default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 90 matches
- 2009
- Bram Adams:
Co-evolution of source code and the build system. ICSM 2009: 461-464 - Paul J. Adams, Andrea Capiluppi, Cornelia Boldyreff:
Coordination and productivity issues in free software: The role of brooks' law. ICSM 2009: 319-328 - Omar Alam, Bram Adams, Ahmed E. Hassan:
Measuring the progress of projects using the time dependence of code changes. ICSM 2009: 329-338 - Domenico Amalfitano, Anna Rita Fasolino, Porfirio Tramontana:
Experimenting a reverse engineering technique for modelling the behaviour of rich internet applications. ICSM 2009: 571-574 - Prasanth Anbalagan, Mladen A. Vouk:
On predicting the time taken to correct bug reports in open source projects. ICSM 2009: 523-526 - Kelly Androutsopoulos, Nicolas Gold, Mark Harman, Zheng Li, Laurence Tratt:
A theoretical and empirical study of EFSM dependence. ICSM 2009: 287-296 - Nicolas Bettenburg, Emad Shihab, Ahmed E. Hassan:
An empirical study on the risks of using off-the-shelf techniques for processing mailing list data. ICSM 2009: 539-542 - Eric Bouwers, Joost Visser, Arie van Deursen:
Criteria for the evaluation of implemented architectures. ICSM 2009: 73-82 - Penelope A. Brooks, Atif M. Memon:
Introducing a test suite similarity metric for event sequence-based test cases. ICSM 2009: 243-252 - Zhengong Cai, Xiaohu Yang, Xinyu Wang:
Business process recovery for system maintenance - An empirical approach. ICSM 2009: 399-402 - Brian Chan, Ying Zou, Ahmed E. Hassan, Anand Sinha:
Visualizing the structure of field testing problems. ICSM 2009: 429-432 - Ned Chapin:
Software maintenance in complying with IT governance: A report from the field. ICSM 2009: 499-502 - José Pedro Correia, Yiannis Kanellopoulos, Joost Visser:
A survey-based study of the mapping of system properties to ISO/IEC 9126 maintainability characteristics. ICSM 2009: 61-70 - Rozita Dara, Shimin Li, Weining Liu, Angi Smith-Ghorbani, Ladan Tahvildari:
Using dynamic execution data to generate test cases. ICSM 2009: 433-436 - Xinyi Dong, Michael W. Godfrey:
Understanding source package organization using the hybrid model. ICSM 2009: 575-578 - Natalia Dragan, Michael L. Collard, Jonathan I. Maletic:
Using method stereotype distribution as a signature descriptor for software systems. ICSM 2009: 567-570 - Min Feng, Rajiv Gupta:
Detecting virus mutations via dynamic matching. ICSM 2009: 105-114 - Javed Ferzund, Syed Nadeem Ahsan, Franz Wotawa:
Software change classification using hunk metrics. ICSM 2009: 471-474 - Marios Fokaefs, Nikolaos Tsantalis, Alexander Chatzigeorgiou, Jörg Sander:
Decomposing object-oriented class modules using an agglomerative clustering technique. ICSM 2009: 93-101 - Gregory Gay, Sonia Haiduc, Andrian Marcus, Tim Menzies:
On the use of relevance feedback in IR-based concept location. ICSM 2009: 351-360 - Joris Van Geet, Serge Demeyer:
Feature location in COBOL mainframe systems: An experience report. ICSM 2009: 361-370 - Mark Grechanik, Qing Xie, Chen Fu:
Experimental assessment of manual versus tool-based maintenance of GUI-directed test scripts. ICSM 2009: 9-18 - Geir Kjetil Hanssen, Aiko Fallas Yamashita, Reidar Conradi, Leon Moonen:
Maintenance and agile development: Challenges, opportunities and future directions. ICSM 2009: 487-490 - Mary Jean Harrold:
Reduce, reuse, recycle, recover: Techniques for improved regression testing. ICSM 2009: 5 - Israel Herraiz:
A statistical examination of the evolution and properties of libre software. ICSM 2009: 439-442 - Abram Hindle, Michael W. Godfrey, Richard C. Holt:
What's hot and what's not: Windowed developer topic analysis. ICSM 2009: 339-348 - Reid Holmes, Rylan Cottrell, Robert J. Walker, Jörg Denzinger:
The end-to-end use of source code examples: An exploratory study. ICSM 2009: 555-558 - Daqing Hou, Ferosh Jacob, Patricia Jablonski:
Proactively managing copy-and-paste induced code clones. ICSM 2009: 391-392 - Daqing Hou, Yuejiao Wang:
Analyzing the evolution of user-visible features: A case study with Eclipse. ICSM 2009: 479-482 - Chao Huang, Jianling Sun, Xinyu Wang, Yuanjie Si, Di Wu:
Preprocessing the noise in legacy user permission assignment data for role mining - An industrial practice. ICSM 2009: 403-406
skipping 60 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-25 13:23 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint