default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 71 matches
- 2009
- Dalal Alrajeh, Jeff Kramer, Alessandra Russo, Sebastián Uchitel:
Learning operational requirements from goal models. ICSE 2009: 265-275 - Sven Apel, Christian Kästner, Christian Lengauer:
FEATUREHOUSE: Language-independent, automated software composition. ICSE 2009: 221-231 - Jorge Aranda, Gina Venolia:
The secret life of bugs: Going past the errors and omissions in software repositories. ICSE 2009: 298-308 - Domenico Bianculli, Walter Binder, Mauro Luigi Drago, Carlo Ghezzi:
ReMan: A pro-active reputation management infrastructure for composite Web services. ICSE 2009: 623-626 - Christian Bird, Nachiappan Nagappan, Premkumar T. Devanbu, Harald C. Gall, Brendan Murphy:
Does distributed development affect software quality? An empirical case study of Windows Vista. ICSE 2009: 518-528 - Sandro Boccuzzo, Harald C. Gall:
CocoViz with ambient audio software exploration. ICSE 2009: 571-574 - Jacob Burnim, Sudeep Juvekar, Koushik Sen:
WISE: Automated test generation for worst-case complexity. ICSE 2009: 463-473 - Raymond P. L. Buse, Westley Weimer:
The road not taken: Estimating path execution frequency statically. ICSE 2009: 144-154 - Radu Calinescu, Marta Z. Kwiatkowska:
Using quantitative analysis to implement autonomic IT systems. ICSE 2009: 100-110 - Javier Cámara, José Antonio Martín, Gwen Salaün, Javier Cubo, Meriem Ouederni, Carlos Canal, Ernesto Pimentel:
ITACA: An integrated toolbox for the automatic composition and adaptation of Web services. ICSE 2009: 627-630 - Gerardo Canfora, Luigi Cerulo, Massimiliano Di Penta:
Ldiff: An enhanced line differencing tool. ICSE 2009: 595-598 - Guido de Caso, Víctor A. Braberman, Diego Garbervetsky, Sebastián Uchitel:
Validation of contracts using enabledness preserving finite state abstractions. ICSE 2009: 452-462 - Hervé Chang, Leonardo Mariani, Mauro Pezzè:
In-field healing of integration problems with COTS components. ICSE 2009: 166-176 - Trishul M. Chilimbi, Ben Liblit, Krishna K. Mehra, Aditya V. Nori, Kapil Vaswani:
HOLMES: Effective statistical debugging via efficient path profiling. ICSE 2009: 34-44 - Irina Diana Coman, Alberto Sillitti, Giancarlo Succi:
A case-study on using an Automated In-process Software Engineering Measurement and Analysis system in an industrial environment. ICSE 2009: 89-99 - Barthélémy Dagenais, Martin P. Robillard:
SemDiff: Analysis and recommendation support for API evolution. ICSE 2009: 599-602 - Christophe Damas, Bernard Lambeau, François Roucoux, Axel van Lamsweerde:
Analyzing critical process models through behavior model synthesis. ICSE 2009: 441-451 - Uri Dekel, James D. Herbsleb:
Improving API documentation usability with knowledge pushing. ICSE 2009: 320-330 - Danny Dig, John Marrero, Michael D. Ernst:
Refactoring sequential Java code for concurrency via concurrent libraries. ICSE 2009: 397-407 - Ilenia Epifani, Carlo Ghezzi, Raffaela Mirandola, Giordano Tamburrelli:
Model evolution by run-time parameter adaptation. ICSE 2009: 111-121 - Vijay Ganesh, Tim Leek, Martin C. Rinard:
Taint-based directed whitebox fuzzing. ICSE 2009: 474-484 - David Garlan, Bradley R. Schmerl:
Ævol: A tool for defining and planning architecture evolution. ICSE 2009: 591-594 - Emmanuel Geay, Marco Pistoia, Takaaki Tateishi, Barbara G. Ryder, Julian Dolby:
Modular string-sensitive permission analysis with demand-driven precision. ICSE 2009: 177-187 - Daniel M. Germán, Ahmed E. Hassan:
License integration patterns: Addressing license mismatches in component-based development. ICSE 2009: 188-198 - Carlo Ghezzi, Andrea Mocci, Mattia Monga:
Synthesizing intensional behavior models by graph transformation. ICSE 2009: 430-440 - Georgios Gousios, Diomidis Spinellis:
Alitheia Core: An extensible software quality monitoring platform. ICSE 2009: 579-582 - Mark Grechanik, Qing Xie, Chen Fu:
Maintaining and evolving GUI-directed test scripts. ICSE 2009: 408-418 - Sudheendra Hangal, Monica S. Lam:
Automatic dimension inference and checking for object-oriented programs. ICSE 2009: 155-165 - Dan Hao, Lingming Zhang, Lu Zhang, Jiasu Sun, Hong Mei:
VIDA: Visual interactive debugging. ICSE 2009: 583-586 - Ahmed E. Hassan:
Predicting faults using the complexity of code changes. ICSE 2009: 78-88
skipping 41 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-23 01:50 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint