default search action
Yossi Lichtenstein
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c18]Linus Wunderlich, Allen Higgins, Yossi Lichtenstein:
Machine Learning for Business Students: An Experiential Learning Approach. ITiCSE (1) 2021: 512-518
2010 – 2019
- 2019
- [j9]Yossi Lichtenstein, Stjepan Dujmovic, Charles Baden-Fuller:
Strategies for Competing in the Automotive Industry's Software Ecosystem: Standards and Bottlenecks. IEEE Softw. 36(3): 45-49 (2019) - 2017
- [j8]Yossi Lichtenstein, Shy Cucuy, Lior Fink:
Pre-defined and optional staging for the deployment of enterprise systems: a case study and a framework. Enterp. Inf. Syst. 11(3): 414-433 (2017) - 2016
- [j7]Michel Benaroch, Yossi Lichtenstein, Lior Fink:
Contract Design Choices and the Balance of Ex Ante and Ex Post Transaction Costs in Software Development Outsourcing. MIS Q. 40(1): 57-82 (2016) - 2015
- [j6]Yossi Lichtenstein, Pamela Abbott, Amit Rechavi:
Engaging Students in an MIS Course through the Creation of E-Business: A Self-Determination Theory Analysis. Commun. Assoc. Inf. Syst. 36: 10 (2015) - 2014
- [j5]Lior Fink, Yossi Lichtenstein:
Why project size matters for contract choice in software development outsourcing. Data Base 45(3): 54-71 (2014) - 2010
- [c17]Lior Fink, Edna Schechtman, Yossi Lichtenstein:
Contract Choice in Software Development Outsourcing: a Multidimensional View of Project Attributes. MCIS 2010: 31 - [c16]Yossi Lichtenstein, Itamar Shabtai, Irena Milstein, Ofir Ben-Assuli:
Social Influence and Network Effects in the Diffusion of a Healthcare Information Exchange System. MCIS 2010: 55
2000 – 2009
- 2007
- [c15]Iris Ginzburg, Allen Higgins, Yossi Lichtenstein:
Looking for the Locus of Innovation in New Service Development. HICSS 2007: 230 - 2006
- [j4]Michel Benaroch, Yossi Lichtenstein, Karl Robinson:
Real Options in Information Technology Risk Management: An Empirical Validation of Risk-Option Relationships. MIS Q. 30(4): 827-864 (2006) - [j3]David Gefen, Simon Wyss, Yossi Lichtenstein:
Business Familiarity as Risk Mitigation in Software Development Outsourcing Contracts. MIS Q. 32(3): 531-551 (2006) - [c14]Michal Rimon, Yossi Lichtenstein, Allon Adir, Itai Jaeger, Michael Vinov, S. Johnson, D. Jani:
Addressing Test Generation Challenges for Configurable Processor Verification. HLDVT 2006: 95-101 - 2005
- [c13]Allon Adir, Yaron Arbetman, Bella Dubrov, Yossi Lichtenstein, Michal Rimon, Michael Vinov, Massimo A. Calligaro, Andrew Cofler, Gabriel Duffy:
VLIW: a case study of parallelism verification. DAC 2005: 779-782 - [c12]Yoav Katz, Itai Jaeger, Roy Emek, Yossi Lichtenstein, Anita Devadason, Audrey Romonosky:
Reuse in system-level stimuli-generation. HLDVT 2005: 105-111 - 2004
- [j2]Yossi Lichtenstein:
Puzzles in software development contracting. Commun. ACM 47(2): 61-65 (2004) - [c11]Michael L. Behm, John M. Ludden, Yossi Lichtenstein, Michal Rimon, Michael Vinov:
Industrial experience with test generation languages for processor verification. DAC 2004: 36-40 - 2003
- [c10]Yossi Lichtenstein, Alan McDonnell:
Pricing software development services. ECIS 2003: 1073-1083 - 2002
- [c9]Jim Kenneally, Yossi Lichtenstein:
The Optional Value of IS Projects - a Study of an IS Portfolio at a Multinational Manufacturer. ECIS 2002: 240-251
1990 – 1999
- 1996
- [c8]Daniel Geist, Monica Farkas, Avner Landver, Yossi Lichtenstein, Shmuel Ur, Yaron Wolfsthal:
Coverage-Directed Test Generation Using Symbolic Techniques. FMCAD 1996: 143-158 - 1995
- [c7]Aharon Aharon, Dave Goodman, Moshe Levinger, Yossi Lichtenstein, Yossi Malka, Charlotte Metzger, Moshe Molcho, Gil Shurek:
Test Program Generation for Functional Verification of PowerPC Processors in IBM. DAC 1995: 279-285 - 1994
- [c6]Yossi Lichtenstein, Yossi Malka, Aharon Aharon:
Model Based Test Generation for Processor Verification. IAAI 1994 - 1992
- [j1]Alex Loopik, Yossi Lichtenstein:
Prolog versus Kee - A case study. Artif. Intell. Eng. 7(3): 153-165 (1992) - 1991
- [c5]Yossi Lichtenstein, Bob Welham, Ajay Gupta:
Time Representation in Prolog Circuit Modelling. ALPUK 1991: 78-93 - [c4]Daryl Allred, Yossi Lichtenstein, Chris Preist, Michael A. Bennett, Ajay Gupta:
AGATHA: An Integrated Expert System to Test and Diagnose Complex Personal Computer Boards. IAAI 1991: 87-103
1980 – 1989
- 1988
- [c3]Yossi Lichtenstein, Ehud Shapiro:
Abstract Algorithmic Debugging. ICLP/SLP 1988: 512-531 - [c2]Rob Gerth, Michael Codish, Yossi Lichtenstein, Ehud Shapiro:
Fully Abstract Denotational Semantics for Flat Concurrent Prolog. LICS 1988: 320-335 - [c1]Yossi Lichtenstein, Ehud Shapiro:
Concurrent Algorithmic Debugging. Workshop on Parallel and Distributed Debugging 1988: 248-260
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint