default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 37 matches
- 2011
- Julio Ariel Hurtado Alegria, María Cecilia Bastarrica, Alexandre Bergel:
Analyzing software process models with AVISPA. ICSSP 2011: 23-32 - Julio Ariel Hurtado Alegria, María Cecilia Bastarrica, Alcides Quispe, Sergio F. Ochoa:
An MDE approach to software process tailoring. ICSSP 2011: 43-52 - Ove Armbrust, H. Dieter Rombach:
The right process for each context: objective evidence needed. ICSSP 2011: 237-241 - Dejan Baca, Bengt Carlsson:
Agile development with security engineering activities. ICSSP 2011: 149-158 - Xu Bai, LiGuo Huang, He Zhang, Alexander Egyed:
GoPoMoSA: a goal-oriented process modeling and simulation advisor. ICSSP 2011: 194-198 - Pablo Becker, Philip Lew, Luis Olsina:
Strategy to improve quality for software applications: a process view. ICSSP 2011: 129-138 - Lorea Belategi, Goiuria Sagardui, Leire Etxeberria:
Model based analysis process for embedded software product lines. ICSSP 2011: 53-62 - Serdar Biçer, Ayse Basar Bener, Bora Çaglayan:
Defect prediction using social network analysis on issue repositories. ICSSP 2011: 63-71 - Thomas Birkhölzer, Hesam Chiniforooshan Esfahani, Christoph Dickmann, Jürgen Vaupel, Stefan Ast:
Goal-driven evaluation of process fragments using weighted dependency graphs. ICSSP 2011: 184-188 - Barry W. Boehm:
Software and systems engineering process implications of evolutionary development of evolutionary development. ICSSP 2011: 1 - Barry W. Boehm:
Towards richer process principles. ICSSP 2011: 234 - Carlton A. Crabtree, Anthony F. Norcio, Carolyn B. Seaman:
An empirical characterization of the accuracy of software process elicitation. ICSSP 2011: 91-100 - Frank Elberzhager, Jürgen Münch, H. Dieter Rombach, Bernd G. Freimut:
Optimizing cost and quality by integrating inspection and test processes. ICSSP 2011: 3-12 - Hesam Chiniforooshan Esfahani, Eric S. K. Yu, Maria Carmela Annosi:
Strategically balanced process adoption. ICSSP 2011: 169-178 - Ismael Edrein Espinosa-Curiel, Josefina Rodríguez-Jacobo, José Alberto Fernández-Zepeda:
A competency framework for the stakeholders of a software process improvement initiative. ICSSP 2011: 139-148 - Jan Friedrich, Klaus Bergner:
Formally founded, plan-based enactment of software development processes. ICSSP 2011: 199-203 - Ilenia Fronza, Alberto Sillitti, Giancarlo Succi, Jelena Vlasenko:
Understanding how novices are integrated in a team analysing their tool usage. ICSSP 2011: 204-207 - Regina Hebig, Andreas Seibel, Holger Giese:
Toward a comparable characterization for software development activities in context of MDE. ICSSP 2011: 33-42 - Emam Hossain, Paul L. Bannerman, D. Ross Jeffery:
Towards an understanding of tailoring scrum in global software development: a multi-case study. ICSSP 2011: 110-119 - Hui Huang, Qiusong Yang, Junchao Xiao, Jian Zhai:
Automatic mining of change set size information from repository for precise productivity estimation. ICSSP 2011: 72-80 - D. Ross Jeffery:
Ubiquitous process: an opportunity or temptation? ICSSP 2011: 2 - Martin Kowalczyk, Ove Armbrust, Masafumi Katahira, Tatsuya Kaneko, Yuko Miyamoto, Yumi Koishi:
Requirements for process management support: experience from the Japanese aerospace industry. ICSSP 2011: 179-183 - Jonathan L. Krein, Patrick Wagstrom, Stanley M. Sutton Jr., Clay Williams, Charles D. Knutson:
The problem of private information in large software organizations. ICSSP 2011: 218-222 - Philippe Kruchten:
A plea for lean software process models. ICSSP 2011: 235-236 - Qi Li, Barry W. Boehm, Ye Yang, Qing Wang:
A value-based review process for prioritizing artifacts. ICSSP 2011: 13-22 - William R. Nichols, Patrick Kirwan, Urs Andelfinger:
A manifesto for effective process models. ICSSP 2011: 242-244 - Natalja Nikitina, Mira Kajko-Mattsson:
Developer-driven big-bang process transition from Scrum to Kanban. ICSSP 2011: 159-168 - Maria Paasivaara, Casper Lassenius:
How does an agile coaching team work?: a case study. ICSSP 2011: 101-109 - Rahul Premraj, Antony Tang, Nico Linssen, Hub Geraats, Hans van Vliet:
To branch or not to branch. ICSSP 2011: 81-90 - Andreas Rausch, Marco Kuhrmann:
Special panel: towards a manifesto for rich process models. ICSSP 2011: 228-229
skipping 7 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-04 02:17 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint