Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 166 matches
- 2011
- Dorothy Acton:
Leadership, teamwork and trust: building a competitive software capability by Watts S. Humphrey and James W. Over. ACM SIGSOFT Softw. Eng. Notes 36(6): 28 (2011) - Bernhard K. Aichernig, Harald Brandl, Elisabeth Jöbstl, Willibald Krenn:
UML in action: a two-layered interpretation for testing. ACM SIGSOFT Softw. Eng. Notes 36(1): 1-8 (2011) - Mark A. Ardis, Peter B. Henderson:
Software engineering education (SEEd). ACM SIGSOFT Softw. Eng. Notes 36(1): 6-7 (2011) - Mark A. Ardis, Peter B. Henderson:
Software engineering education (SEEd). ACM SIGSOFT Softw. Eng. Notes 36(2): 8-9 (2011) - Mark A. Ardis, Peter B. Henderson:
Software Engineering Education (SEEd). ACM SIGSOFT Softw. Eng. Notes 36(3): 7-8 (2011) - Mark A. Ardis, Peter B. Henderson:
Software engineering education (SEEd). ACM SIGSOFT Softw. Eng. Notes 36(4): 6-7 (2011) - Mark A. Ardis, Peter B. Henderson:
Software Engineering Education (SEEd). ACM SIGSOFT Softw. Eng. Notes 36(6): 7-8 (2011) - Howard Ausden:
Building parallel, embedded, and real-time applications with Ada by John W. McCormick, Frank Singhoff and Jerome Hugues. ACM SIGSOFT Softw. Eng. Notes 36(6): 28-29 (2011) - Anup Kumar Bandyopadhyay:
TLRO based modeling of alternative commands and its application to generalized distributed resource allocation problem. ACM SIGSOFT Softw. Eng. Notes 36(6): 1-5 (2011) - Srikanth Baride, Kamlesh Dutta:
A cloud based software testing paradigm for mobile applications. ACM SIGSOFT Softw. Eng. Notes 36(3): 1-4 (2011) - Anita Bateman:
Hands-on networking: from theory to practice by Maria Luisa Merani, Maurizio Casoni, and Walter Cerroni. ACM SIGSOFT Softw. Eng. Notes 36(2): 38 (2011) - Hrvoje Belani:
Barcodes for mobile devices by Hiroko Kato, Keng T. Tan and Douglas Chai. ACM SIGSOFT Softw. Eng. Notes 36(3): 32-33 (2011) - Travis A. Bennett, Coskun Bayrak:
Bridging the data integration gap: from theory to implementation. ACM SIGSOFT Softw. Eng. Notes 36(3): 1-8 (2011) - Travis A. Bennett, Coskun Bayrak:
Bridging the data integration gap: from theory to implementation. ACM SIGSOFT Softw. Eng. Notes 36(4): 1-8 (2011) - Larry Bernstein:
Pithy software engineering quotes. ACM SIGSOFT Softw. Eng. Notes 36(3): 4 (2011) - Larry Bernstein:
Pithy software engineering quotes. ACM SIGSOFT Softw. Eng. Notes 36(4): 4-5 (2011) - Larry Bernstein:
Eternal software engineering questions. ACM SIGSOFT Softw. Eng. Notes 36(5): 7 (2011) - Larry Bernstein:
Eternal software engineering cross feature/architecture design simplifications. ACM SIGSOFT Softw. Eng. Notes 36(6): 6 (2011) - Larry Bernstein, Hákon Ágústsson:
Pithy software engineering quotes. ACM SIGSOFT Softw. Eng. Notes 36(1): 4-5 (2011) - Larry Bernstein, Hákon Ágústsson:
Pithy software engineering quotes. ACM SIGSOFT Softw. Eng. Notes 36(2): 6-7 (2011) - Daniel M. Berry:
Software requirements and design: the work of Michael Jackson by Bashar Nuseibeh and Pamela Zave. ACM SIGSOFT Softw. Eng. Notes 36(2): 39-40 (2011) - Julien Bertrane, Patrick Cousot, Radhia Cousot, Jérôme Feret, Laurent Mauborgne, Antoine Miné, Xavier Rival:
Static analysis by abstract interpretation of embedded critical software. ACM SIGSOFT Softw. Eng. Notes 36(1): 1-8 (2011) - Nitin Bhatia, Namarta Kapoor:
Fuzzy cognitive map based approach for software quality risk analysis. ACM SIGSOFT Softw. Eng. Notes 36(6): 1-9 (2011) - Partha S. Bishnu, Vandana Bhattacherjee:
Application of K-Medoids with Kd-Tree for software fault prediction. ACM SIGSOFT Softw. Eng. Notes 36(2): 1-6 (2011) - Antonio Sarasa Cabezuelo, Bryan Temprado-Battad, José Luis Sierra:
Engineering web services with attribute grammars: a case study. ACM SIGSOFT Softw. Eng. Notes 36(1): 1-8 (2011) - Jayeeta Chanda, Sabnam Sengupta, Ananya Kanjilal, Swapan Bhattacharya:
SCAG: a graphical approach to measure the complexity of the SOA application. ACM SIGSOFT Softw. Eng. Notes 36(5): 1-6 (2011) - Shalini Chandra, Raees Ahmad Khan:
Availability state transition model. ACM SIGSOFT Softw. Eng. Notes 36(3): 1-3 (2011) - Rajender Singh Chhillar, Nisha:
Empirical analysis of object-oriented design metrics for predicting high, medium and low severity faults using mallows Cp. ACM SIGSOFT Softw. Eng. Notes 36(6): 1-9 (2011) - Christine Choppy, Kais Klai, Hacene Zidani:
Formal verification of UML state diagrams: a petri net based approach. ACM SIGSOFT Softw. Eng. Notes 36(1): 1-8 (2011) - R. K. Choudhary, R. A. Khan:
Testing software fault tolerance techniques: future direction. ACM SIGSOFT Softw. Eng. Notes 36(3): 1-5 (2011)
skipping 136 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-16 17:26 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint