![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 57 matches
- 2010
- Nadeem Abbas, Jesper Andersson, Welf Löwe:
Autonomic Software Product Lines (ASPL). ECSA Companion Volume 2010: 324-331 - Mads Schaarup Andersen:
Architectural mismatch issues in identity management deployment. ECSA Companion Volume 2010: 31-33 - Pablo Oliveira Antonino, Slawomir Duszynski, Christian Jung
, Manuel Rudolph:
Indicator-based architecture-level security evaluation in a service-oriented environment. ECSA Companion Volume 2010: 221-228 - Mohsen Anvaari, Slinger Jansen
:
Evaluating architectural openness in mobile software platforms. ECSA Companion Volume 2010: 85-92 - Jakob Axelsson:
Towards a process maturity model for evolutionary architecting of embedded system product lines. ECSA Companion Volume 2010: 36-42 - Ivo van den Berk, Slinger Jansen
, Lutzen Luinenburg:
Software ecosystems: a software ecosystem strategy assessment model. ECSA Companion Volume 2010: 127-134 - Diego Bernini:
Architectural abstractions for space and time awareness: the case of responsive environments. ECSA Companion Volume 2010: 12-16 - Lorenzo Blasi, Reijo Savola, Habtamu Abie, Domenico Rotondi
:
Applicability of security metrics for adaptive security management in a universal banking hub system. ECSA Companion Volume 2010: 197-204 - Jan Bosch:
Architecture challenges for software ecosystems. ECSA Companion Volume 2010: 93-95 - Piers R. J. Campbell, Faheem Ahmed:
A three-dimensional view of software ecosystems. ECSA Companion Volume 2010: 81-84 - Piers R. J. Campbell, Faheem Ahmed, Jan Bosch, Slinger Jansen
:
2nd International Workshop on Software Ecosystems (EcoSys). ECSA Companion Volume 2010: 63-64 - Bogdan Alexandru Caprarescu:
Robustness and scalability: a dual challenge for autonomic architectures. ECSA Companion Volume 2010: 22-26 - Renato A. C. Capuruço, Luiz Fernando Capretz:
Integrating recommender information in social ecosystems decisions. ECSA Companion Volume 2010: 143-150 - Marcelo Cataldo, James D. Herbsleb
:
Architecting in software ecosystems: interface translucence as an enabler for scalable collaboration. ECSA Companion Volume 2010: 65-72 - Deepak Dhungana
, Iris Groher
, Elisabeth Schludermann, Stefan Biffl:
Software ecosystems vs. natural ecosystems: learning from the ingenious mind of nature. ECSA Companion Volume 2010: 96-102 - Antti Evesti
, Susanna Pantsar-Syväniemi:
Towards micro architecture for security adaptation. ECSA Companion Volume 2010: 181-188 - Matthias Galster:
Describing variability in service-oriented software product lines. ECSA Companion Volume 2010: 344-350 - Ismênia Galvão, Pim van den Broek, Mehmet Aksit:
A model for variability design rationale in SPL. ECSA Companion Volume 2010: 332-335 - Bas Geertsema, Slinger Jansen
:
Increasing software product reusability and variability using active components: a software product line infrastructure. ECSA Companion Volume 2010: 336-343 - Arne-Kristian Groven, Kirsten Haaland, Ruediger Glott, Anna Tannenberg:
Security measurements within the framework of quality assessment models for free/libre open source software. ECSA Companion Volume 2010: 229-235 - Perttu Halonen, Kimmo Hätönen:
Towards holistic security management through coherent measuring. ECSA Companion Volume 2010: 155-161 - Brahim Hamid
, Fatma Krichen:
Model-based engineering for dynamic reconfiguration in DRTES. ECSA Companion Volume 2010: 269-276 - Alexander Helleboogh, Paris Avgeriou
, Nelis Boucké, Patrick Heymans:
Workshop on Variability in Software Product Line Architectures (VARI-ARCH 2010). ECSA Companion Volume 2010: 309-311 - Rich Hilliard:
On representing variation. ECSA Companion Volume 2010: 312-315 - Ivo Hunink
, Rene van Erk, Slinger Jansen
, Sjaak Brinkkemper:
Industry taxonomy engineering: the case of the European software ecosystem. ECSA Companion Volume 2010: 111-118 - Teemu Kanstrén, Reijo Savola, Antti Evesti, Heimo Pentikäinen, Artur Hecker
, Moussa Ouedraogo, Kimmo Hätönen, Perttu Halonen, Christophe Blad, Óscar López, Saioa Ros:
Towards an abstraction layer for security assurance measurements: (invited paper). ECSA Companion Volume 2010: 189-196 - Ronny Kolb, Martin Naedele:
ECSA 2010 Industry Track. ECSA Companion Volume 2010: 35 - Siming Kou, Muhammad Ali Babar, Amit Sangroya:
Modeling security for service oriented applications. ECSA Companion Volume 2010: 294-301 - Leanid Krautsevich, Fabio Martinelli, Artsiom Yautsiukhin
:
Formal approach to security metrics.: what does "more secure" mean for you? ECSA Companion Volume 2010: 162-169 - Ivano Malavolta
:
A model-driven approach for managing software architectures with multiple evolving concerns. ECSA Companion Volume 2010: 4-8
skipping 27 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-21 14:50 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint