Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 539 matches
- 2022
- Kevin Feichtinger, Kristof Meixner, Stefan Biffl, Rick Rabiser:
Evolution Support for Custom Variability Artifacts Using Feature Models: A Study in the Cyber-Physical Production Systems Domain. ICSR 2022: 79-84 - Jessie Galasso, Michalis Famelis, Houari A. Sahraoui:
Fine-Grained Analysis of Similar Code Snippets. ICSR 2022: 3-21 - Craig Goodwin, Sandra I. Woolley:
Barriers to Device Longevity and Reuse: An Analysis of Application Download, Installation and Functionality on a Vintage Device. ICSR 2022: 138-145 - Ilyas Saïd Makari, Ahmed Zerouali, Coen De Roover:
Prevalence and Evolution of License Violations in npm and RubyGems Dependency Networks. ICSR 2022: 85-100 - Pierre Misse-Chanabier, Guillermo Polito, Noury Bouraqadi, Stéphane Ducasse, Luc Fabresse, Pablo Tesone:
Differential Testing of Simulation-Based Virtual Machine Generators - Automatic Detection of VM Generator Semantic Gaps Between Simulation and Generated VMs. ICSR 2022: 103-119 - Daniel-Jesus Munoz, Jeho Oh, Mónica Pinto, Lidia Fuentes, Don S. Batory:
[inline-graphic not available: see fulltext]: A Tool to Transform Feature Models with Numerical Features and Arithmetic Constraints. ICSR 2022: 59-75 - Xhevahire Tërnava, Mathieu Acher, Luc Lesoil, Arnaud Blouin, Jean-Marc Jézéquel:
Scratching the Surface of ./configure: Learning the Effects of Compile-Time Options on Binary Size and Gadgets. ICSR 2022: 41-58 - Zhipeng Xue, Zhijie Jiang, Chenlin Huang, Rulin Xu, Xiangbing Huang, Liumin Hu:
SEED: Semantic Graph Based Deep Detection for Type-4 Clone. ICSR 2022: 120-137 - Oleksandr Zaitsev, Stéphane Ducasse, Nicolas Anquetil, Arnaud Thiefaine:
DepMiner: Automatic Recommendation of Transformation Rules for Method Deprecation. ICSR 2022: 22-37 - Gilles Perrouin, Naouel Moha, Abdelhak-Djamel Seriai:
Reuse and Software Quality - 20th International Conference on Software and Systems Reuse, ICSR 2022, Montpellier, France, June 15-17, 2022, Proceedings. Lecture Notes in Computer Science 13297, Springer 2022, ISBN 978-3-031-08128-6 [contents] - 2020
- Muhammad Hammad, Önder Babur, Hamid Abdul Basit, Mark van den Brand:
DeepClone: Modeling Clones to Generate Code Predictions. ICSR 2020: 135-151 - Muhammad Abbas, Mehrdad Saadatmand, Eduard Enoiu, Daniel Sundmark, Claes Lindskog:
Automated Reuse Recommendation of Product Line Assets Based on Natural Language Requirements. ICSR 2020: 173-189 - Eman Abdullah AlOmar, Diego Barinas, Jiaqian Liu, Mohamed Wiem Mkaouer, Ali Ouni, Christian D. Newman:
An Exploratory Study on How Software Reuse is Discussed in Stack Overflow. ICSR 2020: 292-303 - Eman Abdullah AlOmar, Philip T. Rodriguez, Jordan Bowman, Tianjia Wang, Benjamin Adepoju, Kevin Lopez, Christian D. Newman, Ali Ouni, Mohamed Wiem Mkaouer:
How Do Developers Refactor Code to Improve Code Reusability? ICSR 2020: 261-276 - Hussein Alrubaye, Deema Alshoaibi, Eman Abdullah AlOmar, Mohamed Wiem Mkaouer, Ali Ouni:
How Does Library Migration Impact Software Quality and Comprehension? An Empirical Study. ICSR 2020: 245-260 - Nicolas Anquetil, Anne Etien, Mahugnon H. Houekpetodji, Benoît Verhaeghe, Stéphane Ducasse, Clotilde Toullec, Fatiha Djareddir, Jérôme Sudich, Mustapha Derras:
Modular Moose: A New Generation of Software Reverse Engineering Platform. ICSR 2020: 119-134 - Abdelhadi Belfadel, Jannik Laval, Chantal Bonner Cherifi, Néjib Moalla:
Semantic Software Capability Profile Based on Enterprise Architecture for Software Reuse. ICSR 2020: 3-18 - Amine Benmerzoug, Lamia Yessad, Tewfik Ziadi:
Analyzing the Impact of Refactoring Variants on Feature Location. ICSR 2020: 279-291 - Imen Benzarti, Hafedh Mili, Abderrahmane Leshob:
CxDev: A Case Study in Domain Engineering for Customer eXperience Management. ICSR 2020: 100-116 - Santiago Bragagnolo, Nicolas Anquetil, Stéphane Ducasse, Abderrahmane Seriai, Mustapha Derras:
Analysing Microsoft Access Projects: Building a Model in a Partially Observable Domain. ICSR 2020: 152-169 - Moataz Chouchen, Ali Ouni, Mohamed Wiem Mkaouer:
AndroLib: Third-Party Software Library Recommendation for Android Applications. ICSR 2020: 208-225 - Pierre Laborde, Steven Costiou, Éric Le Pors, Alain Plantec:
15 Years of Reuse Experience in Evolutionary Prototyping for the Defense Industry. ICSR 2020: 87-99 - Aida Lahouij, Lazhar Hamel, Mohamed Graiet:
Dynamic Reconfiguration of Cloud Composite Services Using Event-B. ICSR 2020: 69-84 - Nan Niu, Logan Johnson, Christopher Diltz:
Safety Patterns for SysML: What Does OMG Specify? ICSR 2020: 19-34 - Jamila Oukharijane, Mohamed Amine Chaâbane, Imen Ben Said, Eric Andonoff, Rafik Bouaziz:
A Hybrid Approach Based on Reuse Techniques for Autonomic Adaptation of Business Processes. ICSR 2020: 35-51 - Quentin Rouland, Brahim Hamid, Jason Jaskolka:
Reusable Formal Models for Threat Specification, Detection, and Treatment. ICSR 2020: 52-68 - Zaineb Sakhrawi, Asma Sellami, Nadia Bouassida:
Investigating the Impact of Functional Size Measurement on Predicting Software Enhancement Effort Using Correlation-Based Feature Selection Algorithm and SVR Method. ICSR 2020: 229-244 - Qinyue Wu, Beijun Shen, Yuting Chen:
Learning to Recommend Trigger-Action Rules for End-User Development - A Knowledge Graph Based Approach. ICSR 2020: 190-207 - Sihem Ben Sassi, Stéphane Ducasse, Hafedh Mili:
Reuse in Emerging Software Engineering Practices - 19th International Conference on Software and Systems Reuse, ICSR 2020, Hammamet, Tunisia, December 2-4, 2020, Proceedings. Lecture Notes in Computer Science 12541, Springer 2020, ISBN 978-3-030-64693-6 [contents] - 2019
- Konstantinos Athanasopoulos, Georgios Theodoridis, Christos Darisaplis, Ioannis Stamelos:
Towards a Software System for Facilitating the Reuse of Business Processes. ICSR 2019: 34-46
skipping 509 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-25 10:43 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint