![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 79 matches
- 2010
- Isabel María del Águila, José del Sagrado, Samuel Túnez, Francisco Javier Orellana:
Seamless Software Development for Systems based on Bayesian Networks - An Agricultural Pest Control System Example. ICSOFT (2) 2010: 456-461 - Ahmad Ahdab, Marc Le Goc:
Learning Dynamic Bayesian Networks with the TOM4L Process. ICSOFT (2) 2010: 353-363 - Gábor Alberti, Márton Károly, Judit Kleiber:
The Realis Model of Human Interpreters and Its Application in Computational Linguistics. ICSOFT (2) 2010: 468-474 - Bastien Amar, Hervé Leblanc, Bernard Coulette, Philippe Dhaussy:
Trace Transformation Reuse to Guide Co-evolution of Models. ICSOFT (2) 2010: 73-81 - Manuela Angioni, Emanuela De Vita, Cristian Lai, Ivan Marcialis, Gavino Paddeu, Franco Tuveri:
A Semantic Search Engine for a Business Network - A Personalized Vision of the Web applied to a Business Network. ICSOFT (2) 2010: 475-480 - László Angyal, László Lengyel, Tamás Mészáros, Hassan Charaf:
Textual Syntax Mapping can Enable Syntactic Merging. ICSOFT (2) 2010: 308-311 - José Elias Araújo, Henrique Rebêlo, Ricardo Massa Ferreira Lima, Alexandre Mota, Fernando Castor, Tiago Lima, Juliana Lucena, Filipe Lima:
An Aspect-based Approach for Concurrent Programming using CSP Features. ICSOFT (2) 2010: 226-231 - Francesca Arcelli, Gianluigi Viscusi, Marco Zanoni:
Unifying Software and Data Reverse Engineering - A Pattern based Approach. ICSOFT (2) 2010: 208-213 - Leila Jemni Ben Ayed, Najet Hamdi, Yousra Bendaly Hlaoui:
An UML Activities Diagrams Translation into Event B Supporting the Specification and the Verification of Workflow Application Models - From UML Activities Diagrams to Event B. ICSOFT (2) 2010: 329-332 - Leila Jemni Ben Ayed, Ahlem Ben Younes, Amin Ben Brahim Achouri:
Using AToM3 for the Verification of Workflow Applications. ICSOFT (2) 2010: 32-39 - Linda Badri, Mourad Badri, Fadel Touré:
Exploring Empirically the Relationship between Lack of Cohesion in Object-oriented Systems and Coupling and Size. ICSOFT (2) 2010: 317-324 - Nabil Benayadi, Marc Le Goc:
Mining Timed Sequences to Find Signatures. ICSOFT (2) 2010: 450-455 - Paul Bogg, Graham Low, Brian Henderson-Sellers, Ghassan Beydoun:
Work Product-driven Software Development Methodology Improvement. ICSOFT (2) 2010: 5-13 - Stefan D. Bruda, Zhiyu Zhang:
Model Checking is Refinement - From Computation Tree Logic to Failure Trace Testing. ICSOFT (2) 2010: 173-178 - Matthieu Carlier, Catherine Dubois, Arnaud Gotlieb:
Constraint Reasoning in FocalTest. ICSOFT (2) 2010: 82-91 - Nadina Martinez Carod, Alejandra Cechich:
Cognitive Influences in Prioritizing Software Requirements. ICSOFT (2) 2010: 214-219 - Costin-Gabriel Chiru, Valentin Cojocaru, Traian Rebedea, Stefan Trausan-Matu:
Malapropisms Detection and Correction using a Paronyms Dictionary, a Search Engine and Wordnet. ICSOFT (2) 2010: 364-373 - Costin-Gabriel Chiru, Andrei Hanganu, Traian Rebedea, Stefan Trausan-Matu:
Filling the Gaps using Google 5-Grams Corpus. ICSOFT (2) 2010: 438-443 - Nan-Hsing Chiu, Pei-Da Lin, Chang En Pu:
Integration of Apriori Algorithms with Case-based Reasoning for Flight Accident Investigation. ICSOFT (2) 2010: 487-490 - Alina Corso-Radu, Raul Murillo Garcia, Andrei Kazarov, Giovanna Lehmann Miotto, Luca Magnoni, John Erik Sloper:
Applications of Expert System Technology in the Atlas TDAQ Controls Framework. ICSOFT (2) 2010: 512-516 - Andrea Delgado, Francisco Ruiz, Ignacio García Rodríguez de Guzmán, Mario Piattini:
Application of Service-oriented Computing and Model-driven Development Paradigms to Business Processes - A Systematic Review. ICSOFT (2) 2010: 51-62 - Mariam Dibo, Noureddine Belkhatir:
Model-driven Deployment of Distributed Components-based Software. ICSOFT (2) 2010: 102-110 - Gilles Dodinet, Michel Zamfirou, Geneviève Jomier:
Coevolutive Meta-execution Support - Towards a Design and Execution Continuum. ICSOFT (2) 2010: 143-150 - Philippe Dugerdil, Sebastien Jossi:
A Legacy Systems use Case Recovery Method. ICSOFT (2) 2010: 232-237 - Ana M. Fernández-Sáez, Marcela Genero Bocco, Francisco P. Romero:
SLR-Tool - A Tool for Performing Systematic Literature Reviews. ICSOFT (2) 2010: 157-166 - Athula Ginige:
Meta-design Paradigm based Approach for Iterative Rapid Development of Enterprise Web Applications. ICSOFT (2) 2010: 337-343 - José Ramón Hilera, Luis Fernández Sanz, Marina Cabello:
Web Tool for Object Oriented Design Metrics. ICSOFT (2) 2010: 300-303 - Veit Hoffmann, Horst Lichter:
A Model-based Narrative use Case Simulation Environment. ICSOFT (2) 2010: 63-72 - Philip R. Huffman, Susan A. Mengel:
Web Services for Higher Integrity Instrument Control. ICSOFT (2) 2010: 151-156 - Bernhard G. Humm, Ralf Sascha Engelschall:
Language-Oriented Programming Via DSL Stacking. ICSOFT (2) 2010: 279-287
skipping 49 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-19 07:27 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint