Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 80 matches
- 2015
- Benjamin Biegel, Benedikt Lesch, Stephan Diehl:
Live object exploration: Observing and manipulating behavior and state of Java objects. ICSME 2015: 581-585 - Nahla J. Abid, Natalia Dragan, Michael L. Collard, Jonathan I. Maletic:
Using stereotypes in the automatic generation of natural language summaries for C++ methods. ICSME 2015: 561-565 - Karan Aggarwal, Abram Hindle, Eleni Stroulia:
GreenAdvisor: A tool for analyzing the impact of software evolution on energy consumption. ICSME 2015: 311-320 - Mauricio Finavaro Aniche:
Detection strategies of smells in web software development. ICSME 2015: 598-601 - Muhammad Asaduzzaman, Chanchal K. Roy, Samiul Monir, Kevin A. Schneider:
Exploring API method parameter recommendations. ICSME 2015: 271-280 - Muhammad Asaduzzaman, Chanchal K. Roy, Kevin A. Schneider:
PARC: Recommending API methods parameters. ICSME 2015: 330-332 - Ali Sajedi Badashian, Abram Hindle, Eleni Stroulia:
Crowdsourced bug triaging. ICSME 2015: 506-510 - Vipin Balachandran:
Query by example in large-scale code repositories. ICSME 2015: 467-476 - Gergö Balogh, Gabor Antal, Árpád Beszédes, László Vidács, Tibor Gyimóthy, Ádám Zoltán Végh:
Identifying wasted effort in the field via developer interaction data. ICSME 2015: 391-400 - Gabriele Bavota, Barbara Russo:
Four eyes are better than two: On the impact of code reviews on software quality. ICSME 2015: 81-90 - David W. Binkley, Árpád Beszédes, Syed S. Islam, Judit Jász, Béla Vancsics:
Uncovering dependence clusters and linchpin functions. ICSME 2015: 141-150 - Simon Butler, Michel Wermelinger, Yijun Yu:
Investigating naming convention adherence in Java references. ICSME 2015: 41-50 - Andrea Ciani, Roberto Minelli, Andrea Mocci, Michele Lanza:
UrbanIt: Visualizing repositories everywhere. ICSME 2015: 324-326 - Mihai Codoban, Sruti Srinivasa Ragavan, Danny Dig, Brian P. Bailey:
Software history under the lens: A study on why and how developers examine it. ICSME 2015: 1-10 - Christopher S. Corley, Kostadin Damevski, Nicholas A. Kraft:
Exploring the use of deep learning for feature location. ICSME 2015: 556-560 - Christopher S. Corley, Kelly L. Kashuda, Nicholas A. Kraft:
Modeling changeset topics for feature location. ICSME 2015: 71-80 - Christopher S. Corley, Federico Lois, Sebastian Quezada:
Web usage patterns of developers. ICSME 2015: 381-390 - Zhen Dong, Artur Andrzejak, Kun Shao:
Practical and accurate pinpointing of configuration errors using static analysis. ICSME 2015: 171-180 - Bernhard Dorninger, Josef Pichler, Albin Kern:
Using static analysis for knowledge extraction from industrial User Interfaces. ICSME 2015: 497-500 - Edward Dunn Ekelund, Emelie Engström:
Efficient regression testing based on test history: An industrial evaluation. ICSME 2015: 449-457 - Wolfram Fenske:
Code smells in highly configurable software. ICSME 2015: 602-605 - Marios Fokaefs, Mihai Oprescu, Eleni Stroulia:
WSDarwin: A web application for the support of REST service evolution. ICSME 2015: 336-338 - Yan Gao, Daqing Hou:
ArchFLoc: Locating and explaining architectural features in running web applications. ICSME 2015: 333-335 - Mathieu Goeminne, Tom Mens:
Towards a survival analysis of database framework usage in Java projects. ICSME 2015: 551-555 - Ryan Hardt, Ethan V. Munson:
An empirical evaluation of ant build maintenance using Formiga. ICSME 2015: 201-210 - Péter Hegedüs:
Advances in software product quality measurement and its applications in software evolution. ICSME 2015: 590-593 - André C. Hora, Romain Robbes, Nicolas Anquetil, Anne Etien, Stéphane Ducasse, Marco Túlio Valente:
How do developers react to API evolution? The Pharo ecosystem case. ICSME 2015: 251-260 - André C. Hora, Marco Túlio Valente:
Apiwave: Keeping track of API popularity and migration. ICSME 2015: 321-323 - Nikola Ilo, Johann Grabner, Thomas Artner, Mario Bernhart, Thomas Grechenig:
Combining software interrelationship data across heterogeneous software repositories. ICSME 2015: 571-575 - Bas Jansen, Felienne Hermans:
Code smells in spreadsheet formulas revisited on an industrial dataset. ICSME 2015: 372-380
skipping 50 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-26 08:40 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint