Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 39 matches
- 2015
- Li Li, Kevin Allix, Daoyuan Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein:
Potential Component Leaks in Android Apps: An Investigation into a New Feature Set for Malware Detection. QRS 2015: 195-200 - Le An, Foutse Khomh:
An Empirical Study of Highly Impactful Bugs in Mozilla Projects. QRS 2015: 262-271 - Shengwei An, Xiaoxing Ma, Chun Cao, Ping Yu, Chang Xu:
An Event-Based Formal Framework for Dynamic Software Update. QRS 2015: 173-182 - Anneliese Andrews, Joseph Lucente:
On the Viability of Using SRGMs for IT Help Desk Incident Predictions. QRS 2015: 93-98 - Josip Bozic, Bernhard Garn, Ioannis Kapsalis, Dimitris E. Simos, Severin Winkler, Franz Wotawa:
Attack Pattern-Based Combinatorial Testing with Constraints for Web Security Testing. QRS 2015: 207-212 - Arun Balaji Buduru, Stephen S. Yau:
An Effective Approach to Continuous User Authentication for Touch Screen Smart Devices. QRS 2015: 219-226 - Axel Busch, Misha Strittmatter, Anne Koziolek:
Assessing Security to Compare Architecture Alternatives of Component-Based Systems. QRS 2015: 99-108 - Haipeng Cai, Raúl A. Santelices:
Abstracting Program Dependencies Using the Method Dependence Graph. QRS 2015: 49-58 - Raymond Canzanese, Spiros Mancoridis, Moshe Kam:
System Call-Based Detection of Malicious Processes. QRS 2015: 119-124 - Néstor Cataño, Tim Wahls:
A Case Study on Code Generation of an ERP System from Event-B. QRS 2015: 183-188 - Hsin-Yu Chuang, Sheng-De Wang:
Machine Learning Based Hybrid Behavior Models for Android Malware Analysis. QRS 2015: 201-206 - Yunwei Dong, Zhe Li, Dave Towey:
On the Relationship between Model Coverage and Code Coverage Using MATLAB's Simulink. QRS 2015: 213-218 - Shan He, Sizhao Li, Yan Chen, Donghui Guo:
Uncertainty Analysis of Race Conditions in Real-Time Systems. QRS 2015: 227-232 - Hadi Hemmati:
How Effective Are Code Coverage Criteria? QRS 2015: 151-156 - Lena Herscheid, Daniel Richter, Andreas Polze:
Hovac: A Configurable Fault Injection Framework for Benchmarking the Dependability of C/C++ Applications. QRS 2015: 1-10 - Birgit Hofer, Franz Wotawa:
Fault Localization in the Light of Faulty User Input. QRS 2015: 282-291 - Jianglin Huang, Hongyi Sun, Yan-Fu Li, Min Xie:
An Empirical Study of Dynamic Incomplete-Case Nearest Neighbor Imputation in Software Quality Data. QRS 2015: 37-42 - Sadeeq Jan, Cu D. Nguyen, Lionel C. Briand:
Known XML Vulnerabilities Are Still a Threat to Popular Parsers and Open Source Systems. QRS 2015: 233-241 - Bo Jiang, Wing Kwong Chan, T. H. Tse:
PORA: Proportion-Oriented Randomized Algorithm for Test Case Prioritization. QRS 2015: 131-140 - Takashi Kitamura, Akihisa Yamada, Goro Hatayama, Cyrille Artho, Eun-Hye Choi, Thi Bich Ngoc Do, Yutaka Oiwa, Shinya Sakuragi:
Combinatorial Testing for Tree-Structured Test Models with Constraints. QRS 2015: 141-150 - Chien-Cheng Lin, Chin-Chun Chang, Deron Liang:
An Approach for Authenticating Smartphone Users Based on Histogram Features. QRS 2015: 125-130 - Yu Liu, Min Xie, Jianfeng Yang, Ming Zhao:
A New Framework and Application of Software Reliability Estimation Based on Fault Detection and Correction Processes. QRS 2015: 65-74 - Qining Lu, Mostafa Farahani, Jiesheng Wei, Anna Thomas, Karthik Pattabiraman:
LLFI: An Intermediate Code-Level Fault Injection Tool for Hardware Faults. QRS 2015: 11-16 - Wanwangying Ma, Lin Chen, Yuming Zhou, Baowen Xu, Xiaoyu Zhou:
Are Anti-patterns Coupled? An Empirical Study. QRS 2015: 242-251 - Dusica Marijan:
Multi-perspective Regression Test Prioritization for Time-Constrained Environments. QRS 2015: 157-162 - Hiroyuki Okamura, Yuki Takekoshi, Tadashi Dohi:
Fine-Grained Software Reliability Estimation Using Software Testing Inputs. QRS 2015: 85-92 - Fangyun Qin, Zheng Zheng, Chenggang Bai, Yu Qiao, Zhenyu Zhang, Cheng Chen:
Cross-Project Aging Related Bug Prediction. QRS 2015: 43-48 - Yasuhiro Saito, Tadashi Dohi:
Robustness of Non-homogeneous Gamma Process-Based Software Reliability Models. QRS 2015: 75-84 - Amirreza Soudi, Wael Khreich, Abdelwahab Hamou-Lhadj:
An Anomaly Detection System Based on Ensemble of Detectors with Effective Pruning Techniques. QRS 2015: 109-118 - Zhenhao Tang, Hanfei Wang, Bin Li, Juan Zhai, Jianhua Zhao, Xuandong Li:
Node-Set Analysis for Linked Recursive Data Structures. QRS 2015: 59-64
skipping 9 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-24 21:25 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint