Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 62 matches
- 2019
- Shahid Hussain, Jacky Keung, Mohammad Khalid Sohail, Arif Ali Khan, Ghufran Ahmad, Muhammad Rafiq Mufti, Hasan Ali Khattak:
Methodology for the quantification of the effect of patterns and anti-patterns association on the software quality. IET Softw. 13(5): 414-422 (2019) - Takoua Abdellatif:
E2SM: a security tool for adaptive cloud-based service-oriented applications. IET Softw. 13(1): 3-13 (2019) - Bestoun S. Ahmed, Angelo Gargantini, Kamal Z. Zamli, Cemal Yilmaz, Miroslav Bures, Marek Szeles:
Code-aware combinatorial interaction testing. IET Softw. 13(6): 600-609 (2019) - Shohreh Ajoudanian, Maryam Nooraei Abadeh:
Recommending human resources to project leaders using a collaborative filtering-based recommender system: Case study of gitHub. IET Softw. 13(5): 379-385 (2019) - Akhan Akbulut, Sezer Toprak:
Code generator framework for smart TV platforms. IET Softw. 13(4): 268-279 (2019) - Pierre A. Akiki:
Generating contextual help for user interfaces from software requirements. IET Softw. 13(1): 75-85 (2019) - Loay Aladib, Sai Peck Lee:
Pattern detection and design rationale traceability: an integrated approach to software design quality. IET Softw. 13(4): 249-259 (2019) - R. Anbunathan, Anirban Basu:
Combining genetic algorithm and pairwise testing for optimised test generation from UML ADs. IET Softw. 13(5): 423-433 (2019) - Serkan Balli, Onur Karasoy:
Development of content-based SMS classification application by using Word2Vec-based feature extraction. IET Softw. 13(4): 295-304 (2019) - Alejandro Calderón, Mercedes Ruiz, Rory V. O'Connor:
Designing game scenarios for software project management education and assessment. IET Softw. 13(2): 144-151 (2019) - Charidimos Chaintoutis, Marialena Akriotou, Charis Mesaritakis, Ioannis Komnios, Dimitris Karamitros, Alexandros Fragkos, Dimitris Syvridis:
Optical PUFs as physical root of trust for blockchain-driven applications. IET Softw. 13(3): 182-186 (2019) - Ramanuj Chouksey, Chandan Karfa, Kunal Banerjee, Pankaj Kumar Kalita, Purandar Bhaduri:
Counter-example generation procedure for path-based equivalence checkers. IET Softw. 13(4): 280-285 (2019) - Arpita Dutta, Anwesha Patel, Rajib Mall:
Investigation into the effectiveness of white-box T-way testing. IET Softw. 13(6): 610-616 (2019) - Asmaa H. Elsaid, Rashed K. Salem, Hatem M. Abdelkader:
Proposed framework for planning software releases using fuzzy rule-based system. IET Softw. 13(6): 543-554 (2019) - Vamshi Krishna Epuri, Sushma Sakala, Tae-Hyuk Ahn, Myoungkyu Song:
Tool support for managing repetitive program changes in evolving software. IET Softw. 13(5): 447-455 (2019) - Kleinner Farias, Toacy Cavalcante de Oliveira, Lucian José Gonçales, Vinícius Bischoff:
UML2Merge: a UML extension for model merging. IET Softw. 13(6): 575-586 (2019) - Rubia Fatima, Affan Yasin, Lin Liu, Jianmin Wang, Wasif Afzal, Atif Yasin:
Improving software requirements reasoning by novices: a story-based approach. IET Softw. 13(6): 564-574 (2019) - Ebubeogu Amarachukwu Felix, Sai Peck Lee:
Systematic literature review of preprocessing techniques for imbalanced data. IET Softw. 13(6): 479-496 (2019) - Marios Fragkoulis, Diomidis Spinellis, Panos Louridas:
Live interactive queries to a software application's memory profile. IET Softw. 13(4): 241-248 (2019) - Iván A. García, Carla L. Pacheco, José Antonio Calvo-Manzano:
Introducing gamification to increase staff involvement and motivation when conducting SPI initiatives in small-sized software enterprises. IET Softw. 13(5): 456-465 (2019) - Deepak Garg, Jagpreet Sidhu, Shalli Rani:
Emerging trends in cloud computing security: a bibliometric analyses. IET Softw. 13(3): 223-231 (2019) - Arthur Gatouillat, Youakim Badr, Bertrand Massot:
Smart and safe self-adaption of connected devices based on discrete controllers. IET Softw. 13(1): 49-59 (2019) - Imen Graja, Slim Kallel, Nawal Guermouche, Saoussen Cheikhrouhou, Ahmed Hadj Kacem:
Modelling and verifying time-aware processes for cyber-physical environments. IET Softw. 13(1): 36-48 (2019) - Faizura Haneem, Nazri Kama, Nur Azaliah Abu Bakar:
Critical influential determinants of IT innovation adoption at organisational level in local government context. IET Softw. 13(4): 233-240 (2019) - Abdelhakim Hannousse:
Dealing with crosscutting and dynamic features in component software using aspect-orientation: requirements and experiences. IET Softw. 13(5): 434-446 (2019) - Marwa Hentati, Abdelwaheb Trabelsi, Lassaad Ben Ammar, Adel Mahfoudhi:
Search-based software engineering for optimising usability of user interfaces within model transformations. IET Softw. 13(5): 368-378 (2019) - Eduardo Herranz, Javier García Guzmán, Antonio de Amescua Seco, Xabier Larrucea:
Gamification for software process improvement: a practical approach. IET Softw. 13(2): 112-121 (2019) - Indriana Hidayah, Teguh Bharata Adji, Noor Akhmad Setiawan:
Development and evaluation of adaptive metacognitive scaffolding for algorithm-learning system. IET Softw. 13(4): 305-312 (2019) - Ameen A. B. A. Homaid, Abdul Rahman A. Alsewari, Kamal Z. Zamli, Yazan A. Alsariera:
Adapting the elitism on greedy algorithm for variable strength combinatorial test cases generation. IET Softw. 13(4): 286-294 (2019) - Rubing Huang, Weiwen Zong, Tsong Yueh Chen, Dave Towey, Yunan Zhou, Jinfu Chen:
Prioritising abstract test cases: an empirical study. IET Softw. 13(4): 313-326 (2019)
skipping 32 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-27 10:35 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint