Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 71 matches
- 2006
- Lawrence D. Alexander:
On the Challenges of Maintaining Large-Scale Software Systems at Lockheed Martin. ICSM 2006: 2 - Izzat Alsmadi, Kenneth Magel:
Open Source Evolution Analysis. ICSM 2006: 276-278 - Paul Baker, Mark Harman, Kathleen Steinhöfel, Alexandros Skaliotis:
Search Based Approaches to Component Selection and Prioritization for the Next Release Problem. ICSM 2006: 176-185 - Tibor Bakota, Rudolf Ferenc, Tibor Gyimóthy, Claudio Riva, Jianli Xu:
Towards Portable Metrics-based Models for Software Maintenance Problems. ICSM 2006: 483-486 - Maria Teresa Baldassarre, Nicola Boffoli, Danilo Caivano, Giuseppe Visaggio:
SPEED: Software Project Effort Evaluator based on Dynamic-calibration. ICSM 2006: 272-273 - Paul E. Black:
Software Assurance During Maintenance. ICSM 2006: 70-72 - Salah Bouktif, Giuliano Antoniol, Ettore Merlo:
A Feedback Based Quality Assessment to Support Open Source Software Evolution: the GRASS Case Study. ICSM 2006: 155-165 - Jean-Sébastien Boulanger, Martin P. Robillard:
Managing Concern Interfaces. ICSM 2006: 14-23 - Ben Breech, Mike Tegtmeyer, Lori L. Pollock:
Integrating Influence Mechanisms into Impact Analysis for Increased Precision. ICSM 2006: 55-65 - Lionel C. Briand, Yvan Labiche, Alexandre Sauve:
Guiding the Application of Design Patterns Based on UML Models. ICSM 2006: 234-243 - Joseph Buchta, Maksym Petrenko, Denys Poshyvanyk, Václav Rajlich:
Teaching Evolution of Open-Source Projects in Software Engineering Courses. ICSM 2006: 136-144 - David Byers, Shanai Ardi, Nahid Shahmehri, Claudiu Duma:
Modeling Software VulnerabilitiesWith Vulnerability Cause Graphs. ICSM 2006: 411-422 - Gerardo Canfora, Luigi Cerulo, Massimiliano Di Penta:
On the Use of Line Co-change for Identifying Crosscutting Concern Code. ICSM 2006: 213-222 - Elliot J. Chikofsky:
Sustain, Enhance, or Replace: Making Decisions on Systems. ICSM 2006: 134 - Natalia Dragan, Michael L. Collard, Jonathan I. Maletic:
Reverse Engineering Method Stereotypes. ICSM 2006: 24-34 - Stéphane Ducasse, Tudor Gîrba, Adrian Kuhn:
Distribution Map. ICSM 2006: 203-212 - Philippe Dugerdil:
Reengineering Process Based on the Unified Process. ICSM 2006: 330-333 - Maryanne Fisher, Anthony Cox, Lin Zhao:
Using Sex Differences to Link Spatial Cognition and Program Comprehension. ICSM 2006: 289-298 - Nicolas Gold, Mark Harman, Zheng Li, Kiarash Mahdavi:
Allowing Overlapping Boundaries in Source Code using a Search Based Approach to Concept Binding. ICSM 2006: 310-319 - Ahmed E. Hassan:
Mining Software Repositories to Assist Developers and Support Managers. ICSM 2006: 339-342 - Daqing Hou:
Using Structural Constraints to Specify and Check Design Intent in Source Code - Ph.D. Dissertation Synopsis. ICSM 2006: 343-346 - Daqing Hou, H. James Hoover:
Source-Level Linkage: Adding Semantic Information to C++ Fact-bases. ICSM 2006: 448-457 - Taqi Jaffri, Kuldeep Karnawat:
Efficient Delivery of Software Updates Using Advanced Compression Techniques. ICSM 2006: 267-268 - Slinger Jansen, Sjaak Brinkkemper:
Definition and Validation of the Key process of Release, Delivery and Deployment for Product Software Vendors: turning the ugly duckling into a swan. ICSM 2006: 166-175 - Slinger Jansen, Wilfried Rijsemus:
Reducing Customers' Total Cost of OwnershipWithin a Software Supply Network. ICSM 2006: 269-271 - Michael Jiang, Michael Groble, Sharon Simmons, Dennis Edwards, Norman Wilde:
Software Feature Understanding in an Industrial Setting. ICSM 2006: 66-67 - Mira Kajko-Mattsson, Grace A. Lewis, Dave Siracusa, Taylor Nelson, Ned Chapin, Michael Heydt, Jason Nocks, Harry Snee:
Long-term Life Cycle Impact of Agile Methodologies. ICSM 2006: 422-425 - Sunghun Kim, E. James Whitehead Jr.:
Properties of Signature Change Patterns. ICSM 2006: 4-13 - Kostas Kontogiannis, Panagiotis K. Linos, Kenny Wong:
Comprehension and Maintenance of Large-Scale Multi-Language Software Applications. ICSM 2006: 497-500 - Adrian Kuhn, Orla Greevy:
Exploiting the Analogy Between Traces and Signal Processing. ICSM 2006: 320-329
skipping 41 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-06 12:15 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint