Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 48 matches
- 2016
- Farid Adaili, Olfa Mosbahi, Mohamed Khalgui, Samia Bouzefrane:
RA2DL-Pool: New Useful Solution to Handle Security of Reconfigurable Embedded Systems. ENASE 2016: 102-111 - Mourad Badri, Linda Badri, William Flageol:
Source and Test Code Size Prediction - A Comparison between Use Case Metrics and Objective Class Points. ENASE 2016: 172-180 - Paul A. Bailes, Colin J. M. Kemp:
Zoetic Data and their Generators. ENASE 2016: 260-271 - Maria-Iuliana Bocicor, Arthur-Jozsef Molnar, Cristian Taslitchi:
Preventing Hospital Acquired Infections through a Workflow-based Cyber-physical System. ENASE 2016: 63-68 - Khusbu Bubna:
End to End Specification based Test Generation of Web Applications. ENASE 2016: 296-302 - Thomas Buchmann, Felix Schwägerl:
Breaking the Boundaries of Meta Models and Preventing Information Loss in Model-Driven Software Product Lines. ENASE 2016: 73-83 - David Chen, René Hexel, Fawad Riasat Raja:
Engineering Real-Time Communication Through Time-triggered Subsumption - Towards Flexibility with INCUS and LLFSMs. ENASE 2016: 272-281 - Kattiana Constantino, Juliana Alves Pereira, Juliana Padilha, Priscilla Vasconcelos, Eduardo Figueiredo:
An Empirical Study of Two Software Product Line Tools. ENASE 2016: 164-171 - Ernesto Damiani:
Towards Model-Driven Big-Data-as-a-Service. ENASE 2016: 9 - Irvin Dongo, Vanea Chiprianov:
Semi-automatic Generation of OrBAC Security Rules for Cooperative Organizations using Model-Driven Engineering. ENASE 2016: 43-50 - Sudakshina Dutta, Dipankar Sarkar:
An Enhanced Equivalence Checking Method to Handle Bugs in Programs with Recurrences. ENASE 2016: 254-259 - Sudakshina Dutta, Dipankar Sarkar, Arvind Rawat, Kulwant Singh:
Validation of Loop Parallelization and Loop Vectorization Transformations. ENASE 2016: 195-202 - Noureddine Gasmallah, Abdelkrim Amirat, Mourad Oussalah:
Evolution Taxonomy for Software Architecture Evolution. ENASE 2016: 124-131 - Jens Gulden, Dirk van der Linden, Banu Aysolmaz:
A Research Agenda on Visualizations in Information Systems Engineering. ENASE 2016: 234-240 - Sergio Gusmeroli:
The Sensing Enterprise - Enterprise Information Systems in the Internet of Things. ENASE 2016: 5 - Ethan Hadar, Irit Hadar:
CURA: Complex-system Unified Reference Architecture - Position Paper: A Practitioner View. ENASE 2016: 216-221 - James Harland, Jan Olaf Blech, Ian Peake, Luke Trodd:
Formal Behavioural Models to Facilitate Distributed Development and Commissioning in Industrial Automation. ENASE 2016: 363-369 - Sebastian Heil, Martin Gaedke:
AWSM - Agile Web Migration for SMEs. ENASE 2016: 189-194 - Peter Herrmann, Alexander Svae, Henrik Heggelund Svendsen, Jan Olaf Blech:
Collaborative Model-based Development of a Remote Train Monitoring System. ENASE 2016: 383-390 - Simon Hordvik, Kristoffer Øseth, Jan Olaf Blech, Peter Herrmann:
A Methodology for Model-based Development and Safety Analysis of Transport Systems. ENASE 2016: 91-101 - Ali Idri, Mohamed Hosni, Alain Abran:
Systematic Mapping Study of Ensemble Effort Estimation. ENASE 2016: 132-139 - Salim Kebir, Isabelle Borne, Djamel Meslati:
Automatic Refactoring of Component-based Software by Detecting and Eliminating Bad Smells - A Search-based Approach. ENASE 2016: 210-215 - Dirk van der Linden, Irit Hadar:
Evaluating the Evaluators - An Analysis of Cognitive Effectiveness Improvement Efforts for Visual Notations. ENASE 2016: 222-227 - Jorge López, Natalia Kushik, Nina Yevtushenko:
On Source Code Optimization for Interpreted Languages using State Models. ENASE 2016: 282-287 - Mohamed Naija, Samir Ben Ahmed:
Extending UML/MARTE-SAM for Integrating Adaptation Mechanisms in Scheduling View. ENASE 2016: 84-90 - Blazo Nastov, Vincent Chapurlat, Christophe Dony, François Pfister:
Towards Semantical DSMLs for Complex or Cyber-physical Systems. ENASE 2016: 115-123 - Erika Nazaruka, Viktorija Ovchinnikova, Gundars Alksnis, Uldis Sukovskis:
Verification of BPMN Model Functional Completeness by using the Topological Functioning Model. ENASE 2016: 349-358 - Janis Osis, Arturs Solomencevs:
Comparison of Topological Functioning Model for Software Engineering with BPMN Approach in the Context of Model Driven Architecture. ENASE 2016: 337-348 - Raja Oueslati, Olfa Mosbahi, Mohamed Khalgui, Samir Ben Ahmed:
A Novel R-UML-B Approach for Modeling and Code Generation of Reconfigurable Control Systems. ENASE 2016: 140-147 - Viktorija Ovchinnikova, Erika Nazaruka:
The Validation Possibility of Topological Functioning Model using the Cameo Simulation Toolkit. ENASE 2016: 327-336
skipping 18 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-05 03:35 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint