Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 125 matches
- 2017
- Rohit Sinha, Sriram K. Rajamani, Sanjit A. Seshia:
A compiler and verifier for page access oblivious computation. ESEC/SIGSOFT FSE 2017: 649-660 - Rabe Abdalkareem:
Reasons and drawbacks of using trivial npm packages: the developers' perspective. ESEC/SIGSOFT FSE 2017: 1062-1064 - Rabe Abdalkareem, Olivier Nourry, Sultan Wehaibi, Suhaib Mujahid, Emad Shihab:
Why do developers use trivial packages? an empirical case study on npm. ESEC/SIGSOFT FSE 2017: 385-395 - Mai Abusair:
User- and analysis-driven context aware software development in mobile computing. ESEC/SIGSOFT FSE 2017: 1022-1025 - Gojko Adzic, Robert Chatley:
Serverless computing: economic and architectural impact. ESEC/SIGSOFT FSE 2017: 884-889 - Amir Shayan Ahmadian, Sven Peldszus, Qusai Ramadan, Jan Jürjens:
Model-based privacy and security analysis with CARiSMA. ESEC/SIGSOFT FSE 2017: 989-993 - Maryam Raiyat Aliabadi, Amita Ajith Kamath, Julien Gascon-Samson, Karthik Pattabiraman:
ARTINALI: dynamic invariant detection for cyber-physical system security. ESEC/SIGSOFT FSE 2017: 349-361 - Dalal Alrajeh, Liliana Pasquale, Bashar Nuseibeh:
On evidence preservation requirements for forensic-ready systems. ESEC/SIGSOFT FSE 2017: 559-569 - Mojtaba Bagherzadeh, Nicolas Hili, Juergen Dingel:
Model-level, platform-independent debugging in the context of the model-driven development of real-time systems. ESEC/SIGSOFT FSE 2017: 419-430 - Francesco A. Bianchi, Mauro Pezzè, Valerio Terragni:
Reproducing concurrency failures from crash stacks. ESEC/SIGSOFT FSE 2017: 705-716 - Marcel Böhme, Ezekiel O. Soremekun, Sudipta Chattopadhyay, Emamurho Ugherughe, Andreas Zeller:
Where is the bug and how is it fixed? an experiment with practitioners. ESEC/SIGSOFT FSE 2017: 117-128 - Tegan Brennan, Nestan Tsiskaridze, Nicolás Rosner, Abdulbaki Aydin, Tevfik Bultan:
Constraint normalization and parameterized caching for quantitative program analysis. ESEC/SIGSOFT FSE 2017: 535-546 - David Bingham Brown, Michael Vaughn, Ben Liblit, Thomas W. Reps:
The care and feeding of wild-caught mutants. ESEC/SIGSOFT FSE 2017: 511-522 - Wenqi Bu, Minhui Xue, Lihua Xu, Yajin Zhou, Zhushou Tang, Tao Xie:
When program analysis meets mobile security: an industrial study of misusing Android internet sockets. ESEC/SIGSOFT FSE 2017: 842-847 - Panuchart Bunyakiati, Chadarat Phipathananunth:
Cherry-picking of code commits in long-running, multi-release software. ESEC/SIGSOFT FSE 2017: 994-998 - Yan Cai, Lingwei Cao, Jing Zhao:
Adaptively generating high quality fixes for atomicity violations. ESEC/SIGSOFT FSE 2017: 303-314 - Marco Castelluccio, Carlo Sansone, Luisa Verdoliva, Giovanni Poggi:
Automatically analyzing groups of crashes for finding correlations. ESEC/SIGSOFT FSE 2017: 717-726 - Diego Cedrim, Alessandro Garcia, Melina Mongiovi, Rohit Gheyi, Leonardo da Silva Sousa, Rafael Maiani de Mello, Baldoino Fonseca, Márcio Ribeiro, Alexander Chávez:
Understanding the impact of refactoring on smells: a longitudinal study of 23 software projects. ESEC/SIGSOFT FSE 2017: 465-475 - Ahmet Çelik, Marko Vasic, Aleksandar Milicevic, Milos Gligoric:
Regression test selection across JVM boundaries. ESEC/SIGSOFT FSE 2017: 809-820 - Oscar Chaparro, Jing Lu, Fiorella Zampetti, Laura Moreno, Massimiliano Di Penta, Andrian Marcus, Gabriele Bavota, Vincent Ng:
Detecting missing information in bug descriptions. ESEC/SIGSOFT FSE 2017: 396-407 - Jailton Coelho, Marco Túlio Valente:
Why modern open source projects fail. ESEC/SIGSOFT FSE 2017: 186-196 - Loris D'Antoni, Rishabh Singh, Michael Vaughn:
NoFAQ: synthesizing command repairs from examples. ESEC/SIGSOFT FSE 2017: 582-592 - Csaba Debreceni, Gábor Bergmann, Márton Búr, István Ráth, Dániel Varró:
The MONDO collaboration framework: secure collaborative modeling over existing version control systems. ESEC/SIGSOFT FSE 2017: 984-988 - Daniel Dietsch, Matthias Heizmann, Betim Musa, Alexander Nutz, Andreas Podelski:
Craig vs. Newton in software model checking. ESEC/SIGSOFT FSE 2017: 487-497 - Roel van Dijk, Christophe Creeten, Jeroen van der Ham, Jeroen van den Bos:
Model-driven software engineering in practice: privacy-enhanced filtering of network traffic. ESEC/SIGSOFT FSE 2017: 860-865 - Georg Dotzler, Marius Kamp, Patrick Kreutzer, Michael Philippsen:
More accurate recommendations for method-level changes. ESEC/SIGSOFT FSE 2017: 798-808 - Pavel Dovgalyuk, Natalia Fursova, Ivan Vasiliev, Vladimir Makarov:
QEMU-based framework for non-intrusive virtual machine instrumentation and introspection. ESEC/SIGSOFT FSE 2017: 944-948 - Steve Easterbrook:
Verifying the forecast: how climate models are developed and tested (invited talk). ESEC/SIGSOFT FSE 2017: 2 - Mathias Ellmann:
On the similarity of software development documentation. ESEC/SIGSOFT FSE 2017: 1030-1033 - Wolfgang Emmerich:
Software engineering research results in industrial practice: a tale of two projects (invited talk). ESEC/SIGSOFT FSE 2017: 3
skipping 95 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-24 19:33 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint