Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 69 matches
- 2017
- Jin Guo, Jinghui Cheng, Jane Cleland-Huang:
Semantically enhanced software traceability using deep learning techniques. ICSE 2017: 3-14 - Hailong Zhang, Atanas Rountev:
Analysis and testing of notifications in Android wear applications. ICSE 2017: 347-357 - Peng Liu, Xiangyu Zhang, Marco Pistoia, Yunhui Zheng, Manoel Marques, Lingfei Zeng:
Automatic text input generation for mobile testing. ICSE 2017: 643-653 - Christoffer Quist Adamsen, Anders Møller, Rezwana Karim, Manu Sridharan, Frank Tip, Koushik Sen:
Repairing event race errors by controlling nondeterminism. ICSE 2017: 289-299 - Andrea Aquino, Giovanni Denaro, Mauro Pezzè:
Heuristically matching solution spaces of arithmetic formulas to efficiently reuse solutions. ICSE 2017: 427-437 - Titus Barik, Justin Smith, Kevin Lubick, Elisabeth Holmes, Jing Feng, Emerson R. Murphy-Hill, Chris Parnin:
Do developers read compiler error messages? ICSE 2017: 575-585 - Benjamin Behringer, Jochen Palz, Thorsten Berger:
PEoPL: projectional editing of product lines. ICSE 2017: 563-574 - Antonia Bertolino, Breno Miranda, Roberto Pietrantuono, Stefano Russo:
Adaptive coverage and operational profile-based testing for reliability improvement. ICSE 2017: 541-551 - Ivan Bocic, Tevfik Bultan:
Symbolic model extraction for web application verification. ICSE 2017: 724-734 - Saheed A. Busari, Emmanuel Letier:
RADAR: a lightweight tool for requirements and architecture decision analysis. ICSE 2017: 552-562 - Thierry Titcheu Chekam, Mike Papadakis, Yves Le Traon, Mark Harman:
An empirical study on mutation, statement and branch coverage fault revelation that avoids the unreliable clean program assumption. ICSE 2017: 597-608 - Junjie Chen, Yanwei Bai, Dan Hao, Yingfei Xiong, Hongyu Zhang, Bing Xie:
Learning to prioritize test programs for compiler testing. ICSE 2017: 700-711 - Boyuan Chen, Zhen Ming (Jack) Jiang:
Characterizing and detecting anti-patterns in the logging code. ICSE 2017: 71-81 - Chunyang Chen, Zhenchang Xing, Ximing Wang:
Unsupervised software-specific morphological forms inference from informal discussions. ICSE 2017: 450-461 - Ankit Choudhary, Shan Lu, Michael Pradel:
Efficient detection of thread safety violations via coverage-guided generation of concurrent tests. ICSE 2017: 266-277 - Maria Christakis, Patrick Emmisberger, Patrice Godefroid, Peter Müller:
A general framework for dynamic stub injection. ICSE 2017: 586-596 - Michael J. Coblenz, Whitney Nelson, Jonathan Aldrich, Brad A. Myers, Joshua Sunshine:
Glacier: transitive class immutability for Java. ICSE 2017: 496-506 - Aleksander Fabijan, Pavel A. Dmitriev, Helena Holmström Olsson, Jan Bosch:
The evolution of continuous experimentation in software product development: from data to a data-driven organization at scale. ICSE 2017: 770-780 - David Faitelson, Shmuel S. Tyszberowicz:
UML diagram refinement (focusing on class- and use case diagrams). ICSE 2017: 735-745 - Anna Filippova, Erik H. Trainer, James D. Herbsleb:
From diversity by numbers to diversity as process: supporting inclusiveness in software development teams with brainstorming. ICSE 2017: 152-163 - Benjamin Floyd, Tyler Santander, Westley Weimer:
Decoding the representation of code in the brain: an fMRI study of code review and expertise. ICSE 2017: 175-186 - Zheng Gao, Christian Bird, Earl T. Barr:
To type or not to type: quantifying detectable bugs in JavaScript. ICSE 2017: 758-769 - Raghuram Gopalakrishnan, Palak Sharma, Mehdi Mirakhorli, Matthias Galster:
Can latent topics in source code predict missing architectural tactics? ICSE 2017: 15-26 - Byron Hawkins, Brian Demsky:
ZenIDS: introspective intrusion detection for PHP applications. ICSE 2017: 232-243 - Kihong Heo, Hakjoo Oh, Kwangkeun Yi:
Machine-learning-guided selectively unsound static analysis. ICSE 2017: 519-529 - Rashina Hoda, James Noble:
Becoming agile: a grounded theory of agile transitions in practice. ICSE 2017: 141-151 - He Jiang, Xiaochen Li, Zijiang Yang, Jifeng Xuan:
What causes my test alarm?: automatic cause analysis for test alarms in system and integration testing. ICSE 2017: 712-723 - He Jiang, Jingxuan Zhang, Zhilei Ren, Tao Zhang:
An unsupervised approach for discovering relevant tutorial fragments for APIs. ICSE 2017: 38-48 - Mitchell Joblin, Sven Apel, Claus Hunsen, Wolfgang Mauerer:
Classifying developers into core and peripheral: an empirical study on count and network metrics. ICSE 2017: 164-174 - Özgür Kafali, Jasmine Jones, Megan Petruso, Laurie A. Williams, Munindar P. Singh:
How good is a security policy against real breaches?: a HIPAA case study. ICSE 2017: 530-540
skipping 39 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-08-30 08:32 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint