Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 59 matches
- 2014
- Fatima Azzahra Amazal, Ali Idri, Alain Abran:
Improving Fuzzy Analogy Based Software Development Effort Estimation. APSEC (1) 2014: 247-254 - Jia-Ju Bai, Hu-Qiu Liu, Yu-Ping Wang, Shi-Min Hu:
Runtime Checking for Paired Functions in Device Drivers. APSEC (1) 2014: 407-414 - Boutheina Bannour, Jose Pablo Escobedo, Christophe Gaston, Pascale Le Gall, Gabriel Pedroza:
Security Weaknesses Detection by Symbolic Analysis of Scenarios. APSEC (1) 2014: 367-374 - Shengbo Chen, Dashen Sun, Huaikou Miao, Hongwei Zeng:
Modeling and Testing of GUIs Using IOLTS. APSEC (1) 2014: 35-42 - Yu-Fang Chen, Bow-Yaw Wang, Kai-Chun Yang:
Learning Summaries of Recursive Functions. APSEC (1) 2014: 303-310 - Hyun Cho:
Traceability-Driven System Development and its Application to Automotive System Development. APSEC (1) 2014: 143-146 - Yunja Choi, Min Zhang, Kazuhiro Ogata:
Evaluation of Maude as a Test Generation Engine for Automotive Operating Systems. APSEC (1) 2014: 295-302 - Ana Dragomir, Horst Lichter, Johannes Dohmen, Hongyu Chen:
Run-Time Monitoring-Based Evaluation and Communication Integrity Validation of Software Architectures. APSEC (1) 2014: 191-198 - Guisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu:
Formal Modeling and Analyzing the Reliability for Service Composition. APSEC (1) 2014: 86-93 - Xianjin Fu, Zhenbang Chen, Chun Huang, Wei Dong, Ji Wang:
Synchronization Error Detection of MPI Programs by Symbolic Execution. APSEC (1) 2014: 127-134 - Reiko Fujimoto, Mikio Aoyama:
A Lifecycle-Based Design Methodology of the Lightweight Ontology and Its Application to Cultivating High Quality Mandarin Orange. APSEC (1) 2014: 147-150 - Monika Gupta, Ashish Sureka:
Process Cube for Software Defect Resolution. APSEC (1) 2014: 239-246 - Ah-Rim Han, Doo-Hwan Bae:
An Efficient Method for Assessing the Impact of Refactoring Candidates on Maintainability Based on Matrix Computation. APSEC (1) 2014: 430-437 - Yin Hang, Hans Hansson:
Handling Emergency Mode Switch for Component-Based Systems. APSEC (1) 2014: 151-158 - Truong Ho-Quang, Michel R. V. Chaudron, Ingimar Samuelsson, Joel Hjaltason, Bilal Karasneh, Hafeez Osman:
Automatic Classification of UML Class Diagrams from Images. APSEC (1) 2014: 399-406 - Kiyoshi Honda, Hidenori Nakai, Hironori Washizaki, Yoshiaki Fukazawa, Ken Asoh, Kazuyoshi Takahashi, Kentarou Ogawa, Maki Mori, Takashi Hino, Yosuke Hayakawa, Yasuyuki Tanaka, Shinichi Yamada, Daisuke Miyazaki:
Predicting Time Range of Development Based on Generalized Software Reliability Model. APSEC (1) 2014: 351-358 - Yuan Huang, Xiangping Chen, Qiwen Zou, Xiaonan Luo:
A Probabilistic Neural Network-Based Approach for Related Software Changes Detection. APSEC (1) 2014: 279-286 - Hossain Muhammad Iqbal, Woo Jin Lee:
Data Flow Based Integration Testing for Embedded System Using Interaction Model. APSEC (1) 2014: 423-429 - Vijay Jain, Amol Kolambkar:
Modeling Web Attachment Storage for Web Applications. APSEC (1) 2014: 98-102 - Damodaram Kamma, Sasi Kumar G:
Effect of Model Based Software Development on Productivity of Enhancement Tasks - An Industrial Study. APSEC (1) 2014: 71-77 - Tomoyuki Kawamura, Kenichi Takano:
Factors Affecting the Project Performance of Information Systems Development: Comparison of Organizational Cultures. APSEC (1) 2014: 327-334 - Yunho Kim, Moonzoo Kim:
SAT-Based Bounded Software Model Checking for Embedded Software: A Case Study. APSEC (1) 2014: 55-62 - Pavneet Singh Kochhar, Ferdian Thung, David Lo, Julia Lawall:
An Empirical Study on the Adequacy of Testing in Open Source Projects. APSEC (1) 2014: 215-222 - Jung-Hyun Kwon, In-Young Ko, Gregg Rothermel, Matt Staats:
Test Case Prioritization Based on Information Retrieval Concepts. APSEC (1) 2014: 19-26 - Henrik Larsson, Erik Lindqvist, Richard Torkar:
Outliers and Replication in Software Engineering. APSEC (1) 2014: 207-214 - Youn Kyu Lee, Hoh Peter In, Rick Kazman:
Customer Requirements Validation Method Based on Mental Models. APSEC (1) 2014: 199-206 - Heuijin Lee, Sungwon Kang, Myungchul Kim:
An Efficient Application-Device Matching Method for the Mobile Software Ecosystem. APSEC (1) 2014: 175-182 - Dong-Ah Lee, Junbeom Yoo, Jang-Soo Lee:
Guidelines for the Use of Function Block Diagram in Reactor Protection Systems. APSEC (1) 2014: 135-142 - Xin Li, Yanhong Huang, Jianqi Shi, Jian Guo, Huibiao Zhu, Yuanmin Xu:
pIML - An Interrupt Program Modelling Language for Real-Time and Embedded Systems. APSEC (1) 2014: 78-85 - Xiujiang Li, Yanyan Jiang, Yepang Liu, Chang Xu, Xiaoxing Ma, Jian Lu:
User Guided Automation for Testing Mobile Apps. APSEC (1) 2014: 27-34
skipping 29 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-28 16:29 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint