default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 583 matches
- 2018
- Ahmed Abdullah, Heinz W. Schmidt, Maria Spichkova, Huai Liu:
Monitoring Informed Testing for IoT. ASWEC 2018: 91-95 - Eman Alatawi, Antonette Mendoza, Tim Miller:
Psychologically-Driven Requirements Engineering: A Case Study in Depression Care. ASWEC 2018: 41-50 - Eman Alatawi, Tim Miller, Harald Søndergaard:
Symbolic Execution with Invariant Inlay: Evaluating the Potential. ASWEC 2018: 26-30 - Abdulaziz Alhefdhi, Hoa Khanh Dam, Hideaki Hata, Aditya Ghose:
Generating Pseudo-Code from Source Code Using Deep Learning. ASWEC 2018: 21-25 - Jameel Almalki, Haifeng Shen:
Developing Cross-Organisational Service-Based Software Systems through Decentralised Interface-Oriented Continuous Integration. ASWEC 2018: 191-200 - Judy Bowen, Steve Reeves:
Engineering Interactive Systems with Model-Driven Code Contracts. ASWEC 2018: 11-20 - Jim Buchan, Muneera Bano, Didar Zowghi, Phonephasouk Volabouth:
Semi-Automated Extraction of New Requirements from Online Reviews for Software Product Evolution. ASWEC 2018: 31-40 - Mohan Baruwal Chhetri, Hien P. Luong, Anton V. Uzunov, Quoc Bao Vo, Ryszard Kowalczyk, Surya Nepal, Isuru Rajapakse:
ADSL: An Embedded Domain-Specific Language for Constraint-Based Distributed Self-Management. ASWEC 2018: 101-110 - Daniela Soares Cruzes, Martin Gilje Jaatun, Karin Bernsmed, Inger Anne Tøndel:
Challenges and Experiences with Applying Microsoft Threat Modeling in Agile Development Projects. ASWEC 2018: 111-120 - Jens Dietrich, François Gauthier, Padmanabhan Krishnan:
Driver Generation for Java EE Web Applications. ASWEC 2018: 121-125 - Sebastian Gerdes, Tobias Fechner, Matthias Riebisch:
Identification of Technology Features to Understand and Maintain Software Architectures. ASWEC 2018: 210-214 - Fabian Gilson, Calum Irwin:
From User Stories to Use Case Scenarios towards a Generative Approach. ASWEC 2018: 61-65 - Georgia Greenheld, Bastin Tony Roy Savarimuthu, Sherlock A. Licorish:
Automating Developers' Responses to App Reviews. ASWEC 2018: 66-70 - Izuru Kume, Masahide Nakamura, Naoya Nitta:
Revealing Implicit Correspondence between Bytecode Instructions and Expressions Determined by Java Compilers. ASWEC 2018: 126-130 - Adriaan Lotter, Sherlock A. Licorish, Bastin Tony Roy Savarimuthu, Sarah Meldrum:
Code Reuse in Stack Overflow and Popular Open Source Java Projects. ASWEC 2018: 141-150 - Paula Rachow, Sandra Schröder, Matthias Riebisch:
Missing Clean Code Acceptance and Support in Practice - An Empirical Study. ASWEC 2018: 131-140 - Austen Rainer, Ashley Williams:
Using Blog Articles in Software Engineering Research: Benefits, Challenges and Case-Survey Method. ASWEC 2018: 201-209 - Victor Vidigal Ribeiro, Daniela Soares Cruzes, Guilherme Horta Travassos:
A Perception of the Practice of Software Security and Performance Verification. ASWEC 2018: 71-80 - Guoping Rong, Shenghui Gu, He Zhang, Dong Shao, Wanggen Liu:
How Is Logging Practice Implemented in Open Source Software Projects? A Preliminary Exploration. ASWEC 2018: 171-180 - Maria Spichkova:
Automated Analysis of the Impact of Weather Conditions on Medicine Consumption. ASWEC 2018: 166-170 - Tilmann Stehle, Matthias Riebisch:
Application of Design Patterns for Structural Alignment in Software Porting. ASWEC 2018: 181-190 - Ewan D. Tempero, Paul Ralph:
Towards Understanding Programs by Counting Objects. ASWEC 2018: 1-10 - Jim Warren, Ewan D. Tempero, Ian Warren, Anjuka Sathianathan, Sarah Hopkins, Matthew Shepherd, Sally Merry:
Experience Building IT Infrastructure for Research with Online Youth Mental Health Tools. ASWEC 2018: 161-165 - Muhammad Yasir, Kevin Michael, Bastin Tony Roy Savarimuthu, Sherlock A. Licorish:
Formal in the Informal: A Multi-Level Analysis of Core Python Developers' Tweets. ASWEC 2018: 151-160 - Law Check Yee, John C. Grundy, Karola von Baggo, Andrew Cain, Rajesh Vasa:
Evaluating an Open Learner Model Visualisation Prototype Tool with User eXperience Metrics. ASWEC 2018: 51-60 - Nor Shahida Mohamad Yusop, John C. Grundy, Jean-Guy Schneider, Rajesh Vasa:
Preliminary Evaluation of a Guided Usability Defect Report Form. ASWEC 2018: 81-90 - Zhi Quan Zhou, Liqun Sun:
Metamorphic Testing for Machine Translations: MT4MT. ASWEC 2018: 96-100 - 25th Australasian Software Engineering Conference, ASWEC 2018, Adelaide, Australia, November 26-30, 2018. IEEE Computer Society 2018, ISBN 978-1-7281-1241-1 [contents]
- 2015
- Eman Alatawi, Tim Miller, Harald Søndergaard:
Using Metamorphic Testing to Improve Dynamic Symbolic Execution. ASWEC 2015: 38-47 - Ahmed D. Alharthi, Maria Spichkova, Margaret Hamilton:
Requirements Engineering Aspects of ELearning Systems. ASWEC (2) 2015: 132-133
skipping 553 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-14 16:54 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint