
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 35 matches
- 2020
- Babu Veeresh Thummadi, Kalle Lyytinen:
How Much Method-in-Use Matters? A Case Study of Agile and Waterfall Software Projects and their Design Routine Variation. J. Assoc. Inf. Syst. 21(4): 7 (2020) - Jesús Cámara, Javier Cuenca, Domingo Giménez:
Integrating software and hardware hierarchies in an autotuning method for parallel routines in heterogeneous clusters. J. Supercomput. 76(12): 9922-9941 (2020) - 2019
- Tomas Gustavsson:
Dynamics of Inter-Team Coordination Routines in Large-Scale Agile Software Development. ECIS 2019 - 2018
- Robin A. Gandhi, Matt Germonprez, Georg J. P. Link
:
Open Data Standards for Open Source Software Risk Management Routines: An Examination of SPDX. GROUP 2018: 219-229 - Abdourahim Sylla, Delphine Guillon, Luis Garces, Élise Vareilles, Luis Garcés Monge, Thierry Coudert, Laurent Geneste:
How to Use Configuration Software in "Less Routine Design" Situations? Some Modelling Propositions. IEEM 2018: 1279-1283 - 2017
- Andreas Poller, Laura Kocksch, Sven Türpe, Felix Anand Epp, Katharina Kinder-Kurlanda:
Can Security Become a Routine?: A Study of Organizational Change in an Agile Software Development Group. CSCW 2017: 2489-2503 - 2016
- Alexander Noack:
Hardware-Software-System zum ambulanten EKG-Monitoring unter Routinebedingungen. Dresden University of Technology, Germany, 2016, pp. 1-184 - Denniz Dönmez, Gudela Grote
, Stefano Brusoni:
Routine interdependencies as a source of stability and flexibility. A study of agile software development teams. Inf. Organ. 26(3): 63-83 (2016) - Xinyu Li, Youngjin Yoo, Zhewei Zhang:
Searching for "Stability" in Fluidity: A Routine-based View of Open Source Software Development Process. ICIS 2016 - 2015
- Tianjie Deng, William N. Robinson:
Diversity in Software Development Routines are Attractive: A Preliminary Analysis of GitHub Repositories. AMCIS 2015 - Freddie Mbuba
, William Yu Chung Wang, Karin Olesen:
Sociomateriality Implications of Software as a Service Adoption on IT-Workers' Roles and Changes in Organizational Routines of IT Systems Support. MISNC 2015: 249-263 - 2014
- Mario Schölzel, Tobias Koal, Heinrich Theodor Vierhaus:
Systematic generation of diagnostic software-based self-test routines for processor components. ETS 2014: 1-6 - Morten Esbensen, Pernille Bjørn:
Routine and Standardization in Global Software Development. GROUP 2014: 12-23 - 2013
- Hannah Oppel:
Entwicklung und Evaluation einer Software zur Analyse der Herzfrequenzvariabilität auf Basis des Routine-EKG'S. University of Kiel, 2013, pp. 1-71 - Frank Zöllner
, Gerald Weisser, Marcel Reich, Sven Kaiser, Stefan O. Schoenberg, Steven P. Sourbron, Lothar R. Schad:
UMMPerfusion: an Open Source Software Tool Towards Quantitative MRI Perfusion Analysis in Clinical Routine. J. Digit. Imaging 26(2): 344-352 (2013) - Christoph Johann Stettina, Zhao Zhou, Thomas Bäck, Bernhard R. Katzy:
Academic education of software engineering practices: towards planning and improving capstone courses based upon intensive coaching and team routines. CSEE&T 2013: 169-178 - Alfredo Veiga de Carvalho, Carlos José Pereira de Lucena, Elder José Reioli Cirilo, Paulo Henrique Cardoso Alves
, Pedro Augusto da Silva e Souza Miranda, Gustavo Robichez de Carvalho, Fábio Rodrigo Lopes de Araújo, Gabriel Vial Correa Lima:
Software Engineering in Telehealth, an Extension of Sana Mobile Applied to the Process of a Routine Hospital. HCI (2) 2013: 3-12 - 2011
- Ivica Crnkovic, Judith A. Stafford, Clemens A. Szyperski:
Software Components beyond Programming: From Routines to Services. IEEE Softw. 28(3): 22-26 (2011) - Babu Veeresh Thummadi, Omri Shiv, Nicholas Berente
, Kalle Lyytinen:
Enacted Software Development Routines Based on Waterfall and Agile Software Methods: Socio-Technical Event Sequence Study. DESRIST 2011: 207-222 - 2010
- Kalle Lyytinen, Gregory M. Rose
, Youngjin Yoo
:
Learning routines and disruptive technological change: Hyper-learning in seven software development organizations during internet adoption. Inf. Technol. People 23(2): 165-192 (2010) - Andreas Möller:
Software-Unterstützung für Routine im betrieblichen Umweltschutz. EnviroInfo 2010: 375-382 - 2009
- Andrea Nitrosi, Marco Bertolini
, Giovanni Borasi
, Andrea Botti, Adriana Barani, Stefano Rivetti, Luisa Pierotti:
Application of QC_DR Software for Acceptance Testing and Routine Quality Control of Direct Digital Radiography Systems: Initial Experiences using the Italian Association of Physicist in Medicine Quality Control Protocol. J. Digit. Imaging 22(6): 656-666 (2009) - Aregahegn Seifu Negatu:
Cognitively Inspired Decision Making for Software Agents: Integrated Mechanisms for Action Selection, Expectation, Automatization and Non-Routine Problem Solving. Knowl. Eng. Rev. 24(4): 410 (2009) - 2004
- Dimitris Gizopoulos:
Low-cost, on-line self-testing of processor cores based on embedded software routines. Microelectron. J. 35(5): 443-449 (2004) - 2003
- Zizhong Chen, Jack J. Dongarra, Piotr Luszczek, Kenneth Roche:
Self-Adapting Software for Numerical Linear Algebra Library Routines on Clusters. International Conference on Computational Science 2003: 665-672 - 1999
- Francesco Quaglia:
Fast-Software-Checkpointing in Optimistic Simulation: Embedding State Saving into the Event Routine Instructions. Workshop on Parallel and Distributed Simulation 1999: 118-125 - 1998
- Gwenaëlle Collod-Béroud
, Christophe Béroud
, Lesley Adès, Cheryl Black, Maureen Boxer, David J. H. Brock, Katherine J. Holman, Anne De Paepe, Uta Francke, Ulrich Grau, Caroline Hayward
, Hanns-Georg Klein, Wanguo Liu, Lieve Nuytinck
, Leena Peltonen, Ana Beatriz Alvarez Perez, Terhi Rantamäki, Claudine Junien, Catherine Boileau
:
Marfan Database (third edition): new mutations and new routines for the software. Nucleic Acids Res. 26(1): 229-233 (1998) - 1996
- Vladimir M. Tsivkin:
Live Shortand Prosper: Applying Cost Analysis to Routine Software Maintenance Procedures. J. Softw. Maintenance Res. Pract. 8(4): 257-267 (1996) - 1991
- Colin C. Charlton, Paul H. Leng, Janet Little:
Vertical Migration of Numerical Routines in Software and Microcode. Softw. Pract. Exp. 21(3): 287-297 (1991) - 1986
- Paul Jansen, Peter Weidner:
High-accuracy arithmetic software - some tests of the ACRITH problem-solving routines. ACM Trans. Math. Softw. 12(1): 62-70 (1986)
skipping 5 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2021-01-28 14:21 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint