default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 32 matches
- 2015
- Huaqian Cai, Ying Zhang, Zhi Jin, Xuanzhe Liu, Gang Huang:
DelayDroid: Reducing Tail-Time Energy by Refactoring Android Apps. Internetware 2015: 1-10 - Chongming Gu, Gang Yin, Tao Wang, Cheng Yang, Huaimin Wang:
A supervised approach for tag hierarchy construction in open source communities. Internetware 2015: 148-152 - Meimei He, Hongyin Tang, Guoquan Wu, Jun Wei, Hua Zhong:
A Crowdsourcing framework for Detecting Cross-Browser Issues in Web Application. Internetware 2015: 239-242 - Xue Jiang, Yu Huang:
CBBR: Enabling Distributed Shared Memory-based Coordination Among Mobile Robots. Internetware 2015: 11-20 - Yi Jiang, Wei Zhang, Haiyan Zhao:
An Entropy-based Approach to the Crowd Entity Resolution. Internetware 2015: 153-156 - Bin Li, Zhenhao Tang, Jianhua Zhao:
Invariant Synthesis for Programs Manipulating Arrays with Unbounded Data. Internetware 2015: 195-198 - Lin Li, Shi Ying, Bo Dong, Tong Xue:
A Multi-objective Ant Colony Algorithm for Deployment Optimization of Internetware Application. Internetware 2015: 186-194 - Yang Liang, Hao Hu, Wei Song, Jidong Ge:
Qos-aware Automatic Web Service Composition Considering QoS Correlations. Internetware 2015: 39-42 - Wenjie Liang, Wenyi Qian, Yijian Wu, Xin Peng, Wenyun Zhao:
Mining Context-Aware User Requirements from Crowd Contributed Mobile Data. Internetware 2015: 132-140 - Jiwei Liu, Xinjun Mao:
Towards Realisation of Evolvable Runtime Variability in Internet-Based Service Systems via Dynamical Software Update. Internetware 2015: 229-238 - Lin Liu, Jianmin Wang, Xiaojun Ye, Hongji Yang:
A Creative Lifecycle Model for Internetware Based Software Development. Internetware 2015: 124-131 - Bingxun Liu, Gang Yin, Tao Wang, Fang Zhang, Huaimin Wang:
Software Ranking and Analysis based on Mining Market Requirements and Characteristics. Internetware 2015: 112-119 - Zhanshuai Meng, Yanyan Jiang, Chang Xu:
Facilitating Reusable and Scalable Automated Testing and Analysis for Android Apps. Internetware 2015: 166-175 - Wenkai Mo, Beijun Shen, Yuming He, Hao Zhong:
GEMiner: Mining Social and Programming Behaviors to Identify Experts in Github. Internetware 2015: 93-101 - He Qing, Biwen Li, Beijun Shen, Yong Xia:
Cross-Project Software Defect Prediction Using Feature-Based Transfer Learning. Internetware 2015: 74-82 - Hongyang Qu, Qixia Yuan, Jun Pang, Andrzej Mizera:
Improving BDD-based Attractor Detection for Synchronous Boolean Networks. Internetware 2015: 212-220 - Hao Tang, Tian Lan, Dan Hao, Lu Zhang:
Enhancing Defect Prediction with Static Defect Analysis. Internetware 2015: 43-51 - Zhenhao Tang, Hanfei Wang, Bin Li, Juan Zhai, Jianhua Zhao, Xuandong Li:
Analyzing Inductively Defined Properties for Recursive Data Structures. Internetware 2015: 221-228 - Yanxiang Tong, Yu Zhou, Lisheng Fang, Taolue Chen:
Towards A Novel Approach for Defect Localization Based on Part-of-Speech and Invocation. Internetware 2015: 52-61 - Shuai Wang, Wensheng Dou, Guoquan Wu, Jie Wang, Chushu Gao, Jun Wei, Tao Huang:
Towards Web Application Mobilization via Efficient Web Control Extraction. Internetware 2015: 21-29 - Yu Wang, Junjing Shi, Linzhang Wang, Jianhua Zhao, Xuandong Li:
Detecting Data Races in Interrupt-Driven Programs based on Static Analysis and Dynamic Simulation. Internetware 2015: 199-202 - Yaojing Wang, Feng Xu, Yuan Yao, Yong Wu:
Detecting Buggy Files based on Bug Reports: A Random Walk Based Approach. Internetware 2015: 62-69 - Lin Yan, Yao Guo, Xiangqun Chen, Hong Mei:
A Study on Power Side Channels on Mobile Devices. Internetware 2015: 30-38 - Minzhi Yan, Hailong Sun, Xudong Liu:
Efficient Testing of Web Services with Mobile Crowdsourcing. Internetware 2015: 157-165 - Dahai Yao, Hailong Sun, Xudong Liu:
Combining Crowd Contributions with Machine Learning to Detect Malicious Mobile Apps. Internetware 2015: 120-123 - Chunyang Ye, Akinul Islam, Jun Wei, Dan Chen, Mengxing Huang, Wencai Du:
Towards a scalable and efficient open cloud marketplace. Internetware 2015: 102-111 - Wenjing Yu, Haiyan Zhao, Wei Zhang, Zhi Jin:
A Feature-Driven Approach to Automated Class Diagram Construction. Internetware 2015: 203-211 - Yang Zhang, Huaimin Wang, Gang Yin, Tao Wang, Yue Yu:
Exploring the Use of @-mention to Assist Software Development in GitHub. Internetware 2015: 83-92 - Dalin Zhang, Gang Yin, Dahai Jin, Yunzhan Gong, Tianshuang Wu, Hailong Zhang:
A hybrid static analysis refinement approach within internetware environment. Internetware 2015: 141-147 - Yang Zhang, Gang Yin, Tao Wang, Yue Yu, Huaimin Wang:
Evaluating Bug Severity Using Crowd-based Knowledge: An Exploratory Study. Internetware 2015: 70-73
skipping 2 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-21 07:30 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint