default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 835 matches
- 2021
- Ishaani Priyadarshini, Raghvendra Kumar, Le Minh Tuan, Le Hoang Son, Hoang Viet Long, Rohit Sharma, Sakshi Rai:
A new enhanced cyber security framework for medical cyber physical systems. SICS Softw.-Intensive Cyber Phys. Syst. 35(3-4): 159-183 (2021) - Johannes Schlatow, Edgard Schmidt, Rolf Ernst:
Automating integration under emergent constraints for embedded systems. SICS Softw.-Intensive Cyber Phys. Syst. 35(3-4): 185-199 (2021) - Frank Slomka, Mohammadreza Sadeghi:
Beyond the limitations of real-time scheduling theory: a unified scheduling theory for the analysis of real-time systems. SICS Softw.-Intensive Cyber Phys. Syst. 35(3-4): 201-236 (2021) - 2020
- Johanna Barzen, Frank Leymann:
Quantum humanities: a vision for quantum computing in digital humanities. SICS Softw.-Intensive Cyber Phys. Syst. 35(1-2): 153-158 (2020) - Saliha Irem Besik, Johann-Christoph Freytag:
A formal approach to build privacy-awareness into clinical workflows. SICS Softw.-Intensive Cyber Phys. Syst. 35(1-2): 141-152 (2020) - Giuliano Casale, Matej Artac, Willem-Jan van den Heuvel, André van Hoorn, Pelle Jakovits, Frank Leymann, M. Long, V. Papanikolaou, Domenico Presenza, Alessandra Russo, Satish Narayana Srirama, Damian A. Tamburri, Michael Wurster, Lulai Zhu:
RADON: rational decomposition and orchestration for serverless computing. SICS Softw.-Intensive Cyber Phys. Syst. 35(1-2): 77-87 (2020) - Schahram Dustdar:
The 13th advanced summer school on service-oriented computing. SICS Softw.-Intensive Cyber Phys. Syst. 35(1-2): 1-2 (2020) - Ghareeb Falazi, Vikas Khinchi, Uwe Breitenbücher, Frank Leymann:
Transactional properties of permissioned blockchains. SICS Softw.-Intensive Cyber Phys. Syst. 35(1-2): 49-61 (2020) - Manuel Fritz, Osama Muazzen, Michael Behringer, Holger Schwarz:
ASAP-DM: a framework for automatic selection of analytic platforms for data mining. SICS Softw.-Intensive Cyber Phys. Syst. 35(1-2): 17-29 (2020) - Daniel Del Gaudio, Pascal Hirmer:
A lightweight messaging engine for decentralized data processing in the Internet of Things. SICS Softw.-Intensive Cyber Phys. Syst. 35(1-2): 39-48 (2020) - Leonardo Gazzarri, Melanie Herschel:
Towards task-based parallelization for entity resolution. SICS Softw.-Intensive Cyber Phys. Syst. 35(1-2): 31-38 (2020) - Jasmin Guth, Frank Leymann:
Pattern-based rewrite and refinement of architectures using graph theory. SICS Softw.-Intensive Cyber Phys. Syst. 35(1-2): 115-126 (2020) - Lukas Harzenetter, Uwe Breitenbücher, Kálmán Képes, Frank Leymann:
Freezing and defrosting cloud applications: automated saving and restoring of running applications. SICS Softw.-Intensive Cyber Phys. Syst. 35(1-2): 101-114 (2020) - Robin Lichtenthäler, Mike Prechtl, Christoph Schwille, Tobias Schwartz, Pascal Cezanne, Guido Wirtz:
Requirements for a model-driven cloud-native migration of monolithic web-based applications. SICS Softw.-Intensive Cyber Phys. Syst. 35(1-2): 89-100 (2020) - Davide Neri, Jacopo Soldani, Olaf Zimmermann, Antonio Brogi:
Design principles, architectural smells and refactorings for microservices: a multivocal review. SICS Softw.-Intensive Cyber Phys. Syst. 35(1-2): 3-15 (2020) - Lukas Reinfurt, Michael Falkenthal, Frank Leymann:
Where to begin: on pattern language entry points. SICS Softw.-Intensive Cyber Phys. Syst. 35(1-2): 127-139 (2020) - Michael Wurster, Uwe Breitenbücher, Michael Falkenthal, Christoph Krieger, Frank Leymann, Karoline Saatkamp, Jacopo Soldani:
The essential deployment metamodel: a systematic review of deployment automation technologies. SICS Softw.-Intensive Cyber Phys. Syst. 35(1-2): 63-75 (2020) - 2019
- Samira Akili, Felix Lorenz:
Towards runtime verification of collaborative embedded systems. SICS Softw.-Intensive Cyber Phys. Syst. 34(4): 225-236 (2019) - Justus Bogner, Stefan Wagner, Alfred Zimmermann:
Using architectural modifiability tactics to examine evolution qualities of Service- and Microservice-Based Systems. SICS Softw.-Intensive Cyber Phys. Syst. 34(2-3): 141-149 (2019) - Thomas Buchmann, Felix Schwägerl:
A repair-oriented approach to product consistency in product lines using negative variability. SICS Softw.-Intensive Cyber Phys. Syst. 34(1): 17-33 (2019) - Birte Caesar, Florian Grigoleit, Stephan Unverdorben:
(Self-)adaptiveness for manufacturing systems: challenges and approaches. SICS Softw.-Intensive Cyber Phys. Syst. 34(4): 191-200 (2019) - Emilia Cioroaica, Florian Pudlitz, Ilias Gerostathopoulos, Thomas Kuhn:
Simulation methods and tools for collaborative embedded systems: with focus on the automotive smart ecosystems. SICS Softw.-Intensive Cyber Phys. Syst. 34(4): 213-223 (2019) - Xiaoming Du, Cong Li:
Combining global regression and local approximation in server power modeling. SICS Softw.-Intensive Cyber Phys. Syst. 34(1): 35-43 (2019) - Ghareeb Falazi, Michael Hahn, Uwe Breitenbücher, Frank Leymann:
Modeling and execution of blockchain-aware business processes. SICS Softw.-Intensive Cyber Phys. Syst. 34(2-3): 105-116 (2019) - Michael Falkenthal, Uwe Breitenbücher, Johanna Barzen, Frank Leymann:
On the algebraic properties of concrete solution aggregation. SICS Softw.-Intensive Cyber Phys. Syst. 34(2-3): 117-128 (2019) - Stefano Forti, Ahmad Ibrahim, Antonio Brogi:
Mimicking FogDirector application management. SICS Softw.-Intensive Cyber Phys. Syst. 34(2-3): 151-161 (2019) - Manuel Fritz, Michael Behringer, Holger Schwarz:
Quality-driven early stopping for explorative cluster analysis for big data. SICS Softw.-Intensive Cyber Phys. Syst. 34(2-3): 129-140 (2019) - Sabine Glesner:
CSRD has become SICS. SICS Softw.-Intensive Cyber Phys. Syst. 34(1): 1 (2019) - Constantin Hildebrandt, Torsten Bandyszak, Ana Petrovska, Nishanth Laxman, Emilia Cioroaica, Sebastian Törsleff:
EURECA: epistemic uncertainty classification scheme for runtime information exchange in collaborative system groups. SICS Softw.-Intensive Cyber Phys. Syst. 34(4): 177-190 (2019) - Thomas Ilsche, Robert Schöne, Joseph Schuchart, Daniel Hackenberg, Marc Simon, Yiannis Georgiou, Wolfgang E. Nagel:
Power measurement techniques for energy-efficient computing: reconciling scalability, resolution, and accuracy. SICS Softw.-Intensive Cyber Phys. Syst. 34(1): 45-52 (2019)
skipping 805 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-26 03:53 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint