Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 48 matches
- 2011
- William Wei Song, Shenghua Xu, Changxuan Wan, Yuansheng Zhong, Wita Wojtkowski, W. Gregory Wojtkowski, Henry Linger:
Information Systems Development, Asian Experiences [Proceedings of ISD 2009, Nanchang, China. September 16-19, 2009]. Springer 2011, ISBN 978-1-4419-7205-7 [contents] - 2009
- Mohammed A. Aboulsamh, Jim Davies:
Towards a Model-Driven Approach to Information System Evolution. ISD 2009: 269-280 - Amir Nabil Ashamalla, Ghassan Beydoun, Graham Low:
Towards Agent-Oriented Approach to a Call Management System. ISD 2009: 345-356 - Miroslav Belicák, Jaroslav Pokorný, Karel Richta:
Open Design Architecture for Round Trip Engineering. ISD 2009: 281-293 - Yang Bo, Shenghua Xu:
The Research for Knowledge Management System of Virtual Enterprise Based on Multi-agent. ISD 2009: 233-240 - Paul Bogg, Ghassan Beydoun, Graham Low:
Problem-Solving Methods in Agent-Oriented Software Engineering. ISD 2009: 243-254 - Narasimha Bolloju, Christoph Schneider, Doug Vogel:
Asymmetrical Effects of Using Positive and Negative Examples on Object Modeling. ISD 2009: 85-96 - Alena Buchalcevová:
The Methodology Evaluation System Can Support Software Process Innovation. ISD 2009: 561-571 - Emma Chávez, Gavin Finnie, Padmanabhan Krishnan:
Applying Use Cases to Describe the Role of Standards in e-Health Information Systems. ISD 2009: 67-76 - Kieran Conboy, Michael Lang:
The Paradox of "Structured" Methods for Software Requirements Management: A Case Study of an e-Government Development Project. ISD 2009: 223-232 - Xiaofeng Du, William Wei Song, Malcolm Munro:
CbSSDF and OWL-S: A Scenario-Based Solution Analysis and Comparison. ISD 2009: 3-14 - María José Escalona, Javier J. Gutiérrez, M. Pérez-Pérez, A. Molina, E. Domínguez-Mayo, Francisco José Domínguez Mayo:
Measuring the Quality of Model-Driven Projects with NDT-Quality. ISD 2009: 307-317 - Panos Fitsilis, Achilles Kameas, Leonidas G. Anthopoulos:
Classification of Software Projects' Complexity. ISD 2009: 149-159 - Odd Fredriksson, Lennart Ljung:
Modern Enterprise Systems as Enablers of Agile Development. ISD 2009: 41-53 - Xiao-hong Gan:
Discussion on Development Trend of Chinese Enterprises Information System. ISD 2009: 77-83 - Andrina Granic, Ivica Mitrovic, Nikola Marangunic:
Towards a Cost-Effective Evaluation Approach for Web Portal Interfaces. ISD 2009: 175-186 - Lise Tordrup Heeager, Gitte Tjørnehøj:
Adopting Quality Assurance Technology in Customer-Vendor Relationships: A Case Study of How Interorganizational Relationships Influence the Process. ISD 2009: 535-546 - Changbing Jiang, Lijun Bai, Xiaoqing Tong:
Analysis of Market Opportunities for Chinese Private Express Delivery Industry. ISD 2009: 383-395 - Darius Jurkevicius, Olegas Vasilecas:
Development of Watch Schedule Using Rules Approach. ISD 2009: 511-522 - Peter Killisperger, Markus Stumptner, Georg Peters, Thomas Stückl:
Priority-Based Constraint Management in Software Process Instantiation. ISD 2009: 523-534 - Michael Lang:
The Influence of Short Project Timeframes on Web Development Practices: A Field Study. ISD 2009: 461-474 - L. Z. Li, L. X. Li:
Design and Research on e-Business Platform Based on Agent. ISD 2009: 357-365 - Yu Li, Andreas Oberweis:
A Petri Net-Based Software Process Model for Developing Process-Oriented Information Systems. ISD 2009: 27-39 - Jian Liu, Chunlin Luo:
Dynamic Inventory Management with Demand Information Updating. ISD 2009: 377-382 - Yun Lu, Zhen-Qiang Bao, Yu-Qin Zhao, Yan Wang, Gui-Jun Wang:
A Knowledge Tree Model and Its Application for Continuous Management Improvement. ISD 2009: 201-211 - Janis Makna, Marite Kirikova:
Patterns-Based IS Change Management in SMEs. ISD 2009: 55-66 - Francisco José Domínguez Mayo, María José Escalona, Manuel Mejías:
Quality Issues on Model-Driven Web Engineering Methodologies. ISD 2009: 295-306 - Jingyi Miao, Chengyu Liu, Zhenhua Sun:
Study on the Method of the Technology Forecasting Based on Conjoint Analysis. ISD 2009: 425-435 - Gytenis Mikulenas, Kestutis Kapocius:
An Approach for Prioritizing Agile Practices for Adaptation. ISD 2009: 485-498 - Gytenis Mikulenas, Kestutis Kapocius:
A Framework for Decomposition and Analysis of Agile Methodologies During Their Adaptation. ISD 2009: 547-560
skipping 18 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-30 09:29 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint