Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 93 matches
- 2013
- Ebrahim Khalil Abbasi:
Reverse Engineering Web Sales Configurators. ICSM 2013: 586-589 - Hani Abdeen, Houari A. Sahraoui, Osama Shata:
How We Design Interfaces, and How to Assess It. ICSM 2013: 80-89 - Nouh Alhindawi, Natalia Dragan, Michael L. Collard, Jonathan I. Maletic:
Improving Feature Location by Enhancing Source Code with Stereotypes. ICSM 2013: 300-309 - Kapil Anand, Khaled Elwazeer, Aparna Kotha, Matthew Smithson, Rajeev Barua, Angelos D. Keromytis:
An Accurate Stack Memory Abstraction and Symbolic Analysis Framework for Executables. ICSM 2013: 90-99 - Allahbaksh M. Asadullah, Basavaraju M., Nikita Jain:
E-Xplore: Enterprise API Explorer. ICSM 2013: 524-527 - Muhammad Asaduzzaman, Chanchal K. Roy, Kevin A. Schneider, Massimiliano Di Penta:
LHDiff: A Language-Independent Hybrid Approach for Tracking Source Code Lines. ICSM 2013: 230-239 - Muhammad Asaduzzaman, Chanchal K. Roy, Kevin A. Schneider, Massimiliano Di Penta:
LHDiff: Tracking Source Code Lines to Support Software Maintenance Activities. ICSM 2013: 484-487 - Gabriele Bavota, Gerardo Canfora, Massimiliano Di Penta, Rocco Oliveto, Sebastiano Panichella:
An Empirical Investigation on Documentation Usage Patterns in Maintenance Tasks. ICSM 2013: 210-219 - Gabriele Bavota, Gerardo Canfora, Massimiliano Di Penta, Rocco Oliveto, Sebastiano Panichella:
The Evolution of Project Inter-dependencies in a Software Ecosystem: The Case of Apache. ICSM 2013: 280-289 - Blerina Bazelli, Abram Hindle, Eleni Stroulia:
On the Personality Traits of StackOverflow Users. ICSM 2013: 460-463 - Saman Bazrafshan, Rainer Koschke:
An Empirical Study of Clone Removals. ICSM 2013: 50-59 - Fabian Beck:
Analysis of Multi-dimensional Code Couplings. ICSM 2013: 560-565 - Dave W. Binkley, Dawn J. Lawrie, Emily Hill, Janet E. Burge, Ian G. Harris, Regina Hebig, Oliver Keszöcze, Karl Reed, John Slankas:
Task-Driven Software Summarization. ICSM 2013: 432-435 - Jeroen van den Bos, Tijs van der Storm:
TRINITY: An IDE for the Matrix. ICSM 2013: 520-523 - Juan Carlos Castrejón, Genoveva Vargas-Solar, Christine Collet, Rafael Lozano:
ExSchema: Discovering and Maintaining Schemas from Polyglot Persistence Applications. ICSM 2013: 496-499 - Michael L. Collard, Michael John Decker, Jonathan I. Maletic:
srcML: An Infrastructure for the Exploration, Analysis, and Manipulation of Source Code: A Tool Demonstration. ICSM 2013: 516-519 - Ana Erika Camargo Cruz, Hajimu Iida, Norbert Preining:
An Empirical Illustration to Validate a FLOSS Development Model Using S-Shaped Curves. ICSM 2013: 468-471 - Tathagata Dasgupta, Mark Grechanik, Evan Moritz, Bogdan Dit, Denys Poshyvanyk:
Enhancing Software Traceability by Automatically Expanding Corpora with Relevant Documentation. ICSM 2013: 320-329 - Bogdan Dit, Evan Moritz, Mario Linares Vásquez, Denys Poshyvanyk:
Supporting and Accelerating Reproducible Research in Software Maintenance Using TraceLab Component Library. ICSM 2013: 330-339 - Felipe Ebert, Fernando Castor:
A Study on Developers' Perceptions about Exception Handling Bugs. ICSM 2013: 448-451 - Marios Fokaefs, Eleni Stroulia:
WSDARWIN: A Decision-Support Tool for Web-Service Evolution. ICSM 2013: 444-447 - Francesca Arcelli Fontana, Vincenzo Ferme, Alessandro Marino, Bartosz Walter, Pawel Martenka:
Investigating the Impact of Code Smells on System's Quality: An Empirical Study on Systems of Different Application Domains. ICSM 2013: 260-269 - Francesca Arcelli Fontana, Marco Zanoni, Alessandro Marino, Mika Mäntylä:
Code Smell Detection: Towards a Machine Learning-Based Approach. ICSM 2013: 396-399 - Patrick Francis, Laurie A. Williams:
Determining "Grim Reaper" Policies to Prevent Languishing Bugs. ICSM 2013: 436-439 - Mohammad Gharehyazie, Daryl Posnett, Vladimir Filkov:
Social Activities Rival Patch Submission for Prediction of Developer Initiation in OSS Projects. ICSM 2013: 340-349 - Maxime Gobert, Jerome Maes, Anthony Cleve, Jens H. Weber:
Understanding Schema Evolution as a Basis for Database Reengineering. ICSM 2013: 472-475 - Jan Harder:
How Multiple Developers Affect the Evolution of Code Clones. ICSM 2013: 30-39 - Péter Hegedüs:
Revealing the Effect of Coding Practices on Software Maintainability. ICSM 2013: 578-581 - Emily Hill, Alberto Bacchelli, Dave W. Binkley, Bogdan Dit, Dawn J. Lawrie, Rocco Oliveto:
Which Feature Location Technique is Better? ICSM 2013: 408-411 - Emily Hill, David C. Shepherd, Lori L. Pollock, K. Vijay-Shanker:
Differentiating Roles of Program Elements in Action-Oriented Concerns. ICSM 2013: 376-379
skipping 63 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-23 13:43 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint