Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 33 matches
- 2010
- Rizwan Ahmad, Saif ur Rehman Khan, Aamer Nadeem, Tai-Hoon Kim:
ISARE: An Integrated Software Architecture Reuse and Evaluation Framework. FGIT-ASEA 2010: 174-187 - Mahreen Ahmad, Aamer Nadeem, Tai-Hoon Kim:
An Automated Approach to Testing Polymorphic Features Using Object-Z. FGIT-ASEA 2010: 195-207 - Jae Young Ahn, Jaegu Song, Dae-Joon Hwang, Seoksoo Kim:
Trends in M2M Application Services Based on a Smart Phone. FGIT-ASEA 2010: 50-56 - Md. Amiruzzaman, Mohammad Abdullah-Al-Wadud, Yoojin Chung:
Minimum Distortion Data Hiding. FGIT-ASEA 2010: 151-163 - Wantana Areeprayolkij, Yachai Limpiyakorn, Duangrat Gansawat:
IDMS: A System to Verify Component Interface Completeness and Compatibility for Product Integration. FGIT-ASEA 2010: 208-217 - Lerina Aversano, Maria Tortorella:
Using ERP and WfM Systems for Implementing Business Processes: An Empirical Study. FGIT-ASEA 2010: 57-66 - Linda Badri, Mourad Badri, Fadel Touré:
Exploring Empirically the Relationship between Lack of Cohesion and Testability in Object-Oriented Systems. FGIT-ASEA 2010: 78-92 - Simon Baker, Emilia Mendes:
Aggregating Expert-Driven Causal Maps for Web Effort Estimation. FGIT-ASEA 2010: 264-282 - Fevzi Belli, Nida Gökçe:
Test Prioritization at Different Modeling Levels. FGIT-ASEA 2010: 130-140 - Fevzi Belli, Nevin Güler, Axel Hollmann, Gökhan Suna, Esra Yildiz:
Model-Based Higher-Order Mutation Analysis. FGIT-ASEA 2010: 164-173 - Mario Luca Bernardi, Giuseppe A. Di Lucca:
Mining Design Patterns in Object Oriented Systems by a Model-Driven Approach. FGIT-ASEA 2010: 67-77 - Marta Burzanska, Krzysztof Stencel, Piotr Wisniewski:
Intermediate Structure Reduction Algorithms for Stack Based Query Languages. FGIT-ASEA 2010: 317-326 - Albeiro Cuesta, Luis Joyanes, Marcelo López:
The Software Industry in the Coffee Triangle of Colombia. FGIT-ASEA 2010: 103-109 - Amjad M. Daoud:
Effective Web and Desktop Retrieval with Enhanced Semantic Spaces. FGIT-ASEA 2010: 1-10 - Rudolf Ferenc:
Bug Forecast: A Method for Automatic Bug Prediction. FGIT-ASEA 2010: 283-295 - José L. Arciniegas, Juan C. Dueñas:
Quality-Driven Architecture Conformance. FGIT-ASEA 2010: 38-49 - José L. Arciniegas, Juan C. Dueñas:
Evolvability Characterization in the Context of SOA. FGIT-ASEA 2010: 242-253 - Nazri Kama, Tim French, Mark Reynolds:
Considering Patterns in Class Interactions Prediction. FGIT-ASEA 2010: 11-22 - Seoksoo Kim:
Design of an Unattended Monitoring System Using Context-Aware Technologies Based on 3 Screen. FGIT-ASEA 2010: 23-29 - Jong-Nam Kim:
A Fast PDE Algorithm Using Adaptive Scan and Search for Video Coding. FGIT-ASEA 2010: 237-241 - Byung-Chul Kim, Yong-Kee Jun:
Program Visualization for Debugging Deadlocks in Multithreaded Programs. FGIT-ASEA 2010: 228-236 - Dongcheul Lee, Byungjoo Park:
Service-Oriented Software Framework for Network Management. FGIT-ASEA 2010: 327-336 - Suraya Masrom, Siti Zaleha Zainal Abidin, Puteri Norhashimah Megat Abdul Rahman, Abdullah Sani Abd. Rahman:
Software Framework for Flexible User Defined Metaheuristic Hybridization. FGIT-ASEA 2010: 218-227 - Lidia Ogiela, Marek R. Ogiela:
Cognitive Informatics for New Classes of Economic and Financial Information Systems. FGIT-ASEA 2010: 188-194 - Mehwish Riaz, Emilia Mendes, Ewan D. Tempero:
Towards Maintainability Prediction for Relational Database-Driven Software Applications: Evidence from Software Practitioners. FGIT-ASEA 2010: 110-119 - Tian-Wei Sheu, Jung-Chin Liang, Mei-Li You, Kun-Li Wen:
The Study of Imperfection in Rough Set on the Field of Engineering and Education. FGIT-ASEA 2010: 93-102 - Dominik Slezak, Lukasz Sosnowski:
SQL-Based Compound Object Comparators: A Case Study of Images Stored in ICE. FGIT-ASEA 2010: 303-316 - Badariah Solemon, Shamsul Sahibuddin, Abdul Azim Abdul Ghani:
Adoption of Requirements Engineering Practices in Malaysian Software Development Companies. FGIT-ASEA 2010: 141-150 - Muhammad Sulayman, Emilia Mendes:
Software and Web Process Improvement - Predicting SPI Success for Small and Medium Companies. FGIT-ASEA 2010: 120-129 - Jing Sun, Huiqun Zhao, Ka Wang, Houyong Zhang, Gongzhu Hu:
Design and Implementation of an Enterprise Internet of Things. FGIT-ASEA 2010: 254-263
skipping 3 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-23 05:36 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint