


Остановите войну!
for scientists:
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 320 matches
- 2022
- Saravanan Krishnan, Alex Mathai, Amith Singhee, Atul Kumar, Shivali Agarwal, Keerthi Narayan Raghunath, David Wenk:
Incremental Analysis of Legacy Applications Using Knowledge Graphs for Application Modernization. COMAD/CODS 2022: 250-254 - Marius Breitmayer, Lisa Arnold, Manfred Reichert:
Towards Retrograde Process Analysis in Running Legacy Applications (short paper). ZEUS 2022: 11-15 - 2021
- Stephen Herwig:
Execution Environments for Running Legacy Applications in Multi-Party Trust Settings. University of Maryland, College Park, MD, USA, 2021 - Viviana Elizabeth Cajas, Matias Urbieta
, Gustavo Rossi, Yves Rybarczyk:
Migrating legacy Web applications. Clust. Comput. 24(2): 1033-1049 (2021) - Rohit Punnoose, Supriya Kumar De:
Phase-wise migration of multiple legacy applications-A graph-theoretic approach. Inf. Softw. Technol. 137: 106606 (2021) - Aakash Ahmad
, Adel Alkhalil, Ahmed B. Altamimi, Khalid Sultan, Wilayat Khan:
Modernizing Legacy Software as Context - Sensitive and Portable Mobile-Enabled Application. IT Prof. 23(1): 42-50 (2021) - Aakash Ahmad
, Adel Alkhalil, Ahmed B. Altamimi
, Khalid Sultan
, Wilayat Khan
:
Corrections to "Modernizing Legacy Software as Context-Sensitive and Portable Mobile-Enabled Application". IT Prof. 23(3): 110 (2021) - Rodrigo Cataldo
, Ramon Fernandes
, Kevin J. M. Martin
, Jarbas Silveira
, Gustavo Sanchez
, Johanna Sepúlveda
, César A. M. Marcon
, Jean-Philippe Diguet
:
Subutai: Speeding Up Legacy Parallel Applications Through Data Synchronization. IEEE Trans. Parallel Distributed Syst. 32(5): 1102-1116 (2021) - Anup K. Kalia, Raghav Batta, Jin Xiao, Mihir Choudhury, Maja Vukovic:
ACA: Application Containerization Advisory Framework for Modernizing Legacy Applications. CLOUD 2021: 708-710 - Guillaume Rosinosky, Samir Youcef, François Charoy, Etienne Rivière:
A Methodology for Tenant Migration in Legacy Shared-Table Multi-tenant Applications. DAIS 2021: 3-20 - Barthélémy Dagenais, Hafedh Mili:
Slicing functional aspects out of legacy applications. CoRR abs/2109.12076 (2021) - 2020
- Mahadev Satyanarayanan, Thomas Eiszler, Jan Harkes, Haithem Turki, Ziqiang Feng:
Edge Computing for Legacy Applications. IEEE Pervasive Comput. 19(4): 19-28 (2020) - Rasoul Jahanshahi, Adam Doupé, Manuel Egele:
You shall not pass: Mitigating SQL Injection Attacks on Legacy Web Applications. AsiaCCS 2020: 445-457 - Ioannis Nompelis, Gabriele Jost, Alice Koniges, Christopher Daley, David Eder, Christopher Stone:
Enabling Execution of a Legacy CFD Mini Application on Accelerators Using OpenMP. ISC 2020: 270-287 - Rasoul Jahanshahi, Adam Doupé, Manuel Egele:
You shall not pass: Mitigating SQL Injection Attacks on Legacy Web Applications. CoRR abs/2006.11996 (2020) - 2019
- Rodrigo Cadore Cataldo:
Subutai : Distributed synchronization primitives for legacy and novel parallel applications. (Subutai : Primitives de synchronisation distribuées pour applications parallèles antérieures et émergentes). University of Southern Brittany, Vannes, Morbihan, France, 2019 - Mladen Matejas, Kresimir Fertalj:
Building a BPM application in an SOA-based legacy environment. Comput. Sci. Inf. Syst. 16(1): 45-74 (2019) - Manish Shukla, Kumar Vidhani, Gangadhara Reddy Sirigireddy, Vijayanand Banahatti, Sachin Lodha:
pFilter: Retrofitting Legacy Applications for Data Privacy. CCS 2019: 2573-2575 - Yuseok Jeon, Junghwan Rhee, Chung Hwan Kim
, Zhichun Li, Mathias Payer, Byoungyoung Lee, Zhenyu Wu:
PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications. CODASPY 2019: 209-220 - Anum Ghaffar, Majid Hussain:
BCEAP - A Blockchain Embedded Academic Paradigm to Augment Legacy Education through Application. ICFNDS 2019: 45:1-45:11 - Hoang Ho, Daniel Gordon, Anup K. Kalia, Jin Xiao, Maja Vukovic:
Janus: A Tool to Modernize Legacy Applications to Containers. ICSOC Workshops 2019: 304-307 - Viviana Elizabeth Cajas, Matias Urbieta, Yves Rybarczyk, Gustavo Rossi, César Guevara:
An Approach for Migrating Legacy Applications to Mobile Interfaces. WorldCIST (1) 2019: 916-927 - Hafedh Mili, Ghizlane El-Boussaidi, Anas Shatnawi, Yann-Gaël Guéhéneuc, Naouel Moha, Jean Privat, Petko Valtchev:
Service-Oriented Re-engineering of Legacy JEE Applications: Issues and Research Directions. CoRR abs/1906.00937 (2019) - 2018
- Kelly Garcés, Rubby Casallas, Camilo Álvarez, Edgar Sandoval
, Alejandro Salamanca, Fredy Viera, Fabián Melo, Juan Manuel Soto:
White-box modernization of legacy applications: The oracle forms case study. Comput. Stand. Interfaces 57: 110-122 (2018) - Marion Guthmuller, Gabriel Corona, Martin Quinson
:
System-level state equality detection for the formal dynamic verification of legacy distributed applications. J. Log. Algebraic Methods Program. 96: 1-11 (2018) - Geoffrey Hecht
, Hafedh Mili, Ghizlane El-Boussaidi, Anis Boubaker, Manel Abdellatif, Yann-Gaël Guéhéneuc, Anas Shatnawi, Jean Privat, Naouel Moha:
Codifying Hidden Dependencies in Legacy J2EE Applications. APSEC 2018: 305-314 - Kris Heid
, Jakob Wenzel
, Christian Hochberger:
Fast DSE for Automated Parallelization of Embedded Legacy Applications. ARC 2018: 471-484 - Rodrigo Cataldo, Ramon Fernandes, Kevin J. M. Martin
, Johanna Sepúlveda, Altamiro Amadeu Susin, César A. M. Marcon
, Jean-Philippe Diguet:
Subutai: distributed synchronization primitives in NoC interfaces for legacy parallel-applications. DAC 2018: 83:1-83:6 - Jori Kern, Deniz Tas, Hannes Ulrich, Esther E. Schmidt, Josef Ingenerf
, Frank Ückert, Martin Lablans:
A Method to Use Metadata in Legacy Web Applications: The Samply.MDR.Injector. GMDS 2018: 45-49 - José Matías Rivero, Matias Urbieta
, Sergio Firmenich, Mauricio Witkin, Ramón Serrano, Viviana Elizabeth Cajas, Gustavo Rossi:
Improving Legacy Applications with Client-Side Augmentations. ICWE 2018: 162-176
skipping 290 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2022-05-17 23:53 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint