Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 31 matches
- 2015
- Daniel Romero, Clément Quinton, Laurence Duchien, Lionel Seinturier, Carolina Valdez:
SmartyCo: Managing Cyber-Physical Systems for Smart Environments. ECSA 2015: 294-302 - Nadeem Abbas, Jesper Andersson:
Architectural Reasoning Support for Product-Lines of Self-adaptive Software Systems - A Case Study. ECSA 2015: 20-36 - Ashish Agrawal, T. V. Prabhakar:
Towards a Framework for Building Adaptive App-Based Web Applications Using Dynamic Appification. ECSA 2015: 37-44 - Frederico Alvares, Éric Rutten, Lionel Seinturier:
High-Level Language Support for Reconfiguration Control in Component-Based Architectures. ECSA 2015: 3-19 - Simone da Silva Amorim, John D. McGregor, Eduardo Santana de Almeida, Christina von Flach G. Chavez:
Tailoring the ATAM for Software Ecosystems. ECSA 2015: 372-380 - Samuil Angelov, Patrick de Beer:
An Approach to Software Architecting in Agile Software Development Projects in Education. ECSA 2015: 157-168 - Luciano Baresi, Adnan Shahzada:
An Architecture-Centric Approach for Dynamic Smart Spaces. ECSA 2015: 277-284 - Alvine Boaye Belle, Ghizlane El-Boussaidi, Christian Desrosiers, Segla Kpodjedo, Hafedh Mili:
The Layered Architecture Recovery as a Quadratic Assignment Problem. ECSA 2015: 339-354 - Eduardo B. Fernández, Hernán Astudillo, Gilberto Pedraza-Garcia:
Revisiting Architectural Tactics for Security. ECSA 2015: 55-69 - Matthias Galster, Samuil Angelov:
Understanding the Use of Reference Architectures in Agile Software Development Projects. ECSA 2015: 268-276 - Ilias Gerostathopoulos, Tomás Bures, Petr Hnetynka, Adam Hujecek, Frantisek Plásil, Dominik Skoda:
Meta-Adaptation Strategies for Adaptation in Cyber-Physical Systems. ECSA 2015: 45-52 - Iris Groher, Rainer Weinreich:
Collecting Requirements and Ideas for Architectural Group Decision-Making Based on Four Approaches. ECSA 2015: 181-192 - Klaus Marius Hansen, Konstantinos Manikas:
(Automated) Software Modularization Using Community Detection. ECSA 2015: 95-102 - Erik Jagroep, Jan Martijn E. M. van der Werf, Ruvar Spauwen, Leen Blom, Rob van Vliet, Sjaak Brinkkemper:
An Energy Consumption Perspective on Software Architecture - A Case Study on Architectural Change. ECSA 2015: 239-247 - Slinger Jansen:
Opening the Ecosystem Flood Gates: Architecture Challenges of Opening Interfaces Within a Product Portfolio. ECSA 2015: 121-136 - Sahar Kallel, Bastien Tramoni, Chouki Tibermacine, Christophe Dony, Ahmed Hadj Kacem:
Automatic Translation of Architecture Constraint Specifications into Components. ECSA 2015: 322-338 - Arvind W. Kiwelekar, Hansaraj S. Wankhede:
Learning Objectives for a Course on Software Architecture. ECSA 2015: 169-180 - Grace A. Lewis, Patricia Lago:
Characterization of Cyber-Foraging Usage Contexts. ECSA 2015: 195-211 - Henry Muccini, Damian A. Tamburri, V. Smrithi Rekha:
On the Social Dimensions of Architectural Decisions. ECSA 2015: 137-145 - Claus Pahl, Pooyan Jamshidi:
Software Architecture for the Cloud - A Roadmap Towards Control-Theoretic, Model-Based Cloud Architecture. ECSA 2015: 212-220 - Cesare Pautasso, Ana Ivanchikj, Silvia Schreier:
Modeling RESTful Conversations with Extended BPMN Choreography Diagrams. ECSA 2015: 87-94 - Florian Rademacher, Martin Peters, Sabine Sachweh:
Design of a Domain-Specific Language Based on a Technology-Independent Web Service Framework. ECSA 2015: 357-371 - Dominik Rost, Balthasar Weitzel, Matthias Naab, Torsten Lenhart, Hartmut Schmitt:
Distilling Best Practices for Agile Development from Architecture Methodology - Experiences from Industrial Application. ECSA 2015: 259-267 - Mojtaba Shahin, Muhammad Ali Babar:
Improving the Quality of Architecture Design Through Peer-Reviews and Recombination. ECSA 2015: 70-86 - Harald Sporer, Georg Macher, Christian Kreiner, Eugen Brenner:
A Lean Automotive E/E-System Design Approach with Integrated Requirements Management Capability. ECSA 2015: 251-258 - Christian Stier, Anne Koziolek, Henning Groenda, Ralf H. Reussner:
Model-Based Energy Efficiency Analysis of Software Architectures. ECSA 2015: 221-238 - Amal Tahri, Laurence Duchien, Jacques Pulou:
Using Feature Models for Distributed Deployment in Extended Smart Home Architecture. ECSA 2015: 285-293 - Antony Tang, Hans van Vliet:
Software Designers Satisfice. ECSA 2015: 105-120 - Catia Trubiani, Achraf Ghabi, Alexander Egyed:
Exploiting Traceability Uncertainty Between Software Architectural Models and Performance Analysis Results. ECSA 2015: 305-321 - Zhenchen Wang, Andrea Capiluppi:
A Specialised Social Network Software Architecture for Efficient Household Water Use Management. ECSA 2015: 146-153
skipping 1 more match
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-04 19:29 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint