Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 57 matches
- 2000
- Thomas Baar, Reiner Hähnle, Theo Sattler, Peter H. Schmitt:
Entwurfgesteuerte Erzeugung von OCL-Constraints. Softwaretechnik-Trends 20(3) (2000) - Boris Bokowski:
A Framework for Checking Programmer-Defined Constraints on the Definition and Use of Program Elements in Java. Softwaretechnik-Trends 20(4) (2000) - Uwe M. Borghoff:
UniBw Muenchen. Softwaretechnik-Trends 20(1) (2000) - Sanjay Dewal, Ludger Schnichels:
Bank2010: Eine fachliche und technische Vision. Softwaretechnik-Trends 20(3) (2000) - Stephan Diehl, Andreas Kerren, Katharina Mehner:
Tagungsbericht über den GI-Workshop Softwarevisualisierung 2000 am 11. und 12. Mai 2000 in Dagstuhl. Softwaretechnik-Trends 20(4) (2000) - Ernst-Erich Doberkat:
Ernst-Erich Doberkat über J. Leslie KEEDY: In Stufen zum Ziel - Zur Einführung von Bachelor- und Master-Graden an deutschen Universitäten. Softwaretechnik-Trends 20(1) (2000) - Ernst-Erich Doberkat:
Ernst-Erich Doberkat über Mary Shaw und David Garlan: Software Architecture - Perspectives on an Emerging Discipline. Softwaretechnik-Trends 20(2) (2000) - Ernst-Erich Doberkat:
Ernst-Erich Doberkat über E. Freeman, S. Hüpfer, K. Arnold: JavaSpaces Principles, Patterns and Practice. Softwaretechnik-Trends 20(4) (2000) - Reiner R. Dumke, Andreas Schmietendorf:
Metriken-basierte Bewertung von Software-Komponenten. Softwaretechnik-Trends 20(4) (2000) - Stephan Düwel:
BASE - Ein begriffbasiertes Analyseverfahren für die Software-Entwicklung. Softwaretechnik-Trends 20(4) (2000) - Stephan Eberle:
XML-basierte Internetanbindung technischer Prozesse. Softwaretechnik-Trends 20(3) (2000) - Christof Ebert:
Improving the Validation Process for a Better Field Quality in a Product Line Architecture. Softwaretechnik-Trends 20(3) (2000) - Dieter Ebhart:
Servletbasiertes Framework für Internet/Intranet-Applikationen. Softwaretechnik-Trends 20(1) (2000) - Thomas Gehrke:
Interaktionsdiagramme mit Datenspezifikation zur Darstellung verteilter Systeme. Softwaretechnik-Trends 20(3) (2000) - Christoph Grein:
Ada Magica. Softwaretechnik-Trends 20(1) (2000) - Christoph Grein:
Ada Magica. Softwaretechnik-Trends 20(2) (2000) - Wilhelm Hasselbring, Andreas Winter:
Bericht über die 22th International Conference on Software Engineering (ICSE'2000) in Limerick, Irland. Softwaretechnik-Trends 20(4) (2000) - H. Keller:
Ausschreibung für Förderanträge und Zuschüsse des Fördervereins Ada Deutschland e.V. Softwaretechnik-Trends 20(1) (2000) - Udo Kelter:
Das Konzept der Kernfächer in der universitären Ausbildung in Praktischer Informatik. Softwaretechnik-Trends 20(1) (2000) - Arne Koschel:
Ereignisgetriebene CORBA-Dienste für heterogene, verteilte Informationssysteme. Softwaretechnik-Trends 20(2) (2000) - Rainer Koschke:
Atomic Architectural Component Recovery for Program Understanding and Evolution. Softwaretechnik-Trends 20(4) (2000) - Bernt Kullbach:
Bericht über den 2. Workshop Software-Reengineering (WSR 2000) am 11. und 12. Mai 2000 in Bad Honnef. Softwaretechnik-Trends 20(2) (2000) - Horst Lichter:
FG 2.1.6: Aufruf zur Teilnahme am FG-Treffen am 30. Nov. und 1. Dez. 2000 in Langen. Softwaretechnik-Trends 20(2) (2000) - Peter Liggesmeyer:
Formale und stochastische Methoden zur Qualitätssicherung technischer Software (eingeladener Vortrag). Softwaretechnik-Trends 20(3) (2000) - Klaus-Peter Löhr:
Klaus-Peter Löhr über P. Brössler, J. Siedersleben: Softwaretechnik - Praxiswissen für Software-Ingenieure. Softwaretechnik-Trends 20(4) (2000) - Jürgen D. Mangerich:
Bericht über den 7. Workshop der FG 5.11 Vorgehensmodelle für die betriebliche Anwendungsentwicklung der GI am 27. und 28. März 2000 in Bonn. Softwaretechnik-Trends 20(2) (2000) - Katharina Mehner:
Bericht über den GI-Workshop Modellierung 2000 vom 5. - 7. April 2000 in St. Goar. Softwaretechnik-Trends 20(2) (2000) - Dirk Meyerhoff:
Bericht über die ICSTEST vom 5. - 7. April 2000 in Bonn. Softwaretechnik-Trends 20(2) (2000) - Uwe Müller:
Prüf- und Testprozesse in der Softwareentwicklung: Bestandsaufnahme von Gestaltungsbereichen und deren Einflußfaktoren. Softwaretechnik-Trends 20(1) (2000) - Jörg Niere:
Bericht über AGTIVE'99, Kloster Rolduc, Niederlande. Softwaretechnik-Trends 20(1) (2000)
skipping 27 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-03-28 16:21 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint