Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 101 matches
- 2018
- Laura González, Raúl Ruggia:
A Comprehensive Approach to Compliance Management in Inter-organizational Service Integration Platforms. ICSOFT 2018: 722-730 - Abdulaziz Alkhalid, Yvan Labiche:
On Graphical User Interface Verification. ICSOFT 2018: 407-414 - Abdulaziz Alkhalid, Yvan Labiche:
Towards GUI Functional Verification using Abstract Interpretation. ICSOFT 2018: 415-422 - Abdulaziz Alkhalid, Yvan Labiche, Sashank Nekkanti:
Revisiting the Notion of GUI Testing. ICSOFT 2018: 674-681 - Ilham Alloui, Eric Benoit, Stéphane Perrin, Flavien Vernier:
WIoT: Interconnection between Wise Objects and IoT. ICSOFT 2018: 528-539 - Juncal Alonso, Marisa Escalante, Lena Farid, María José López, Leire Orue-Echevarria, Simon Dutkowski:
Towards Supporting the Extended DevOps Approach through Multi-cloud Architectural Patterns for Design and Pre-deployment - A Tool Supported Approach. ICSOFT 2018: 847-857 - Luís Alves, Rodrigo Rocha Silva, Jorge Bernardino:
System to Predict Diseases in Vineyards and Olive Groves using Data Mining and Geolocation. ICSOFT 2018: 713-721 - Darko Androcec, Neven Vrcek:
Machine Learning for the Internet of Things Security: A Systematic Review. ICSOFT 2018: 597-604 - Hina Anwar, Dietmar Pfahl, Satish Narayana Srirama:
An Investigation into the Energy Consumption of HTTP POST Request Methods for Android App Development. ICSOFT 2018: 275-282 - Pasquale Ardimento, Mario Luca Bernardi, Marta Cimitile:
A Multi-source Machine Learning Approach to Predict Defect Prone Components. ICSOFT 2018: 306-313 - Naima Armaoui, Mohamed Naija, Samir Ben Ahmed:
On the Use of Models for Real-time Reconfigurations of Embedded Systems. ICSOFT 2018: 314-321 - Pedro F. Perez Arteaga, Camilo Castellanos, Harold Castro, Darío Correal, Luis A. Guzmán, Yves Denneulin:
Cost Comparison of Lambda Architecture Implementations for Transportation Analytics using Public Cloud Software as a Service. ICSOFT 2018: 889-896 - Salma Ayari, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed:
A Refinement based Verification Approach of BPMN Models using NuSMV. ICSOFT 2018: 563-574 - Sándor Bácsi, Gergely Mezei:
Towards a Visualization of Multi-level Metamodeling Techniques. ICSOFT 2018: 389-396 - Pravas Ranjan Bal, Sandeep Kumar:
Extreme Learning Machine based Linear Homogeneous Ensemble for Software Fault Prediction. ICSOFT 2018: 103-112 - Pravas Ranjan Bal, Sandeep Kumar:
Cross Project Software Defect Prediction using Extreme Learning Machine: An Ensemble based Study. ICSOFT 2018: 354-361 - Luan Bukowitz Beluzzo, Simone Nasser Matos, Thyago Henrique Pacher:
A Refactoring Architecture for Measuring and Identifying Spots of Design Patterns Insertion in Source Code. ICSOFT 2018: 666-673 - Jaroslav Bendík, Nikola Benes, Ivana Cerná:
Finding Regressions in Projects under Version Control Systems. ICSOFT 2018: 186-197 - Mohamed Lamine Berkane, Lionel Seinturier, Mahmoud Boufaïda:
Variability Modelling for Elastic Scaling in Cloud Computing. ICSOFT 2018: 751-758 - Artur Biskupek, Seweryn Spalek:
Importance of Time Management in IT Projects. ICSOFT 2018: 617-624 - Anne Marie Bogar, Damian M. Lyons, David Baird:
Lightweight Call-Graph Construction for Multilingual Software Analysis. ICSOFT 2018: 362-371 - Robert Bryce, Gautam Srivastava:
The Addition of Geolocation to Sensor Networks. ICSOFT 2018: 796-802 - Christoph Bussler:
Cloud Software Engineering: Traditional or Innovative - The Choice Is Yours. ICSOFT 2018: 905-912 - Ervina Çergani, Sebastian Proksch, Sarah Nadi, Mira Mezini:
Investigating Order Information in API-Usage Patterns: A Benchmark and Empirical Study. ICSOFT 2018: 91-102 - Ana María Chimunja, César A. Collazos, Julio Ariel Hurtado, Habib M. Fardoun:
Analyzing Collaboration in the Gamification Process of Childprogramming. ICSOFT 2018: 828-834 - Chun Yong Chong, Sai Peck Lee:
A Commit Change-based Weighted Complex Network Approach to Identify Potential Fault Prone Classes. ICSOFT 2018: 471-482 - César A. Collazos, Andrés Solano, Habib M. Fardoun:
Collaboration Engineering: Supporting the Collaborative Processes Design for the Accessible and Usable Interactive Systems Design. ICSOFT 2018: 820-827 - Miguel Pupo Correia:
Storing Critical Data in the Cloud: Challenges and Solutions. ICSOFT 2018: 11-49 - Estrela Ferreira Cruz, António Miguel Rosado da Cruz:
Deriving Integrated Software Design Models from BPMN Business Process Models. ICSOFT 2018: 605-616 - Cristian Cuerda, José A. Gallud, Ricardo Tesoriero, Habib M. Fardoun:
Digital LOTCA - How to Evaluate Acquired Brain Injury using Technology. ICSOFT 2018: 807-813
skipping 71 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-19 18:34 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint