Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 332 matches
- 2023
- Sarabjeet Kaur, Amanpreet Kaur Sandhu, Abhinav Bhandari:
Investigation of application layer DDoS attacks in legacy and software-defined networks: A comprehensive review. Int. J. Inf. Sec. 22(6): 1949-1988 (2023) - Paolo Savio, Alberto Scionti, Giacomo Vitali, Paolo Viviani, Chiara Vercellino, Olivier Terzo, Huy-Nam Nguyen, Donato Magarielli, Ennio Spano, Michele Marconcini, Francesco Poli:
Accelerating legacy applications with spatial computing devices. J. Supercomput. 79(7): 7461-7483 (2023) - Simon Fischer-Heselhaus, Philipp Brune:
AI vs. Dinosaurs - Automated Re-implementation of Legacy Mainframe Applications in Java by Combining Program Synthesis and GPT. MSPN 2023: 205-221 - Ladislav Hluchý, Ondrej Habala, Martin Bobák, Martin Seleng:
Transformation of a Legacy Airport Meteorology Application into a Serverless Cloud Application. SACI 2023: 637-642 - 2022
- Gabriel A. Wainer:
Advanced Cell-DEVS modeling applications: a legacy of Norbert Giambiasi. Simul. 98(6): 465-491 (2022) - Benoît Verhaeghe, Anas Shatnawi, Abderrahmane Seriai, Anne Etien, Nicolas Anquetil, Mustapha Derras, Stéphane Ducasse:
From GWT to Angular: An Experiment Report on Migrating a Legacy Web Application. IEEE Softw. 39(4): 76-83 (2022) - Saravanan Krishnan, Alex Mathai, Amith Singhee, Atul Kumar, Shivali Agarwal, Keerthi Narayan Raghunath, David Wenk:
Incremental Analysis of Legacy Applications Using Knowledge Graphs for Application Modernization. COMAD/CODS 2022: 250-254 - Antonios Mparmpoutis, George Kakarontzas:
Using Database Schemas of Legacy Applications for Microservices Identification: A Mapping Study. ICACS 2022: 11:1-11:7 - Michal Orzechowski, Michal Wrzeszcz, Bartosz Kryza, Lukasz Dutka, Renata G. Slota, Jacek Kitowski:
Global Access to Legacy Data-Sets in Multi-cloud Applications with Onedata. PPAM (1) 2022: 305-317 - Christoph Gaudl, Philipp Brune:
Towards a Pattern-based Approach for Transforming Legacy COBOL Applications Into RESTful Web Services. WEBIST 2022: 159-165 - Marius Breitmayer, Lisa Arnold, Manfred Reichert:
Towards Retrograde Process Analysis in Running Legacy Applications (short paper). ZEUS 2022: 11-15 - 2021
- Stephen Herwig:
Execution Environments for Running Legacy Applications in Multi-Party Trust Settings. University of Maryland, College Park, MD, USA, 2021 - Viviana Elizabeth Cajas, Matias Urbieta, Gustavo Rossi, Yves Rybarczyk:
Migrating legacy Web applications. Clust. Comput. 24(2): 1033-1049 (2021) - Rohit Punnoose, Supriya Kumar De:
Phase-wise migration of multiple legacy applications-A graph-theoretic approach. Inf. Softw. Technol. 137: 106606 (2021) - Aakash Ahmad, Adel Alkhalil, Ahmed B. Altamimi, Khalid Sultan, Wilayat Khan:
Modernizing Legacy Software as Context - Sensitive and Portable Mobile-Enabled Application. IT Prof. 23(1): 42-50 (2021) - Aakash Ahmad, Adel Alkhalil, Ahmed B. Altamimi, Khalid Sultan, Wilayat Khan:
Corrections to "Modernizing Legacy Software as Context-Sensitive and Portable Mobile-Enabled Application". IT Prof. 23(3): 110 (2021) - Rodrigo Cataldo, Ramon Fernandes, Kevin J. M. Martin, Jarbas Silveira, Gustavo Sanchez, Johanna Sepúlveda, César A. M. Marcon, Jean-Philippe Diguet:
Subutai: Speeding Up Legacy Parallel Applications Through Data Synchronization. IEEE Trans. Parallel Distributed Syst. 32(5): 1102-1116 (2021) - Anup K. Kalia, Raghav Batta, Jin Xiao, Mihir Choudhury, Maja Vukovic:
ACA: Application Containerization Advisory Framework for Modernizing Legacy Applications. CLOUD 2021: 708-710 - Guillaume Rosinosky, Samir Youcef, François Charoy, Etienne Rivière:
A Methodology for Tenant Migration in Legacy Shared-Table Multi-tenant Applications. DAIS 2021: 3-20 - Rogerio Jeronimo Gentil, Daniel de Paula Porto, Fabiano Cutigi Ferrari:
The Impact on the Test Coverage Caused by the Introduction of Adaptive Behavior in a Legacy Web Application: A Case Study. SAST 2021: 26-35 - Barthélémy Dagenais, Hafedh Mili:
Slicing functional aspects out of legacy applications. CoRR abs/2109.12076 (2021) - 2020
- Mahadev Satyanarayanan, Thomas Eiszler, Jan Harkes, Haithem Turki, Ziqiang Feng:
Edge Computing for Legacy Applications. IEEE Pervasive Comput. 19(4): 19-28 (2020) - Rasoul Jahanshahi, Adam Doupé, Manuel Egele:
You shall not pass: Mitigating SQL Injection Attacks on Legacy Web Applications. AsiaCCS 2020: 445-457 - Ioannis Nompelis, Gabriele Jost, Alice Koniges, Christopher S. Daley, David Eder, Christopher Stone:
Enabling Execution of a Legacy CFD Mini Application on Accelerators Using OpenMP. ISC 2020: 270-287 - Rasoul Jahanshahi, Adam Doupé, Manuel Egele:
You shall not pass: Mitigating SQL Injection Attacks on Legacy Web Applications. CoRR abs/2006.11996 (2020) - 2019
- Rodrigo Cadore Cataldo:
Subutai : Distributed synchronization primitives for legacy and novel parallel applications. (Subutai : Primitives de synchronisation distribuées pour applications parallèles antérieures et émergentes). University of Southern Brittany, Vannes, Morbihan, France, 2019 - Mladen Matejas, Kresimir Fertalj:
Building a BPM application in an SOA-based legacy environment. Comput. Sci. Inf. Syst. 16(1): 45-74 (2019) - Manish Shukla, Kumar Vidhani, Gangadhara Reddy Sirigireddy, Vijayanand Banahatti, Sachin Lodha:
pFilter: Retrofitting Legacy Applications for Data Privacy. CCS 2019: 2573-2575 - Yuseok Jeon, Junghwan Rhee, Chung Hwan Kim, Zhichun Li, Mathias Payer, Byoungyoung Lee, Zhenyu Wu:
PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications. CODASPY 2019: 209-220 - Anum Ghaffar, Majid Hussain:
BCEAP - A Blockchain Embedded Academic Paradigm to Augment Legacy Education through Application. ICFNDS 2019: 45:1-45:11
skipping 302 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-03-28 18:44 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint