


Остановите войну!
for scientists:


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 1,942 matches
- 2022
- Mohammed Aissaoui, Chiraz Houaidia, Adrien van den Bossche, Thierry Val, Leïla Azouz Saïdane:
Dynamic Slotted Network Coding Protocol. ICSOFT 2022: 579-590 - Tamás Aladics, Péter Hegedüs, Rudolf Ferenc:
A Vulnerability Introducing Commit Dataset for Java: An Improved SZZ based Approach. ICSOFT 2022: 68-78 - Lerina Aversano, Mario Luca Bernardi, Marta Cimitile, Martina Iammarino, Debora Montano
:
Is There Any Correlation between Refactoring and Design Smell Occurrence? ICSOFT 2022: 129-136 - Salma Abid Azzi, Chiraz Ben Othmane Zribi:
Comparing Deep Learning Models for Multi-label Classification of Arabic Abusive Texts in Social Media. ICSOFT 2022: 374-381 - Gergõ Balogh, Péter Soha:
Formal Notations and Terminology for Users' Feedback and Its Specialization for Interactive Fault Localization. ICSOFT 2022: 226-233 - Hind Bangui, Barbora Buhnova:
Blockchain Patterns in Critical Infrastructures: Limitations and Recommendations. ICSOFT 2022: 457-468 - Enes Bilgin, Tolga Ovatman:
Coordinated Access to Shared Data Sources for Geo-replicated State Machines. ICSOFT 2022: 625-629 - Samia Al Blwi, Imen Marsit, Besma Khaireddine, Amani Ayad, Ji Meng Loh, Ali Mili:
Generalized Mutant Subsumption. ICSOFT 2022: 46-56 - Daniel Brahneborg, Wasif Afzal, Saad Mubeen:
Resilient Conflict-free Replicated Data Types without Atomic Broadcast. ICSOFT 2022: 516-523 - Laura Diana Cernau, Laura Diosan, Camelia Serban:
A Hybrid Complexity Metric in Automatic Software Defects Prediction. ICSOFT 2022: 433-440 - Emilia Cioroaica, José Miguel Blanco, Bruno Rossi
:
Timing Model for Predictive Simulation of Safety-critical Systems. ICSOFT 2022: 331-339 - Andrea Delgado, Daniel Calegari:
Process and Organizational Data Integration from BPMS and Relational/NoSQL Sources for Process Mining. ICSOFT 2022: 557-566 - José Manuel Lozano Domínguez, J. M. Corralejo Mora, Iñaki Fernández de Viana Gonzalez, Tomás de Jesús Mateo Sanguino, Manuel J. Redondo González:
Performance Analysis of an Embedded System for Target Detection in Smart Crosswalks using Machine Learning. ICSOFT 2022: 382-389 - Arpita Dutta, Rajib Mall:
An Ensemble Classifier based Method for Effective Fault Localization. ICSOFT 2022: 159-166 - Lavinia Egidi, Paola Giannini, Lorenzo Ventura:
Multiparty-session-types Coordination for Core Erlang. ICSOFT 2022: 532-541 - Mourad Ellouze, Seifeddine Mechti, Lamia Hadrich Belguith:
Deep Learning CNN-LSTM Approach for Identifying Twitter Users Suffering from Paranoid Personality Disorder. ICSOFT 2022: 612-621 - Gencer Erdogan, Inger Anne Tøndel, Shukun Tokas, Michele Garau, Martin Gilje Jaatun:
Needs and Challenges Concerning Cyber-risk Assessment in the Cyber-physical Smart Grid. ICSOFT 2022: 21-32 - Peter Fettke, Wolfgang Reisig:
Breathing Life into Models: The Next Generation of Enterprise Modeling. ICSOFT 2022: 7-14 - Imene Guerfi, Lobna Kriaa, Leïla Azouz Saïdane:
Towards Automatic Block Size Tuning for Image Processing Algorithms on CUDA. ICSOFT 2022: 591-601 - Tamara Gunkel, Thomas Hupperich:
Discovering Vulnerabilities and Patches for Open Source Security. ICSOFT 2022: 641-648 - Bram Hooimeijer, Marc Geilen, Jan Friso Groote, Dennis Hendriks, Ramon R. H. Schiffelers:
Constructive Model Inference: Model Learning for Component-based Software Architectures. ICSOFT 2022: 146-158 - Henry Hosseini, Julian Rengstorf, Thomas Hupperich:
Automated Search for Leaked Private Keys on the Internet: Has Your Private Key Been Pwned? ICSOFT 2022: 649-656 - Stefan Huber, Fabio Knoll, Mario Döller:
A Pipeline-oriented Processing Approach to Continuous and Long-term Web Scraping. ICSOFT 2022: 441-448 - Robert Husák, Jan Kofron, Jakub Mísek, Filip Zavoral:
Using Procedure Cloning for Performance Optimization of Compiled Dynamic Languages. ICSOFT 2022: 175-186 - Maroua Idi, Sana Younès, Riadh Robbana:
Performance Evaluation of Call Admission Control Strategy in Cloud Radio Access Network using Formal Methods. ICSOFT 2022: 630-640 - Noureen Islam, Noor-E.-Sadman
, Mahmudul Islam
, Mahady Hasan:
Air Quality Monitoring of Bangladesh (AQM): Data Driven Analysis System. ICSOFT 2022: 205-212 - Fauzia Khan, Ishaya Gambo:
Incorporating Privacy Requirements in Smart Communities for Older Adults: A Research Vision. ICSOFT 2022: 242-249 - Giuseppe Lami, Giorgio Oronzo Spagnolo:
A Lightweight Software Product Quality Evaluation Method. ICSOFT 2022: 524-531 - Tobias Landsberg, Christian Dietrich, Daniel Lohmann:
TASTING: Reuse Test-case Execution by Global AST Hashing. ICSOFT 2022: 33-45 - Sylvain Lejamble, Ilham Alloui, Sébastien Monnet, Flavien Vernier:
A New Software Architecture for the Wise Object Framework: Multidimensional Separation of Concerns. ICSOFT 2022: 567-574
skipping 1,912 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2023-01-28 14:52 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint