Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 112 matches
- 2007
- Marcel van Amstel, Christian F. J. Lange, Michel R. V. Chaudron:
Four Automated Approaches to Analyze the Quality of UML Sequence Diagrams. COMPSAC (2) 2007: 415-424 - Cyrille Artho, Zhongwei Chen, Shinichi Honiden:
AOP-based automated unit test classification of large benchmarks. COMPSAC (2) 2007: 17-22 - Cyrille Artho, Klaus Havelund, Shinichi Honiden:
Visualization of Concurrent Program Executions. COMPSAC (2) 2007: 541-546 - K. M. Ibrahim Asif, Sheikh Iqbal Ahamed, Nilothpal Talukder:
Avoiding Privacy Violation for Resource Sharing in Ad hoc Networks of Pervasive Computing Environment. COMPSAC (2) 2007: 269-274 - Ioannis N. Athanasiadis, Ferdinando Villa, Andrea Emilio Rizzoli:
Ontologies, JavaBeans and Relational Databases for enabling semantic programming. COMPSAC (2) 2007: 341-346 - Ryan Babbitt, Johnny Wong, Carl K. Chang:
Towards the Modeling of Personal Privacy in Ubiquitous Computing Environments. COMPSAC (2) 2007: 695-699 - Xiaoying Bai, Yinong Chen, Zhongkui Shao:
Adaptive Web Services Testing. COMPSAC (2) 2007: 233-236 - Fevzi Belli, Mubariz Eminov, Nida Gökçe:
Prioritizing Coverage-Oriented Testing Process - An Adaptive-Learning-Based Approach and Case Study. COMPSAC (2) 2007: 197-203 - Moshiur Bhuiyan, M. M. Zahidul Islam, George Koliadis, Aneesh Krishna, Aditya Ghose:
Managing Business Process Risk Using Rich Organizational Models. COMPSAC (2) 2007: 509-520 - Matthias Book, Volker Gruhn:
An Instant Messaging Framework for Flexible Interaction with Rich Clients. COMPSAC (2) 2007: 43-48 - Koen Buyens, Riccardo Scandariato, Wouter Joosen:
Process Activities Supporting Security Principles. COMPSAC (2) 2007: 281-292 - Kai-Yuan Cai:
Non-Functional Computing: Towards a More Scientific Treatment to Non-Functional Requirements. COMPSAC (2) 2007: 493-494 - Jing-Ying Chen:
Component Oriented Design Style. COMPSAC (2) 2007: 651-657 - Kung Chen, Ju-Bing Chen:
Aspect-Based Instrumentation for Locating Memory Leaks in Java Programs. COMPSAC (2) 2007: 23-28 - Weifeng Chen, Zhen Liu, Anton Riabov:
A Soft Constraint Privacy Model based on Identifiability. COMPSAC (2) 2007: 675-980 - Jia Chen, Yue Wu, Ming Li, Bei Hui:
Multi-Agent System-based Hierarchy Grid Middleware. COMPSAC (2) 2007: 141-146 - Bo Cheng, Xiangwu Meng, Junliang Chen:
An Adaptive User Requirements Elicitation Framework. COMPSAC (2) 2007: 501-502 - Dae Wan Cho, Seunguk Oh, Hyeon Soo Kim:
MemScroll: Dynamic Memory Errors Detector in C Programs. COMPSAC (2) 2007: 749-754 - Celso Maciel da Costa, Marcelo da Silva Strzykalski, Guy Bernard:
An Aspect Oriented Middleware Architecture for Adaptive Mobile Computing Applications. COMPSAC (2) 2007: 81-86 - Zhoulin Dai, Gu Yi, Liu Jun, Xu Yi Jie:
Experiences in Accurately Estimating Electronic Forms Conversion Services with a Spiral Estimate Process. COMPSAC (2) 2007: 497-500 - Dan Wang, Rongjuan Zhao:
An Ontology-based Semantic Resource Sharing Model in P2P System. COMPSAC (2) 2007: 169-176 - Al Davis:
REFS Keynote: "Requirements for Services: Does it Make Sense?". COMPSAC (2) 2007: 451-454 - Alan M. Davis, Kesav V. Nori:
Requirements, Plato's Cave, and Perceptions of Reality. COMPSAC (2) 2007: 487-492 - Yulin Ding, Yan Zhang:
System Modification Case Studies. COMPSAC (2) 2007: 355-360 - Atilla Elçi:
A Distress Call: Needing Tools to Large-Scale Semantic-Aware Agent Systems. COMPSAC (2) 2007: 186 - Xiangzhong Feng:
Construction of Collaborative Design Environment Based on Multi-Agent. COMPSAC (2) 2007: 137-140 - Yankui Feng, Xiaodong Liu, Jon M. Kerridge:
A product line based aspect-oriented generative unit testing approach to building quality components. COMPSAC (2) 2007: 403-408 - Wenying Feng, Karan Vij:
Machine Learning Prediction andWeb Access Modeling. COMPSAC (2) 2007: 607-612 - Yingfang Fu, Jingsha He, Guorui Li:
A Distributed Intrusion Detection Scheme for Mobile Ad Hoc Networks. COMPSAC (2) 2007: 75-80 - Jerry Zeyu Gao, Lekshmi Prakash, Rajini Jagatesan:
Understanding 2D-BarCode Technology and Applications in M-Commerce - Design and Implementation of A 2D Barcode Processing Solution. COMPSAC (2) 2007: 49-56
skipping 82 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-02 09:55 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint