![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 57 matches
- 2014
- Rahma Bouaziz, Slim Kallel
, Bernard Coulette:
An Approach for Security Patterns Application in Component Based Models. ICCSA (5) 2014: 283-296 - Saeed Reza Aghabozorgi, Hamidreza Mahroeian, Ashish Dutt
, Ying Wah Teh
, Tutut Herawan
:
An Approachable Analytical Study on Big Educational Data Mining. ICCSA (5) 2014: 721-737 - José Alfonso Aguilar
, Anibal Zaldívar, Carolina Tripp Barba, Sanjay Misra
, Salvador Sánchez, Miguel Martínez, Omar Vicente García:
A Solution Proposal for Complex Web Application Modeling with the I-Star Framework. ICCSA (5) 2014: 135-145 - Azadeh Alebrahim, Maritta Heisel, Rene Meis
:
A Structured Approach for Eliciting, Modeling, and Using Quality-Related Domain Knowledge. ICCSA (5) 2014: 370-386 - Shaikh Muhammad Allayear, Md. Salahuddin, Fayshal Ahmed, Sung-Soon Park:
Introducing iSCSI Protocol on Online Based MapReduce Mechanism. ICCSA (5) 2014: 691-706 - Pouria Amirian, Anahid Basiri
, Adam C. Winstanley:
Evaluation of Data Management Systems for Geospatial Big Data. ICCSA (5) 2014: 678-690 - Aderemi A. Atayero
, Oluwadamilola I. Adu
, Adeyemi A. Alatishe:
Self Organizing Networks for 3GPP LTE. ICCSA (5) 2014: 242-254 - Dénes Bán
, Rudolf Ferenc
:
Recognizing Antipatterns and Analyzing Their Effects on Software Maintainability. ICCSA (5) 2014: 337-352 - Pablo Andrés Barrientos:
An Approach for Unit Testing in OOP Based on Random Object Generation. ICCSA (5) 2014: 15-31 - Anahid Basiri
, Pouria Amirian, Adam C. Winstanley:
Use of Graph Databases in Tourist Navigation Application. ICCSA (5) 2014: 663-677 - Valeria Borodin, Jean Bourtembourg, Faicel Hnaien
, Nacima Labadie:
A Decision Support System for Efficient Crop Production Supply Chain Management. ICCSA (5) 2014: 775-790 - Juliana Küster Filipe Bowles
, Leïla Kloul:
A Strongly Consistent Transformation from UML Interactions to PEPA Nets. ICCSA (5) 2014: 90-105 - Antonio Capodieci
, Luca Mainetti
, Luigi Manco:
A Case Study to Enable and Monitor Real IT Companies Migrating from Waterfall to Agile. ICCSA (5) 2014: 119-134 - Tiago Carção, Pedro Martins:
A Visual DSL for the Certification of Open Source Software. ICCSA (5) 2014: 602-617 - Erratum: Explicit Untainting to Reduce Shadow Memory Usage in Dynamic Taint Analysis. ICCSA (5) 2014
- Marcello Cinque
, Claudio Gaiani, Daniele De Stradis, Antonio Pecchia, Roberto Pietrantuono
, Stefano Russo
:
On the Impact of Debugging on Software Reliability Growth Analysis: A Case Study. ICCSA (5) 2014: 461-475 - Broderick Crawford
, Ricardo Soto
, Franklin Johnson
, Sanjay Misra
, Fernando Paredes:
The Use of Metaheuristics to Software Project Scheduling Problem. ICCSA (5) 2014: 215-226 - Jérôme Dantan, Yann Pollet, Salima Taibi:
A Goal-Oriented Meta-Model for Scientific Research. ICCSA (5) 2014: 762-774 - Berkhan Deniz, Semih Bilgen:
An Empirical Study of Software Reuse and Quality in an Industrial Setting. ICCSA (5) 2014: 508-523 - Richárd Dévai, László Vidács, Rudolf Ferenc
, Tibor Gyimóthy
:
Service Layer for IDE Integration of C/C++ Preprocessor Related Analysis. ICCSA (5) 2014: 402-417 - Veer Sain Dixit, Shveta Kundra Bhatia, Sarabjeet Kaur
:
Weighted-Frequent Itemset Refinement Methodology (W-FIRM) of Usage Clusters. ICCSA (5) 2014: 32-50 - Veer Sain Dixit, Shveta Kundra Bhatia, V. B. Singh
:
Evaluation of Web Session Cluster Quality Based on Access-Time Dissimilarity and Evolutionary Algorithms. ICCSA (5) 2014: 297-310 - Orlando Durán
, Luis Pérez:
Optimization of the Multiechelon System for Repairable Spare Parts Using Swarm Intelligence Combined with a Local Search Strategy. ICCSA (5) 2014: 747-761 - Hanno Eichelberger, Jürgen Ruf, Thomas Kropf, Thomas Greiner, Wolfgang Rosenstiel:
Debugger-Based Record Replay and Dynamic Analysis for In-Vehicle Infotainment. ICCSA (5) 2014: 387-401 - Mohamed A. El-Zawawy:
Proof-Carrying Model for Parsing Techniques. ICCSA (5) 2014: 1-14 - Csaba Faragó, Péter Hegedüs, Rudolf Ferenc
:
The Impact of Version Control Operations on the Quality Change of the Source Code. ICCSA (5) 2014: 353-369 - Eduardo Guerra
, Ademar Aguiar
:
Support for Refactoring an Application towards an Adaptive Object Model. ICCSA (5) 2014: 73-89 - Mustafa Kapdan
, Mehmet S. Aktas
, Melike Yigit
:
On the Structural Code Clone Detection Problem: A Survey and Software Metric Based Approach. ICCSA (5) 2014: 492-507 - Varsha Karandikar, Ankit Mehra, Shaligram Prajapat
:
Investigation of SPM Approaches for Academic IT - Projects. ICCSA (5) 2014: 265-282 - Mohamad Kassab
:
Early Effort Estimation for Quality Requirements by AHP. ICCSA (5) 2014: 106-118
skipping 27 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-22 09:12 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint