake, Margaret Hamilton:
Domain-based change propagation analysis: An enterprise system case study. ICSM 2010: 1-9 - Liang Bao, Chao Yin, Weigang He, Jun Ge, Ping Chen:
Extracting reusable services from legacy object-oriented systems. ICSM 2010: 1-5 - Gabriele Bavota, Rocco Oliveto, Andrea De Lucia, Giuliano Antoniol, Yann-Gaël Guéhéneuc:
Playing with refactoring: Identifying extract class opportunities through game theory. ICSM 2010: 1-5 - Mario Luca Bernardi, Giuseppe A. Di Lucca:
Model-driven detection of Design Patterns. ICSM 2010: 1-5 - Cor-Paul Bezemer, Andy Zaidman, Bart Platzbeecker, Toine Hurkmans, Aad 't Hart:
Enabling multi-tenancy: An industrial experience report. ICSM 2010: 1-8 - Pamela Bhattacharya, Iulian Neamtiu:
Fine-grained incremental learning and multi-feature tossing graphs to improve bug triaging. ICSM 2010: 1-10 - John Brant, Don Roberts, Bill Plendl, Jeff Prince:
Extreme maintenance: Transforming Delphi into C#. ICSM 2010: 1-8 - Benedikt Burgstaller, Alexander Egyed:
Understanding where requirements are implemented. ICSM 2010: 1-5 - Gerardo Canfora, Michele Ceccarelli, Luigi Cerulo, Massimiliano Di Penta:
Using multivariate time series and association rules to detect logical change coupling: An empirical study. ICSM 2010: 1-10 - Mariano Ceccato, Paolo Tonella:
Static analysis for enforcing intra-thread consistent locks in the migration of a legacy system. ICSM 2010: 1-9 - Shauvik Roy Choudhary, Husayn Versee, Alessandro Orso:
WEBDIFF: Automated identification of cross-browser issues in web applications. ICSM 2010: 1-10 - Shauvik Roy Choudhary, Husayn Versee, Alessandro Orso:
A cross-browser web application testing tool. ICSM 2010: 1-6 - Anthony Cleve:
Program analysis and transformation for data-intensive system evolution. ICSM 2010: 1-6 - Michael L. Collard, Jonathan I. Maletic, Brian P. Robinson:
A lightweight transformational approach to support large scale adaptive changes. ICSM 2010: 1-10 - Anna Corazza, Sergio Di Martino, Valerio Maggio, Giuseppe Scanniello:
A Tree Kernel based approach for clone detection. ICSM 2010: 1-5 - Dan C. Cosma:
Reverse engineering object-oriented distributed systems. ICSM 2010: 1-6 - Yanjindulam Dajsuren, Maayan Goldstein, Dany Moshkovich:
Modernizing legacy software using a System Grokking technology. ICSM 2010: 1-7 - Hoa Khanh Dam, Michael Winikoff:
Supporting change propagation in UML models. ICSM 2010: 1-10 - Danny Dig:
A practical tutorial on refactoring for parallelism. ICSM 2010: 1-2 - Natalia Dragan, Michael L. Collard, Jonathan I. Maletic:
Automatic identification of class stereotypes. ICSM 2010: 1-10 - André L. Ferreira, Ricardo Jorge Machado, Jose G. Silva, Rui F. Batista, Lino A. Costa, Mark C. Paulk:
An approach to improving software inspections performance. ICSM 2010: 1-8 - Marc Fisher II, Bruno Dufour, Shrutarshi Basu, Barbara G. Ryder:
Exploring the impact of context sensitivity on blended analysis. ICSM 2010: 1-10 - Marios Fokaefs, Diego Serrano, Brendan Tansey, Eleni Stroulia:
2D and 3D visualizations in WikiDev2.0. ICSM 2010: 1-5 - Zachary P. Fry, Westley Weimer:
A human study of fault localization accuracy. ICSM 2010: 1-10 - Tamás Gergely, Árpád Beszédes, Tibor Gyimóthy, Milan Imre Gyalai:
Effect of test completeness and redundancy measurement on post release failures - An industrial experience report. ICSM 2010: 1-10
skipping 56 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 08:21 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint