Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 48 matches
- 2017
- Sridhar Adepu, Gyanendra Mishra, Aditya Mathur:
Access Control in Water Distribution Networks: A Case Study. QRS 2017: 184-191 - Suleiman Onimisi Aliyu, Feng Chen, Ying He, Hongji Yang:
A Game-Theoretic Based QoS-Aware Capacity Management for Real-Time EdgeIoT Applications. QRS 2017: 386-397 - Andrea Arcuri:
RESTful API Automated Test Case Generation. QRS 2017: 9-20 - Pooyan Behnamghader, Reem Alfayez, Kamonphop Srisopha, Barry W. Boehm:
Towards Better Understanding of Software Quality Evolution through Commit-Impact Analysis. QRS 2017: 251-262 - Abderrahmane Benbachir, Isnaldo Francisco De Melo, Michel R. Dagenais, Bram Adams:
Automated Performance Deviation Detection across Software Versions Releases. QRS 2017: 450-457 - Alexandre Boucher, Mourad Badri:
Predicting Fault-Prone Classes in Object-Oriented Software: An Adaptation of an Unsupervised Hybrid SOM Algorithm. QRS 2017: 306-317 - Michael Brunner, Christian Sillaber, Ruth Breu:
Towards Automation in Information Security Management Systems. QRS 2017: 160-167 - Aaron John Buhagiar, Gordon J. Pace, Jean-Paul Ebejer:
Engineering Adaptive User Interfaces Using Monitoring-Oriented Programming. QRS 2017: 200-207 - Lin Deng, Jeff Offutt, David Samudio:
Is Mutation Analysis Effective at Testing Android Apps? QRS 2017: 86-93 - Busalire Onesmus Emeka, Shaoying Liu:
Security Requirement Engineering Using Structured Object-Oriented Formal Language for M-Banking Applications. QRS 2017: 176-183 - Gencer Erdogan, Alejandra Gonzalez, Atle Refsdal, Fredrik Seehusen:
A Method for Developing Algorithms for Assessing Cyber-Risk Cost. QRS 2017: 192-199 - Othman Esoul, Neil Walkinshaw:
Using Segment-Based Alignment to Extract Packet Structures from Network Traces. QRS 2017: 398-409 - Felipe Febrero, María Ángeles Moraga, Coral Calero:
Software Reliability as User Perception: Application of the Fuzzy Analytic Hierarchy Process to Software Reliability Analysis. QRS 2017: 224-231 - Elisabeth Getzner, Birgit Hofer, Franz Wotawa:
Improving Spectrum-Based Fault Localization for Spreadsheet Debugging. QRS 2017: 102-113 - Xudong He:
Modeling and Analyzing the Android Permission Framework Using High Level Petri Nets. QRS 2017: 232-239 - Yueyang He, Xiaoyan Zhu, Guangtao Wang, Heli Sun, Yong Wang:
Predicting Bugs in Software Code Changes Using Isolation Forest. QRS 2017: 296-305 - Xiangyang Huang, LiGuo Huang, Shudong Zhang, Lijuan Zhou, Minhua Wu, Mingrui Chen:
Improving Random Test Sets Using a Locally Spreading Approach. QRS 2017: 32-41 - Jianglin Huang, Yan-Fu Li, Jacky Wai Keung, Yuen-Tak Yu, W. K. Chan:
An Empirical Analysis of Three-Stage Data-Preprocessing for Analogy-Based Software Effort Estimation on the ISBSG Data. QRS 2017: 442-449 - Shahid Hussain, Jacky Keung, Arif Ali Khan:
The Effect of Gang-of-Four Design Patterns Usage on Design Quality Attributes. QRS 2017: 263-273 - Fehmi Jaafar, Angela Lozano, Yann-Gaël Guéhéneuc, Kim Mens:
On the Analysis of Co-Occurrence of Anti-Patterns and Clones. QRS 2017: 274-284 - Bo Jiang, Yaoyue Zhang, W. K. Chan, Zhenyu Zhang:
Which Factor Impacts GUI Traversal-Based Test Case Generation Technique Most? A Controlled Experiment on Android Applications. QRS 2017: 21-31 - Fabian Keller, Lars Grunske, Simon Heiden, Antonio Filieri, André van Hoorn, David Lo:
A Critical Evaluation of Spectrum-Based Fault Localization Techniques on a Large-Scale Software System. QRS 2017: 114-125 - Kobra Khanmohammadi, Abdelwahab Hamou-Lhadj:
HyDroid: A Hybrid Approach for Generating API Call Traces from Obfuscated Android Applications for Mobile Security. QRS 2017: 168-175 - Jian Li, Pinjia He, Jieming Zhu, Michael R. Lyu:
Software Defect Prediction via Convolutional Neural Network. QRS 2017: 318-328 - Hongbo Li, Xiaohong Li, Jianye Hao, Guangquan Xu, Zhiyong Feng, Xiaofei Xie:
FESR: A Framework for Eliciting Security Requirements Based on Integration of Common Criteria and Weakness Detection Formal Model. QRS 2017: 352-363 - Yong Liu, Zheng Li, Linxin Wang, Zhiwen Hu, Ruilian Zhao:
Statement-Oriented Mutant Reduction Strategy for Mutation Based Fault Localization. QRS 2017: 126-137 - Solomon Mensah, Jacky Keung, Stephen G. MacDonell, Michael Franklin Bosu, Kwabena Ebo Bennin:
Investigating the Significance of Bellwether Effect to Improve Software Effort Estimation. QRS 2017: 340-351 - Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford:
Detecting Cross-Site Scripting Vulnerabilities through Automated Unit Testing. QRS 2017: 364-373 - Jesús Morán, Antonia Bertolino, Claudio de la Riva, Javier Tuya:
Towards Ex Vivo Testing of MapReduce Applications. QRS 2017: 73-80 - Zack Newsham, Augusto Born de Oliveira, Jean-Christophe Petkovich, Ahmad Saif Ur Rehman, Guy Martin Tchamgoue, Sebastian Fischmeister:
Intersert: Assertions on Distributed Process Interaction Sessions. QRS 2017: 216-223
skipping 18 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-04 15:30 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint