default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 57 matches
- 2009
- Benjapol Auprasert, Yachai Limpiyakorn:
Representing source code with Granular hierarchical structures. ICPC 2009: 319-320 - Andreas Bartho:
Creating and maintaining tutorials with DEFT. ICPC 2009: 309-310 - Olga Baysal, Michael W. Godfrey, Robin Cohen:
A bug you like: A framework for automated assignment of bugs. ICPC 2009: 297-298 - David W. Binkley, Marcia Davis, Dawn J. Lawrie, Christopher Morrell:
To camelcase or under_score. ICPC 2009: 158-167 - Giovanni Capobianco, Andrea De Lucia, Rocco Oliveto, Annibale Panichella, Sebastiano Panichella:
On the role of the nouns in IR-based traceability recovery. ICPC 2009: 148-157 - Glauco de Figueiredo Carneiro, Manoel G. Mendonça, Rodrigo Chaves Magnavita:
Proposing a visual approach to support the characterization of software comprehension activities. ICPC 2009: 291-292 - Mariano Ceccato, Massimiliano Di Penta, Jasvir Nagra, Paolo Falcarin, Filippo Ricca, Marco Torchiano, Paolo Tonella:
The effectiveness of source code obfuscation: An experimental assessment. ICPC 2009: 178-187 - Michel Chilowicz, Étienne Duris, Gilles Roussel:
Syntax tree fingerprinting for source code similarity detection. ICPC 2009: 243-247 - Bas Cornelissen, Andy Zaidman, Arie van Deursen, Bart Van Rompaey:
Trace visualization for program comprehension: A controlled experiment. ICPC 2009: 100-109 - Uri Dekel, James D. Herbsleb:
Reading the documentation of invoked API functions in program comprehension. ICPC 2009: 168-177 - Dennis Edwards, Norman Wilde, Sharon Simmons, Eric Golden:
Instrumenting time-sensitive software for feature location. ICPC 2009: 130-137 - Martin Feilkas, Daniel Ratiu, Elmar Jürgens:
The loss of architectural knowledge during system evolution: An industrial case study. ICPC 2009: 188-197 - Eduardo Figueiredo, Bruno Carreiro da Silva, Cláudio Sant'Anna, Alessandro F. Garcia, Jon Whittle, Daltro José Nunes:
Crosscutting patterns and design stability: An exploratory analysis. ICPC 2009: 138-147 - Andrew Forward, Timothy C. Lethbridge, Dusan Brestovansky:
Improving program comprehension by enhancing program constructs: An analysis of the Umple language. ICPC 2009: 311-312 - Scott Grant, James R. Cordy:
Vector space analysis of software clones. ICPC 2009: 233-237 - Yann-Gaël Guéhéneuc, Huzefa H. Kagdi, Jonathan I. Maletic:
Working session: Using eye-tracking to understand program comprehension. ICPC 2009: 278-279 - Maen Hammad, Michael L. Collard, Jonathan I. Maletic:
Automatically identifying changes that impact code-to-design traceability. ICPC 2009: 20-29 - Zhixiong Han, Linzhang Wang, Liqian Yu, Xin Chen, Jianhua Zhao, Xuandong Li:
Design pattern directed clustering for understanding open source code. ICPC 2009: 295-296 - Abram Hindle, Daniel M. Germán, Michael W. Godfrey, Richard C. Holt:
Automatic classication of large changes into maintenance categories. ICPC 2009: 30-39 - Daqing Hou, Patricia Jablonski, Ferosh Jacob:
CnP: Towards an environment for the proactive management of copy-and-paste programming. ICPC 2009: 238-242 - Yi Huang, Laura K. Dillon, R. E. Kurt Stirewalt:
Prototyping synchronization policies for existing programs. ICPC 2009: 289-290 - Khaled Hussein, Eli Tilevich, Ivica Ico Bukvic, SooBeen Kim:
Sonification design guidelines to enhance program comprehension. ICPC 2009: 120-129 - Dennis Jeffrey, Min Feng, Neelam Gupta, Rajiv Gupta:
BugFix: A learning-based tool to assist developers in fixing bugs. ICPC 2009: 70-79 - Huzefa H. Kagdi, Denys Poshyvanyk:
Who can help me with this change request? ICPC 2009: 273-277 - Suman Karumuri, Steven P. Reiss:
Automatic detection of internal queues and stages in message processing systems. ICPC 2009: 315-316 - Tara Kelly, Jim Buckley:
An in-vivo study of the cognitive levels employed by programmers during software maintenance. ICPC 2009: 95-99 - Sunghun Kim, Shivkumar Shivaji, E. James Whitehead Jr.:
Kenyon-web: Reconfigurable web-based feature extractor. ICPC 2009: 287-288 - Günter Kniesel, Alexander Binun:
Standing on the shoulders of giants - A data fusion approach to design pattern detection. ICPC 2009: 208-217 - Eric Larson:
A plethora of paths. ICPC 2009: 40-49 - Erik Linstead, Lindsey Hughes, Cristina Videira Lopes, Pierre Baldi:
Capturing Java naming conventions with first-order Markov models. ICPC 2009: 313-314
skipping 27 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-21 18:18 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint