![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 27 matches
- 2005
- Doo-Hwan Bae:
Editorial. J. Syst. Softw. 76(1): 1-2 (2005) - Sarah Beecham, Tracy Hall
, Carol Britton, Michaela Cottee, Austen Rainer:
Using an expert panel to validate a requirements process improvement model. J. Syst. Softw. 76(3): 251-275 (2005) - Jiannong Cao
, Catherine Chan, Keith C. C. Chan
:
Workflow analysis for web publishing using a stage-activity process model. J. Syst. Softw. 76(3): 221-235 (2005) - Wen-Kui Chang, Shuen-Lin Jeng:
Impartial evaluation in software reliability practice. J. Syst. Softw. 76(2): 99-110 (2005) - Jeanne Chen, Tung-Shou Chen, Yu-Mei Pan:
A crisscross checking technique for tamper detection in halftone images. J. Syst. Softw. 76(3): 287-295 (2005) - Shih-Chien Chou, Wei-Chuan Hsu, Wei-Kuang Lo:
DPE/PAC: decentralized process engine with product access control. J. Syst. Softw. 76(3): 207-219 (2005) - Andrea D'Ambrogio
, Giuseppe Iazeolla
:
Metadata-driven design of integrated environments for software performance validation. J. Syst. Softw. 76(2): 127-146 (2005) - Alexander Davis, Du Zhang:
A comparative study of SOAP and DCOM. J. Syst. Softw. 76(2): 157-169 (2005) - A. J. J. Dick, M. Elizabeth C. Hull, Ken Jackson:
Specifying process and measuring progress in terms of information state. J. Syst. Softw. 76(3): 311-322 (2005) - Jen-Bang Feng, Hsien-Chu Wu, Chwei-Shyong Tsai, Yen-Ping Chu:
A new multi-secret images sharing scheme using Largrange's interpolation. J. Syst. Softw. 76(3): 327-339 (2005) - Gordon L. Freeman, Stephen R. Schach:
The task-dependent nature of the maintenance of object-oriented programs. J. Syst. Softw. 76(2): 195-206 (2005) - Robert L. Glass, Tsong Yueh Chen
:
An assessment of systems and software engineering scholars and institutions (1999-2003). J. Syst. Softw. 76(1): 91-97 (2005) - Peter Henderson, Stephen Crouch
, Robert John Walters, Qinglai Ni:
Effects of introducing survival behaviours into automated negotiators specified in an environmental and behavioural framework. J. Syst. Softw. 76(1): 65-76 (2005) - Chin-Yu Huang:
Performance analysis of software reliability growth models with testing-effort and change-point. J. Syst. Softw. 76(2): 181-194 (2005) - Liang-Yi Hwang, Mei-Ling Chiang
, Ruei-Chuan Chang:
Implementation of wireless network environments supporting inter access point protocol and dual packet filtering. J. Syst. Softw. 76(3): 297-309 (2005) - Taghi M. Khoshgoftaar, Naeem Seliya, Angela Herzberg:
Resource-oriented software quality classification models. J. Syst. Softw. 76(2): 111-126 (2005) - Hyun-Joo Lee
, Sang-Won Lee, Hyoung-Joo Kim:
Design and implementation of an extended relationship semantics in an ODMG-compliant OODBMS. J. Syst. Softw. 76(2): 171-180 (2005) - Jung-Hua Lo, Chin-Yu Huang, Ing-Yi Chen, Sy-Yen Kuo
, Michael R. Lyu:
Reliability assessment and sensitivity analysis of software reliability growth modeling based on software module structure. J. Syst. Softw. 76(1): 3-13 (2005) - Shi-Wu Lo, Tei-Wei Kuo
, Kam-yiu Lam
:
Multi-disk scheduling for time-constrained requests in RAID-0 devices. J. Syst. Softw. 76(3): 237-250 (2005) - Yiannis Papadopoulos
, Christian Grante:
Evolving car designs using model-based automated safety analysis and optimisation techniques. J. Syst. Softw. 76(1): 77-89 (2005) - Witold Pedrycz, Giancarlo Succi
:
Genetic granular classifiers in modeling software quality. J. Syst. Softw. 76(3): 277-285 (2005) - Mie Mie Thet Thwin, Tong-Seng Quah:
Application of neural networks for software quality prediction using object-oriented metrics. J. Syst. Softw. 76(2): 147-156 (2005) - Robert John Walters:
Checking of models built using a graphically based formal modelling language. J. Syst. Softw. 76(1): 55-64 (2005) - W. Eric Wong, Tatiana Sugeta, Yu Qi, José Carlos Maldonado:
Smart debugging software architectural design in SDL. J. Syst. Softw. 76(1): 15-28 (2005) - Stephen S. Yau, Xinyu Zhang:
A middleware service for secure group communication in mobile ad hoc networks. J. Syst. Softw. 76(1): 29-43 (2005) - Fangguo Zhang
, Xiaofeng Chen:
Cryptanalysis of Huang-Chang partially blind signature scheme. J. Syst. Softw. 76(3): 323-325 (2005) - Feng Zhu
, Matt W. Mutka
, Lionel M. Ni:
Facilitating secure ad hoc service discovery in public environments. J. Syst. Softw. 76(1): 45-54 (2005)
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-28 18:03 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint